Windows
Analysis Report
dAIJ6g47mZ.exe
Overview
General Information
Sample name: | dAIJ6g47mZ.exe (renamed file extension from none to exe, renamed because original name is a hash value) |
Original sample name: | 638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517 |
Analysis ID: | 1379470 |
MD5: | b4354ee75e6d043ad4ba2c6d2df30a6e |
SHA1: | ae7972c9427173e0aad8e4252d1b071d5978ba41 |
SHA256: | 638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- dAIJ6g47mZ.exe (PID: 2960 cmdline:
C:\Users\u ser\Deskto p\dAIJ6g47 mZ.exe MD5: B4354EE75E6D043AD4BA2C6D2DF30A6E) - conhost.exe (PID: 6488 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3248 cmdline:
C:\Windows \System32\ schtasks.e xe" /creat e /f /sc O NLOGON /RL HIGHEST / tn "Chrome Update" / tr "C:\Use rs\ToxicEy e\rat.exe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 1292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6428 cmdline:
"C:\Window s\System32 \cmd.exe" /C C:\User s\user\App Data\Local \Temp\tmpE 0C3.tmp.ba t & Del C: \Users\use r\AppData\ Local\Temp \tmpE0C3.t mp.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5208 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7068 cmdline:
Tasklist / fi "PID eq 2960" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - find.exe (PID: 6280 cmdline:
find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - timeout.exe (PID: 5868 cmdline:
Timeout /T 1 /Nobrea k MD5: 100065E21CFBBDE57CBA2838921F84D6) - rat.exe (PID: 5928 cmdline:
"rat.exe" MD5: B4354EE75E6D043AD4BA2C6D2DF30A6E) - conhost.exe (PID: 4900 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2544 cmdline:
C:\Windows \System32\ schtasks.e xe" /creat e /f /sc O NLOGON /RL HIGHEST / tn "Chrome Update" / tr "C:\Use rs\ToxicEy e\rat.exe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 3476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WerFault.exe (PID: 5044 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 5 928 -s 297 6 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- rat.exe (PID: 992 cmdline:
C:\Users\T oxicEye\ra t.exe MD5: B4354EE75E6D043AD4BA2C6D2DF30A6E) - conhost.exe (PID: 3192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
ToxicEye | ToxicEye is a ransomware that spreads through phishing emails. The malware encrypts system files with AES-256 and demands a ransom in Bitcoin. | No Attribution |
{"C2 url": "https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage"}
{"C2 url": "https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_ToxicEye | Yara detected ToxicEye | Joe Security | ||
JoeSecurity_Clipboard_Hijacker_3 | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_ToxicEye | Yara detected ToxicEye | Joe Security | ||
JoeSecurity_Clipboard_Hijacker_3 | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ToxicEye | Yara detected ToxicEye | Joe Security | ||
JoeSecurity_Clipboard_Hijacker_3 | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
JoeSecurity_ToxicEye | Yara detected ToxicEye | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ToxicEye | Yara detected ToxicEye | Joe Security | ||
JoeSecurity_Clipboard_Hijacker_3 | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | URLs: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Window created: | Jump to behavior |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Code function: | 0_2_00007FFD348A6C06 | |
Source: | Code function: | 0_2_00007FFD348A79B2 | |
Source: | Code function: | 10_2_00007FFD348879B2 | |
Source: | Code function: | 10_2_00007FFD34886C06 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static PE information: |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFD348A3419 | |
Source: | Code function: | 10_2_00007FFD348889F9 | |
Source: | Code function: | 10_2_00007FFD34883419 |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File created: | Jump to dropped file |
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Binary or memory string: |
