Windows
Analysis Report
MenSncKnTI.exe
Overview
General Information
Sample name: | MenSncKnTI.exerenamed because original name is a hash value |
Original sample name: | eb7eb5acecb06deab2b4fce875d6c079.exe |
Analysis ID: | 1487770 |
MD5: | eb7eb5acecb06deab2b4fce875d6c079 |
SHA1: | 22f0ecea986b8afdaa4d2b1254757058d4c2cab3 |
SHA256: | 3b0503a6c2fb8f5cc645df4d5ab4dd9161cab9104dd1b7b8db0a89956a94bc6e |
Tags: | 64exetrojan |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- MenSncKnTI.exe (PID: 4884 cmdline:
"C:\Users\ user\Deskt op\MenSncK nTI.exe" MD5: EB7EB5ACECB06DEAB2B4FCE875D6C079) - sc.exe (PID: 364 cmdline:
C:\Windows \system32\ sc.exe del ete "CWRWV XLO" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 4436 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 5980 cmdline:
C:\Windows \system32\ sc.exe cre ate "CWRWV XLO" binpa th= "C:\Pr ogramData\ uyrlkcqvoc cj\gtgpwwj kduow.exe" start= "a uto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 6116 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 5944 cmdline:
C:\Windows \system32\ sc.exe sto p eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 5168 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 5776 cmdline:
C:\Windows \system32\ sc.exe sta rt "CWRWVX LO" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 3136 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- gtgpwwjkduow.exe (PID: 4896 cmdline:
C:\Program Data\uyrlk cqvoccj\gt gpwwjkduow .exe MD5: EB7EB5ACECB06DEAB2B4FCE875D6C079) - conhost.exe (PID: 2800 cmdline:
C:\Windows \system32\ conhost.ex e MD5: 0D698AF330FD17BEE3BF90011D49251D) - explorer.exe (PID: 3052 cmdline:
explorer.e xe MD5: 662F4F92FDE3557E86D110526BB578D5)
- svchost.exe (PID: 1464 cmdline:
C:\Windows \System32\ svchost.ex e -k Local Service -p -s Licens eManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: vburov: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp: | 2024-08-05T06:00:59.258097+0200 |
SID: | 2051004 |
Source Port: | 49400 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Timestamp: | 2024-08-05T05:57:58.301795+0200 |
SID: | 2051004 |
Source Port: | 49711 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Timestamp: | 2024-08-05T05:58:57.306162+0200 |
SID: | 2051004 |
Source Port: | 49393 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Timestamp: | 2024-08-05T06:01:59.170763+0200 |
SID: | 2051004 |
Source Port: | 49402 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Timestamp: | 2024-08-05T05:59:57.728119+0200 |
SID: | 2051004 |
Source Port: | 49397 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Timestamp: | 2024-08-05T05:57:52.917756+0200 |
SID: | 2826930 |
Source Port: | 49710 |
Destination Port: | 10128 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Bitcoin Miner |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | TCP traffic: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 11_2_0000000140001394 |
Source: | File created: | Jump to behavior |
Source: | Code function: | 11_2_0000000140003240 | |
Source: | Code function: | 11_2_00000001400027D0 |
Source: | Dropped File: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 11_2_0000000140001403 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | API coverage: |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 11_2_0000000140001160 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Thread register set: | Jump to behavior | ||
Source: | Thread register set: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 11 Windows Service | 11 Windows Service | 1 Masquerading | OS Credential Dumping | 211 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Service Execution | 1 DLL Side-Loading | 311 Process Injection | 11 Virtualization/Sandbox Evasion | LSASS Memory | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 311 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 3 System Information Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
61% | Virustotal | Browse | ||
79% | ReversingLabs | Win64.Trojan.MintZard |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
79% | ReversingLabs | Win64.Trojan.MintZard | ||
61% | Virustotal | Browse | ||
5% | ReversingLabs | |||
4% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
4% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
5% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
monerooceans.stream | 149.102.143.109 | true | true |
| unknown |
gulf.moneroocean.stream | unknown | unknown | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.196.9.187 | unknown | Switzerland | 42624 | SIMPLECARRIERCH | true | |
149.102.143.109 | monerooceans.stream | United States | 174 | COGENT-174US | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1487770 |
Start date and time: | 2024-08-05 05:57:06 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | MenSncKnTI.exerenamed because original name is a hash value |