Source: | Code function: | 10_2_00007FFD348811F7 |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Language, Device and Operating System Detection |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 111 Windows Management Instrumentation | 1 Scheduled Task/Job | 12 Process Injection | 111 Masquerading | 1 Input Capture | 331 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | 1 Web Service | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | 1 Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Scheduled Task/Job | 11 Disable or Modify Tools | LSASS Memory | 3 Process Discovery | Remote Desktop Protocol | 11 Archive Collected Data | Exfiltration Over Bluetooth | 11 Encrypted Channel | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | 1 Scripting | Logon Script (Windows) | Logon Script (Windows) | 151 Virtualization/Sandbox Evasion | Security Account Manager | 151 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 1 Clipboard Data | Automated Exfiltration | 1 Ingress Tool Transfer | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 12 Process Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | 2 Non-Application Layer Protocol | Data Destruction | Virtual Private Server | Employee Names | ||
Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 23 System Information Discovery | SSH | Keylogging | Scheduled Transfer | 13 Application Layer Protocol | Data Encrypted for Impact | Server | Gather Victim Network Information | ||
Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Scripting | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Data Transfer Size Limits | Multiband Communication | Service Stop | Botnet | Domain Properties | ||
External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Obfuscated Files or Information | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Exfiltration Over C2 Channel | Commonly Used Port | Inhibit System Recovery | Web Services | DNS | ||
Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Timestomp | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Exfiltration Over Alternative Protocol | Application Layer Protocol | Defacement | Serverless | Network Trust Dependencies |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
96% | ReversingLabs | ByteCode-MSIL.Infostealer.AdamantiumTheif | ||
77% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1307065 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1307065 | ||
100% | Joe Sandbox ML | |||
96% | ReversingLabs | ByteCode-MSIL.Infostealer.AdamantiumTheif | ||
77% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
3% | Virustotal | Browse | ||
12% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
7% | Virustotal | Browse | ||
7% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
google.com | 142.251.15.139 | true | false | high | |
api.telegram.org | 149.154.167.220 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false | |
142.251.15.139 | google.com | United States | 15169 | GOOGLEUS | false |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1379470 |
Start date and time: | 2024-01-23 13:18:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 19s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Critical Process Termination |
Sample name: | dAIJ6g47mZ.exe (renamed file extension from none to exe, renamed because original name is a hash value) |
Original Sample Name: | 638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517 |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@23/13@7/2 |
EGA Information: |
|
HCA Information: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
Time | Type | Description |
---|---|---|
13:19:44 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.220 | Get hash | malicious | GuLoader | Browse | ||
Get hash | malicious | XClient Stealer | Browse | |||
Get hash | malicious | Gurcu Stealer | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | DCRat | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.telegram.org | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | XClient Stealer | Browse |
| ||
Get hash | malicious | Gurcu Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | DCRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Clipboard Hijacker, Djvu, Fabookie, Glupteba, LummaC Stealer, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, AsyncRAT, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | XClient Stealer | Browse |