Original Sample Name: | eb7eb5acecb06deab2b4fce875d6c079.exe |
Detection: | MAL |
Classification: | mal100.evad.mine.winEXE@19/2@1/2 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target MenSncKnTI.exe, PID 4884 because it is empty
- Execution Graph export aborted for target gtgpwwjkduow.exe, PID 4896 because it is empty
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
23:57:54 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.196.9.187 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
149.102.143.109 | Get hash | malicious | Xmrig | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
monerooceans.stream | Get hash | malicious | Xmrig | Browse |
| |
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | AveMaria, UACMe, Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
SIMPLECARRIERCH | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | NovaSentinel | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, PureLog Stealer, RedLine, Xmrig, zgRAT | Browse |
| ||
Get hash | malicious | Amadey, Babadeda, Stealc, Vidar, Xmrig | Browse |
| ||
COGENT-174US | Get hash | malicious | Mirai, Gafgyt, Moobot, Okiru | Browse |
| |
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cryptbot, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Windows\Temp\mrjtggjdzomz.sys | Get hash | malicious | Xmrig | Browse | ||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | XWorm, Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Blank Grabber, Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | LummaC, Xmrig | Browse | |||
Get hash | malicious | LummaC, Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse |
Process: | C:\Users\user\Desktop\MenSncKnTI.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5219328 |
Entropy (8bit): | 6.512690550389807 |
Encrypted: | false |
SSDEEP: | 98304:WoyQksM4D03ZztuWvrBl7IhqUSRK0DtRgNCPpZKFYv:dJM4DQTueNNIG/RJK8 |
MD5: | EB7EB5ACECB06DEAB2B4FCE875D6C079 |
SHA1: | 22F0ECEA986B8AFDAA4D2B1254757058D4C2CAB3 |
SHA-256: | 3B0503A6C2FB8F5CC645DF4D5AB4DD9161CAB9104DD1B7B8DB0A89956A94BC6E |
SHA-512: | 2A1A96B6C92E3C7621E14B843262A11730556AC75BE311CD59DFE33A46CF7F57F02D04119D66B0A3976BF4D7E9C193AF80266AD98E5ABC4668A62CBECA23070F |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14544 |
Entropy (8bit): | 6.2660301556221185 |
Encrypted: | false |
SSDEEP: | 192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ |
MD5: | 0C0195C48B6B8582FA6F6373032118DA |
SHA1: | D25340AE8E92A6D29F599FEF426A2BC1B5217299 |
SHA-256: | 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5 |
SHA-512: | AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
File type: | |
Entropy (8bit): | 6.512690550389807 |
TrID: |
|
File name: | MenSncKnTI.exe |
File size: | 5'219'328 bytes |
MD5: | eb7eb5acecb06deab2b4fce875d6c079 |
SHA1: | 22f0ecea986b8afdaa4d2b1254757058d4c2cab3 |
SHA256: | 3b0503a6c2fb8f5cc645df4d5ab4dd9161cab9104dd1b7b8db0a89956a94bc6e |
SHA512: | 2a1a96b6c92e3c7621e14b843262a11730556ac75be311cd59dfe33a46cf7f57f02d04119d66b0a3976bf4d7e9c193af80266ad98e5abc4668a62cbeca23070f |
SSDEEP: | 98304:WoyQksM4D03ZztuWvrBl7IhqUSRK0DtRgNCPpZKFYv:dJM4DQTueNNIG/RJK8 |
TLSH: | 3F36235E1463D71FC4782D33CE6EBC07888458EBCB525276941ADDBDA3389068EADB43 |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......f.........."......v...*O.....@..........@..............................P...........`........................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x140001140 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66A81609 [Mon Jul 29 22:22:01 2024 UTC] |
TLS Callbacks: | 0x40001760, 0x1, 0x400017e0, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 203d63d5d9a088e2d84cef737227986b |
Instruction |
---|
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00007ED5h] |
mov dword ptr [eax], 00000001h |
call 00007F91E4C546FFh |
nop |
nop |
nop |
dec eax |
add esp, 28h |
ret |
nop |
inc ecx |
push edi |
inc ecx |
push esi |
push esi |
push edi |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov eax, dword ptr [00000030h] |
dec eax |
mov edi, dword ptr [eax+08h] |
dec eax |
mov esi, dword ptr [00007EC9h] |
xor eax, eax |
dec eax |
cmpxchg dword ptr [esi], edi |
sete bl |
je 00007F91E4C54720h |
dec eax |
cmp edi, eax |
je 00007F91E4C5471Bh |
dec esp |
mov esi, dword ptr [00009901h] |
nop word ptr [eax+eax+00000000h] |
mov ecx, 000003E8h |
inc ecx |
call esi |
xor eax, eax |
dec eax |
cmpxchg dword ptr [esi], edi |
sete bl |
je 00007F91E4C546F7h |
dec eax |
cmp edi, eax |
jne 00007F91E4C546D9h |
dec eax |
mov edi, dword ptr [00007E90h] |
mov eax, dword ptr [edi] |
cmp eax, 01h |
jne 00007F91E4C546FEh |
mov ecx, 0000001Fh |
call 00007F91E4C5B974h |
jmp 00007F91E4C54719h |
cmp dword ptr [edi], 00000000h |
je 00007F91E4C546FBh |
mov byte ptr [004F9A71h], 00000001h |
jmp 00007F91E4C5470Bh |
mov dword ptr [edi], 00000001h |
dec eax |
mov ecx, dword ptr [00007E7Ah] |
dec eax |
mov edx, dword ptr [00007E7Bh] |