| ||
Get hash | malicious | Babuk, Djvu, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, RedLine | Browse |
| ||
Get hash | malicious | Gurcu Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PoshC2 | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rat.exe_53adaffc35a7cdb46b6e8a658446411b4952e3_76110556_827965d9-647e-4f95-ae50-38f14b6eb5a7\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.436425051284702 |
Encrypted: | false |
SSDEEP: | 384:w6qUtTsTE5cj4Wa4ZuDEwzuiFUY4lO8/R:NqUsE5cjNaKBwzuiFUY4lO8 |
MD5: | 6087A1F3EE0C24A82E3D69AB7CFD79C0 |
SHA1: | 9FA2F7317242594E458F04B69F075EDB1B2E47EC |
SHA-256: | BCBEFD785DD9BF2FF935461F684EF96847E2FD5F350CBB4261C794D35F80D21E |
SHA-512: | A744B98CB04F1C2B55792FFE7ACE598B438C9CE89D3101F349AADC12DD6634B2A655D2881794EAC2F1D239678D005B0CEFF0F64222D18350D696EF556FCE2A1C |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 687952 |
Entropy (8bit): | 3.211364987680842 |
Encrypted: | false |
SSDEEP: | 6144:bSLS0p0ejzlHCO5+qgIW+M3QwofQNhJFRFNFXGFiF4QXAUfvykoM:bSLpGqI+wQrfohJFRFNFXGFiF4QXAum |
MD5: | D6F259915638B2F98B77F638CB68BD5D |
SHA1: | AE16005D1BB6FBDC0DD63386EAC02D68200181E2 |
SHA-256: | 8F89C8B42D40B66640F7ED5BFEA30CB6468E7E59636977D203F83C1AAA09CA96 |
SHA-512: | D2983A1344663A1C816DE7DEC40406EB2686C4ACE90023D6B06F5DD600F73A1657992527D6EDA2766BBB634D7D084A5C5EECDE648ABF74B17CE0EA1E158C4930 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7126 |
Entropy (8bit): | 3.7184114723781843 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJpmgxXYk4jeB4tklprT89bwlgafcSdm:R6lXJp5hYkNB4tk8Kdf8 |
MD5: | 49BC3862E05910DAEE980BD86FC3D383 |
SHA1: | FB2D50FAB1159379CB8460154D36943FA1181ADD |
SHA-256: | 1C7AB19EB9C76FF0AABF13E83CFBABC5A64838BEF83BDD0B672803B87F2511DB |
SHA-512: | AFCD7420C41C5CE23DDBBB5755D6566539CD3634440EB744DD7831C0580CF7AC4BA836511C03250ABDDF6D9EB057CCD0C06FDE978DEB404A23C3879B208D0112 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4894 |
Entropy (8bit): | 4.441494815128964 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsuJg771I9pW/FHVVWpW8VYOYm8M4JLSFHyq8vRmW5mEBSAd:uIjfkI72W/F27VKJIWyEcAd |
MD5: | F0C13322047970AAD1CD6127C8BE65D2 |
SHA1: | 4E2358FF299D3C9D7666E47E5D65B54DC9AFBC1D |
SHA-256: | D72C80B6544B8A65260F5C12F7008AAFD6F6961BC2AEC3963B8F36B8AD174973 |
SHA-512: | 399E57BDACEA5A831ADCF468D3B79B4890BD3811258BE1004676002F4920D34A8FBDDE9CCFF53FCA2CD27E6BF8ABE9E4D5EEA27210904958B9E72A5FC74090B7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dAIJ6g47mZ.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114176 |
Entropy (8bit): | 5.662688913298548 |
Encrypted: | false |
SSDEEP: | 1536:Ui+bobMsBnqLoM91qQIwnN5Qt5QJbzPbhDqI68QWGzCrAZu6+25a:mbobMsBnwouY8ZbxqH8QWGzCrAZu6Za |
MD5: | B4354EE75E6D043AD4BA2C6D2DF30A6E |
SHA1: | AE7972C9427173E0AAD8E4252D1B071D5978BA41 |
SHA-256: | 638F25147BFEA8CDD2C8E010682388D64868D77E236995972059E7FCBCC6A517 |
SHA-512: | 949B7C31BFAF6AEEAF319E0A651923FCC2C929A97D8AF7C9B7B488F33D3FEF386F7178A7D5DAB5EA256CB354ECCC0FF9995BD10CB5DB9D1C3224791DCE8B7FBB |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\dAIJ6g47mZ.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dAIJ6g47mZ.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1498 |
Entropy (8bit): | 5.364175471524945 |
Encrypted: | false |
SSDEEP: | 24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNCsXE4Npv:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAu |
MD5: | F3E4B39D94849B092D4BB1072DD5F435 |
SHA1: | 0D7C96B89B2901834CF0FF5EC99579B8DE65DD72 |
SHA-256: | BD51FDC1EF08B5BF92E800C79A01CD5783EA62FA3240505AC6AC8B5969782046 |
SHA-512: | C5B7C6D226EFDD26D14F55EFF6C5714ACF7452B70F29F43DC1E2BFEDA58F5883878EAFFE2B3AF060C656EA7BF99B94D9B3D3E22EF847625D5B78F60DD9DC1733 |
Malicious: | false |
Preview: |
Process: | C:\Users\ToxicEye\rat.exe |
File Type: | |
Category: | modified |
Size (bytes): | 660 |
Entropy (8bit): | 5.38575581059626 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPXcp151KDLI4MN5I/k1BakvoDLI4MWuPakEOsk7v:ML9E4KQ71qE4GIs0E4KD |
MD5: | E918A9A81162ACCFD3E06E02E11CB6C8 |
SHA1: | 10F02DAEDB20582256A5601EE8898CFA8DC2BDD5 |
SHA-256: | 912110B9095CDC4B124444955DD3ABAEFFB7C309A242A4B05299A26EC9920A21 |
SHA-512: | 78D9CABEFE698E54197D7D03ABC3AC36F3AAA2DE80CD79AD780B67324F36D7CA3560F642873E8C20F2BB27A9C892D9A2F21898E4B469FAFE35BA0FAEE8A7936A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dAIJ6g47mZ.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 187 |
Entropy (8bit): | 5.035509335898349 |
Encrypted: | false |
SSDEEP: | 3:Qk7wDumh6ckanDFSaskUGKoQRw+HREzfyOH+S/bmMNMOhCJsw+HROirH9XEOASn:QkEXnIBdGKoQRw+HGnHNmUMsCKw+Hs8X |
MD5: | B81A9F62E4C2D0CA213A1BB3BE0A2F68 |
SHA1: | 7153764354586BC3D5E6AD975651B2B7114C1069 |
SHA-256: | 8A99F144454AD261034F5DF966E30B751319175C0A0BA40B50B02C78E30AC542 |
SHA-512: | E69AACC45AB3F78D814C0F7FFF8C31B8DFF875B0023696327B8A79C578B49AA9E4E416AED94414B1FCF5F846CB94BEF62C8C91585D899876AD301DB965FEF8A9 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.468600219537695 |
Encrypted: | false |
SSDEEP: | 6144:/zZfpi6ceLPx9skLmb0fWZWSP3aJG8nAgeiJRMMhA2zX4WABluuNBjDH5Sk:rZHtWZWOKnMM6bFpjj4k |
MD5: | D99BA7462D6203578EAEE0AD13693DAE |
SHA1: | 9C4155E9C2DA6AD3F8935AAFD98FE88D80CE812E |
SHA-256: | DAF4DBF1DDD62BFDDD4AF4F997D89492AA1164629B0C1301A57768A2D572FC95 |
SHA-512: | B3AA3BAF5EA76B12A4055E5AFA0492AA54CD5C02C60C5F2308A9741C7F6CB4439136A435953046DFC50DB35DB765F52551E4149AFE147F64EE4F8D09298F9A91 |
Malicious: | false |
Preview: |
Process: | C:\Users\ToxicEye\rat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 70 |
Entropy (8bit): | 4.493518824601853 |
Encrypted: | false |
SSDEEP: | 3:xI+MLCOKJcLBKL+zFkmL2KGpByCRyn:DOKoRF/G2CRyn |
MD5: | 0568E1D12CAFD998C97DBD9F453383BB |
SHA1: | FCA14D1C55AAC0CE9A77CC395BCC6281FB97E443 |
SHA-256: | 6CED86323ED187F6DA367851A00A0E20F67E95F904B78D1C659ED70620270C26 |
SHA-512: | 8256508E7BD032030AC2583A2F57257EE109986789957ABE98412BB716BA77FA5E4A8906C6A105CAFB328EB3B8DC10301E46B9C98520D9FEAA98640EF03EA475 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.662688913298548 |
TrID: |
|
File name: | dAIJ6g47mZ.exe |
File size: | 114'176 bytes |
MD5: | b4354ee75e6d043ad4ba2c6d2df30a6e |
SHA1: | ae7972c9427173e0aad8e4252d1b071d5978ba41 |
SHA256: | 638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517 |
SHA512: | 949b7c31bfaf6aeeaf319e0a651923fcc2c929a97d8af7c9b7b488f33d3fef386f7178a7d5dab5ea256cb354eccc0ff9995bd10cb5db9d1c3224791dce8b7fbb |
SSDEEP: | 1536:Ui+bobMsBnqLoM91qQIwnN5Qt5QJbzPbhDqI68QWGzCrAZu6+25a:mbobMsBnwouY8ZbxqH8QWGzCrAZu6Za |
TLSH: | C8B32D1C37FC1A19F7FF5B7978B261194B72B867A932D70D18D5188D08B2B818E11BA3 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2............."...0.............V.... ........@.. ....................... ............`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x41d356 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xCB7FC332 [Thu Mar 10 14:24:50 2078 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
dec ecx |
jbe 00007FDB350120E3h |
outsb |
and byte ptr [ebp+65h], cl |
jbe 00007FDB350120E8h |
jbe 00007FDB35012084h |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add al, byte ptr [ebx] |
add al, 06h |
or byte ptr [eax], cl |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1d303 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1e000 | 0x5bc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x20000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x1d244 | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x1b37c | 0x1b400 | f981ec4e6b7ca2b585a5a67462cbe64c | False | 0.4244283973623853 | data | 5.702465754060223 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x1e000 | 0x5bc | 0x600 | 7907b9697008599683b66a56d4c253ab | False | 0.4186197916666667 | data | 4.115204569554272 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x20000 | 0xc | 0x200 | 6d252e677ac089b71a09645c9359729a | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x1e090 | 0x32c | data | 0.4211822660098522 | ||