call 00007F91E4C5B96Bh |
mov eax, dword ptr [edi] |
cmp eax, 01h |
jne 00007F91E4C5470Bh |
dec eax |
mov ecx, dword ptr [00007E50h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa7c0 | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4ff000 | 0x3c8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x4fc000 | 0x180 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x500000 | 0x78 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x90a0 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x9410 | 0x138 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xa960 | 0x160 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x75e6 | 0x7600 | 5308a2f98f8531492c4b85ea1b0b2e68 | False | 0.5186374470338984 | data | 6.1819039499025275 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x1f48 | 0x2000 | 6addcb3e81a6c355190a356f46167586 | False | 0.4677734375 | zlib compressed data | 4.716062691452087 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x4f0e08 | 0x4efe00 | bfbe8792cd716af48dc5115b1bc0757e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x4fc000 | 0x180 | 0x200 | 5993f1f99c53d19465375428ae987d93 | False | 0.50390625 | data | 3.1105060915489524 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.00cfg | 0x4fd000 | 0x10 | 0x200 | b18c7380298e104adf73576fa46bccc1 | False | 0.04296875 | data | 0.15127132530476972 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0x4fe000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x4ff000 | 0x3c8 | 0x400 | 8ddb61ba0dd8bdfc1cb4ed88bd155ed5 | False | 0.396484375 | data | 3.123510869650262 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x500000 | 0x78 | 0x200 | 5ecc015b9011059c643de3ff209bc0cf | False | 0.23046875 | data | 1.425957514287425 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x4ff060 | 0x368 | data | English | United States | 0.42660550458715596 |
DLL | Import |
---|---|
msvcrt.dll | __C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, _wcsicmp, _wcsnicmp, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, memset, signal, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr |
KERNEL32.dll | DeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Protocol | SID | Signature | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
2024-08-05T06:00:59.258097+0200 | TCP | 2051004 | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request | 49400 | 80 | 192.168.2.6 | 185.196.9.187 |
2024-08-05T05:57:58.301795+0200 | TCP | 2051004 | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request | 49711 | 80 | 192.168.2.6 | 185.196.9.187 |
2024-08-05T05:58:57.306162+0200 | TCP | 2051004 | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request | 49393 | 80 | 192.168.2.6 | 185.196.9.187 |
2024-08-05T06:01:59.170763+0200 | TCP | 2051004 | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request | 49402 | 80 | 192.168.2.6 | 185.196.9.187 |
2024-08-05T05:59:57.728119+0200 | TCP | 2051004 | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request | 49397 | 80 | 192.168.2.6 | 185.196.9.187 |
2024-08-05T05:57:52.917756+0200 | TCP | 2826930 | ETPRO COINMINER XMR CoinMiner Usage | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 5, 2024 05:57:56.522265911 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 05:57:56.527246952 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 05:57:56.527442932 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 05:57:56.527587891 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 05:57:56.532380104 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 05:57:57.139280081 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 05:57:57.183310032 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 05:57:57.583003044 CEST | 49711 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:57:57.588073969 CEST | 80 | 49711 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:57:57.588160038 CEST | 49711 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:57:57.589481115 CEST | 49711 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:57:57.594475985 CEST | 80 | 49711 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:57:57.594551086 CEST | 49711 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:57:57.601222038 CEST | 80 | 49711 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:57:57.980838060 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 05:57:58.027045012 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 05:57:58.301498890 CEST | 80 | 49711 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:57:58.301795006 CEST | 49711 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:57:58.301903963 CEST | 80 | 49711 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:57:58.301961899 CEST | 49711 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:57:58.307986021 CEST | 80 | 49711 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:58:56.606077909 CEST | 49393 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:58:56.611138105 CEST | 80 | 49393 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:58:56.611217976 CEST | 49393 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:58:56.620807886 CEST | 49393 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:58:56.625684023 CEST | 80 | 49393 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:58:56.625742912 CEST | 49393 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:58:56.630642891 CEST | 80 | 49393 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:58:57.305988073 CEST | 80 | 49393 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:58:57.306060076 CEST | 80 | 49393 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:58:57.306162119 CEST | 49393 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:58:57.306246996 CEST | 49393 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:58:57.311063051 CEST | 80 | 49393 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:58:57.995783091 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 05:58:58.000895023 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 05:59:37.144783974 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 05:59:37.198729992 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 05:59:57.028983116 CEST | 49397 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:59:57.034233093 CEST | 80 | 49397 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:59:57.034410954 CEST | 49397 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:59:57.042526960 CEST | 49397 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:59:57.047338963 CEST | 80 | 49397 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:59:57.047413111 CEST | 49397 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:59:57.052295923 CEST | 80 | 49397 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:59:57.727946043 CEST | 80 | 49397 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:59:57.728009939 CEST | 80 | 49397 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 05:59:57.728118896 CEST | 49397 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:59:57.728244066 CEST | 49397 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 05:59:57.733134031 CEST | 80 | 49397 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:00:37.151859999 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 06:00:37.156930923 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 06:00:49.346122026 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 06:00:49.386306047 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 06:00:58.548584938 CEST | 49400 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:00:58.553520918 CEST | 80 | 49400 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:00:58.553740978 CEST | 49400 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:00:58.553913116 CEST | 49400 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:00:58.558633089 CEST | 80 | 49400 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:00:58.558706999 CEST | 49400 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:00:58.563455105 CEST | 80 | 49400 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:00:59.257841110 CEST | 80 | 49400 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:00:59.257925987 CEST | 80 | 49400 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:00:59.258096933 CEST | 49400 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:00:59.258266926 CEST | 49400 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:00:59.263154984 CEST | 80 | 49400 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:01:07.852348089 CEST | 10128 | 49710 | 149.102.143.109 | 192.168.2.6 |
Aug 5, 2024 06:01:07.901768923 CEST | 49710 | 10128 | 192.168.2.6 | 149.102.143.109 |
Aug 5, 2024 06:01:58.460608006 CEST | 49402 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:01:58.465728998 CEST | 80 | 49402 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:01:58.465816021 CEST | 49402 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:01:58.466027021 CEST | 49402 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:01:58.470841885 CEST | 80 | 49402 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:01:58.470913887 CEST | 49402 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:01:58.475872040 CEST | 80 | 49402 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:01:59.170624971 CEST | 80 | 49402 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:01:59.170686960 CEST | 80 | 49402 | 185.196.9.187 | 192.168.2.6 |
Aug 5, 2024 06:01:59.170763016 CEST | 49402 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:01:59.170871973 CEST | 49402 | 80 | 192.168.2.6 | 185.196.9.187 |
Aug 5, 2024 06:01:59.175729036 CEST | 80 | 49402 | 185.196.9.187 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 5, 2024 05:57:56.507702112 CEST | 49931 | 53 | 192.168.2.6 | 1.1.1.1 |
Aug 5, 2024 05:57:56.514743090 CEST | 53 | 49931 | 1.1.1.1 | 192.168.2.6 |
Aug 5, 2024 05:58:17.205755949 CEST | 53 | 58438 | 1.1.1.1 | 192.168.2.6 |
Aug 5, 2024 05:58:18.691248894 CEST | 53 | 63885 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Aug 5, 2024 05:57:56.507702112 CEST | 192.168.2.6 | 1.1.1.1 | 0xb216 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Aug 5, 2024 05:57:56.514743090 CEST | 1.1.1.1 | 192.168.2.6 | 0xb216 | No error (0) | monerooceans.stream | CNAME (Canonical name) | IN (0x0001) | false | ||
Aug 5, 2024 05:57:56.514743090 CEST | 1.1.1.1 | 192.168.2.6 | 0xb216 | No error (0) | 149.102.143.109 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49711 | 185.196.9.187 | 80 | 3052 | C:\Windows\explorer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 5, 2024 05:57:57.589481115 CEST | 173 | OUT | |
Aug 5, 2024 05:57:57.594551086 CEST | 487 | OUT | |
Aug 5, 2024 05:57:58.301498890 CEST | 184 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49393 | 185.196.9.187 | 80 | 3052 | C:\Windows\explorer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 5, 2024 05:58:56.620807886 CEST | 173 | OUT | |
Aug 5, 2024 05:58:56.625742912 CEST | 502 | OUT | |
Aug 5, 2024 05:58:57.305988073 CEST | 168 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49397 | 185.196.9.187 | 80 | 3052 | C:\Windows\explorer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 5, 2024 05:59:57.042526960 CEST | 173 | OUT | |
Aug 5, 2024 05:59:57.047413111 CEST | 503 | OUT | |
Aug 5, 2024 05:59:57.727946043 CEST | 168 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49400 | 185.196.9.187 | 80 | 3052 | C:\Windows\explorer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 5, 2024 06:00:58.553913116 CEST | 173 | OUT | |
Aug 5, 2024 06:00:58.558706999 CEST | 503 | OUT | |
Aug 5, 2024 06:00:59.257841110 CEST | 168 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49402 | 185.196.9.187 | 80 | 3052 | C:\Windows\explorer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 5, 2024 06:01:58.466027021 CEST | 173 | OUT | |
Aug 5, 2024 06:01:58.470913887 CEST | 503 | OUT | |
Aug 5, 2024 06:01:59.170624971 CEST | 168 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Users\user\Desktop\MenSncKnTI.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff647750000 |
File size: | 5'219'328 bytes |
MD5 hash: | EB7EB5ACECB06DEAB2B4FCE875D6C079 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff750c70000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 3 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff750c70000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff750c70000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 7 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff750c70000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 8 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 23:57:54 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 23:57:55 |
Start date: | 04/08/2024 |
Path: | C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62ae80000 |
File size: | 5'219'328 bytes |
MD5 hash: | EB7EB5ACECB06DEAB2B4FCE875D6C079 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 11 |
Start time: | 23:57:55 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 12 |
Start time: | 23:57:55 |
Start date: | 04/08/2024 |
Path: | C:\Windows\explorer.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff609140000 |
File size: | 5'141'208 bytes |
MD5 hash: | 662F4F92FDE3557E86D110526BB578D5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |
Target ID: | 17 |
Start time: | 23:58:41 |
Start date: | 04/08/2024 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7403e0000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Function 00007FF647751140 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF62AE81140 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 2.2% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 13.5% |
Total number of Nodes: | 896 |
Total number of Limit Nodes: | 2 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140003240 Relevance: 147.2, APIs: 59, Strings: 24, Instructions: 1980COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400027D0 Relevance: 21.4, APIs: 9, Strings: 3, Instructions: 376COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001160 Relevance: 13.6, APIs: 9, Instructions: 130sleepstringCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001BA0 Relevance: 12.4, APIs: 4, Strings: 3, Instructions: 106memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001E10 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 77COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001880 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 138memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001800 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 30COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|