RT_MANIFEST | 0x1e3cc | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 23, 2024 13:19:49.286058903 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:49.286092043 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:49.286210060 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:49.299298048 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:49.299314022 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:49.717947006 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:49.718045950 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:49.721827030 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:49.721833944 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:49.722023964 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:49.767786980 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:49.789567947 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:49.833897114 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:52.098843098 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:52.098893881 CET | 443 | 49699 | 149.154.167.220 | 192.168.2.6 |
Jan 23, 2024 13:19:52.099000931 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 23, 2024 13:19:52.119282961 CET | 49699 | 443 | 192.168.2.6 | 149.154.167.220 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 23, 2024 13:19:48.438899040 CET | 53155 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 23, 2024 13:19:48.557838917 CET | 53 | 53155 | 1.1.1.1 | 192.168.2.6 |
Jan 23, 2024 13:19:48.699702978 CET | 64453 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 23, 2024 13:19:48.818393946 CET | 53 | 64453 | 1.1.1.1 | 192.168.2.6 |
Jan 23, 2024 13:20:12.097091913 CET | 63583 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 23, 2024 13:20:14.211009979 CET | 63583 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 23, 2024 13:20:15.205822945 CET | 63583 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 23, 2024 13:20:17.205501080 CET | 63583 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 23, 2024 13:20:21.221441031 CET | 63583 | 53 | 192.168.2.6 | 1.1.1.1 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Jan 23, 2024 13:19:48.570919991 CET | 192.168.2.6 | 142.251.15.139 | 4d5a | Echo | |
Jan 23, 2024 13:19:48.674257040 CET | 142.251.15.139 | 192.168.2.6 | 555a | Echo Reply | |
Jan 23, 2024 13:19:48.819416046 CET | 192.168.2.6 | 149.154.167.220 | 4d59 | Echo | |
Jan 23, 2024 13:19:48.972187042 CET | 192.168.2.6 | 149.154.167.220 | 4d58 | Echo | |
Jan 23, 2024 13:19:49.022226095 CET | 149.154.167.220 | 192.168.2.6 | 5559 | Echo Reply | |
Jan 23, 2024 13:19:49.022325993 CET | 192.168.2.6 | 149.154.167.220 | fcfd | (Protocol unreachable) | Destination Unreachable |
Jan 23, 2024 13:19:49.175095081 CET | 149.154.167.220 | 192.168.2.6 | 5558 | Echo Reply |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 23, 2024 13:19:48.438899040 CET | 192.168.2.6 | 1.1.1.1 | 0x9e83 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 23, 2024 13:19:48.699702978 CET | 192.168.2.6 | 1.1.1.1 | 0x6269 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 23, 2024 13:20:12.097091913 CET | 192.168.2.6 | 1.1.1.1 | 0xdf69 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 23, 2024 13:20:14.211009979 CET | 192.168.2.6 | 1.1.1.1 | 0xdf69 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 23, 2024 13:20:15.205822945 CET | 192.168.2.6 | 1.1.1.1 | 0xdf69 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 23, 2024 13:20:17.205501080 CET | 192.168.2.6 | 1.1.1.1 | 0xdf69 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 23, 2024 13:20:21.221441031 CET | 192.168.2.6 | 1.1.1.1 | 0xdf69 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 23, 2024 13:19:48.557838917 CET | 1.1.1.1 | 192.168.2.6 | 0x9e83 | No error (0) | 142.251.15.139 | A (IP address) | IN (0x0001) | false | ||
Jan 23, 2024 13:19:48.557838917 CET | 1.1.1.1 | 192.168.2.6 | 0x9e83 | No error (0) | 142.251.15.113 | A (IP address) | IN (0x0001) | false | ||
Jan 23, 2024 13:19:48.557838917 CET | 1.1.1.1 | 192.168.2.6 | 0x9e83 | No error (0) | 142.251.15.138 | A (IP address) | IN (0x0001) | false | ||
Jan 23, 2024 13:19:48.557838917 CET | 1.1.1.1 | 192.168.2.6 | 0x9e83 | No error (0) | 142.251.15.101 | A (IP address) | IN (0x0001) | false | ||
Jan 23, 2024 13:19:48.557838917 CET | 1.1.1.1 | 192.168.2.6 | 0x9e83 | No error (0) | 142.251.15.100 | A (IP address) | IN (0x0001) | false | ||
Jan 23, 2024 13:19:48.557838917 CET | 1.1.1.1 | 192.168.2.6 | 0x9e83 | No error (0) | 142.251.15.102 | A (IP address) | IN (0x0001) | false | ||
Jan 23, 2024 13:19:48.818393946 CET | 1.1.1.1 | 192.168.2.6 | 0x6269 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49699 | 149.154.167.220 | 443 | 5928 | C:\Users\ToxicEye\rat.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-01-23 12:19:49 UTC | 182 | OUT | |
2024-01-23 12:19:52 UTC | 347 | IN | |
2024-01-23 12:19:52 UTC | 58 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:19:39 |
Start date: | 23/01/2024 |
Path: | C:\Users\user\Desktop\dAIJ6g47mZ.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x1f365bf0000 |
File size: | 114'176 bytes |
MD5 hash: | B4354EE75E6D043AD4BA2C6D2DF30A6E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:19:39 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:19:42 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\schtasks.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff645b90000 |
File size: | 235'008 bytes |
MD5 hash: | 76CD6626DD8834BD4A42E6A565104DC2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 4 |
Start time: | 13:19:42 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 13:19:43 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff656f50000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 13:19:43 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 13:19:43 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\tasklist.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff67eaf0000 |
File size: | 106'496 bytes |
MD5 hash: | D0A49A170E13D7F6AEBBEFED9DF88AAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 8 |
Start time: | 13:19:43 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\find.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff790bc0000 |
File size: | 17'920 bytes |
MD5 hash: | 4BF76A28D31FC73AA9FC970B22D056AF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 13:19:43 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\timeout.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff78c3d0000 |
File size: | 32'768 bytes |
MD5 hash: | 100065E21CFBBDE57CBA2838921F84D6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 13:19:44 |
Start date: | 23/01/2024 |
Path: | C:\Users\ToxicEye\rat.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x23f1be80000 |
File size: | 114'176 bytes |
MD5 hash: | B4354EE75E6D043AD4BA2C6D2DF30A6E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 11 |
Start time: | 13:19:44 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 13:19:44 |
Start date: | 23/01/2024 |
Path: | C:\Users\ToxicEye\rat.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x1ef98090000 |
File size: | 114'176 bytes |
MD5 hash: | B4354EE75E6D043AD4BA2C6D2DF30A6E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Has exited: | true |
Target ID: | 13 |
Start time: | 13:19:44 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 13:19:47 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\schtasks.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff645b90000 |
File size: | 235'008 bytes |
MD5 hash: | 76CD6626DD8834BD4A42E6A565104DC2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 15 |
Start time: | 13:19:47 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 18 |
Start time: | 13:19:51 |
Start date: | 23/01/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6a3f70000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | moderate |
Has exited: | true |
Execution Graph
Execution Coverage: | 16% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Function 00007FFD348A6C06 Relevance: .5, Instructions: 468COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FFD348A79B2 Relevance: .5, Instructions: 454COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 16.8% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 9 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FFD348811F7 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 12.8% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 3 |
Total number of Limit Nodes: | 0 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |