Windows
Analysis Report
invoice727282_PDF..exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- invoice727282_PDF..exe (PID: 4800 cmdline:
"C:\Users\ user\Deskt op\invoice 727282_PDF ..exe" MD5: 8A1B3F441A8F2DA1B6BB52359FA5694D) - aspnet_compiler.exe (PID: 5680 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Asp net_compil er.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
- QGwHqTR.exe (PID: 7344 cmdline:
"C:\Users\ user\AppDa ta\Roaming \QGwHqTR\Q GwHqTR.exe " MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 7352 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- QGwHqTR.exe (PID: 7588 cmdline:
"C:\Users\ user\AppDa ta\Roaming \QGwHqTR\Q GwHqTR.exe " MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 7596 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.convergesolve.com", "Username": "prop@convergesolve.com", "Password": "vS#2!nM*5zcVw"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 4 entries |
System Summary |
---|
Source: | Author: frack113: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: |
Source: | Code function: | 6_2_0695E780 |
Source: | Windows user hook set: | Jump to behavior |
Source: | Window created: | Jump to behavior |
Source: | Code function: | 6_2_06A2C8C8 | |
Source: | Code function: | 6_2_06A2C8D8 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static file information: |
Source: | Code function: | 3_2_00930A98 | |
Source: | Code function: | 3_2_009327E1 | |
Source: | Code function: | 3_2_00932070 | |
Source: | Code function: | 3_2_00932061 | |
Source: | Code function: | 6_2_02FA4248 | |
Source: | Code function: | 6_2_02FA4B18 | |
Source: | Code function: | 6_2_02FA3F00 | |
Source: | Code function: | 6_2_02FACCA8 | |
Source: | Code function: | 6_2_02FACC9B | |
Source: | Code function: | 6_2_069554D8 | |
Source: | Code function: | 6_2_069534D0 | |
Source: | Code function: | 6_2_06950358 | |
Source: | Code function: | 6_2_06A2A730 | |
Source: | Code function: | 6_2_06A257C8 | |
Source: | Code function: | 6_2_06A4AEB8 | |
Source: | Code function: | 6_2_06A4B7B0 | |
Source: | Code function: | 6_2_06A4CF48 | |
Source: | Code function: | 6_2_06A47400 | |
Source: | Code function: | 6_2_06A44DF8 | |
Source: | Code function: | 6_2_06A41220 | |
Source: | Code function: | 6_2_06A419E0 | |
Source: | Code function: | 6_2_06A4C868 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 6_2_02FA0C7A | |
Source: | Code function: | 6_2_02FA0C52 | |
Source: | Code function: | 6_2_0695CDA0 | |
Source: | Code function: | 6_2_06A285C8 | |
Source: | Code function: | 6_2_06A285E0 | |
Source: | Code function: | 6_2_06A28524 | |
Source: | Code function: | 6_2_06A28570 | |
Source: | Code function: | 6_2_06A2857C | |
Source: | Code function: | 6_2_06A28588 | |
Source: | Code function: | 6_2_06A28554 | |
Source: | Code function: | 6_2_06A21609 |
Source: | Static PE information: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | File created: | Jump to dropped file |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 312 Process Injection | 1 Deobfuscate/Decode Files or Information | 311 Input Capture | 24 System Information Discovery | Remote Desktop Protocol | 2 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 2 Obfuscated Files or Information | 1 Credentials in Registry | 111 Security Software Discovery | SMB/Windows Admin Shares | 1 Email Collection | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Software Packing | NTDS | 2 Process Discovery | Distributed Component Object Model | 311 Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 141 Virtualization/Sandbox Evasion | SSH | 1 Clipboard Data | 23 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Masquerading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 141 Virtualization/Sandbox Evasion | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 312 Process Injection | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 Hidden Files and Directories | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | ByteCode-MSIL.Trojan.GenSteal | ||
41% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1327047 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
3% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
mail.convergesolve.com | 209.124.85.231 | true | true |
| unknown |
api.ipify.org | 172.67.74.152 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
209.124.85.231 | mail.convergesolve.com | United States | 55293 | A2HOSTINGUS | true | |
172.67.74.152 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1490419 |
Start date and time: | 2024-08-09 09:07:51 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 22 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | invoice727282_PDF..exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@7/5@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target QGwHqTR.exe, PID 7344 because it is empty
- Execution Graph export aborted for target QGwHqTR.exe, PID 7588 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
03:08:52 | API Interceptor | |
09:08:53 | Autostart | |
09:09:02 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.74.152 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ficker Stealer, Rusty Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Stealit | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.ipify.org | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
A2HOSTINGUS | Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| |
Get hash | malicious | SystemBC | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Tycoon2FA | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader, Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Roaming\QGwHqTR\QGwHqTR.exe | Get hash | malicious | Lokibot, PureLog Stealer, zgRAT | Browse | ||
Get hash | malicious | Lokibot | Browse | |||
Get hash | malicious | AsyncRAT, PureLog Stealer, XWorm, zgRAT | Browse | |||
Get hash | malicious | PureLog Stealer, XWorm | Browse | |||
Get hash | malicious | PureLog Stealer, XWorm | Browse | |||
Get hash | malicious | Snake Keylogger, zgRAT | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse |
Process: | C:\Users\user\AppData\Roaming\QGwHqTR\QGwHqTR.exe |
File Type: | |
Category: | modified |
Size (bytes): | 311 |
Entropy (8bit): | 5.347482639021185 |
Encrypted: | false |
SSDEEP: | 6:Q3La/xwchA2DLIP12MUAvvr3tDLIP12MUAvvR+uTL2ql2ABgTv:Q3La/hhpDLI4M9tDLI4MWuPTAv |
MD5: | 1AC8524D3800CDD5A91A864BCD4C3AB5 |
SHA1: | D003AEE44AC954938CE83E4A80412E04F726EA83 |
SHA-256: | 8652A0399D65C2D111841F66EF2E930CDB8291CC8203252D59FD4921FF336C02 |
SHA-512: | 9F28B59B99D0BC1EB60D29BE54CE2DAAC7D9B5D895311169578383C19A46CCF7CDE498EB6D7F172CF7D1D11E5B16665DF989CD8EEC527282BE3B796CD08C7DAC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\invoice727282_PDF..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 226 |
Entropy (8bit): | 5.360398796477698 |
Encrypted: | false |
SSDEEP: | 6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv |
MD5: | 3A8957C6382192B71471BD14359D0B12 |
SHA1: | 71B96C965B65A051E7E7D10F61BEBD8CCBB88587 |
SHA-256: | 282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D |
SHA-512: | 76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe |
File Type: | |
Category: | modified |
Size (bytes): | 56368 |
Entropy (8bit): | 6.120994357619221 |
Encrypted: | false |
SSDEEP: | 768:fF9E8FLLs2Zokf85d9PTV6Iq8Fnqf7P+WxqWKnz8DH:ffE6EkfOd9PT86dWvKgb |
MD5: | FDA8C8F2A4E100AFB14C13DFCBCAB2D2 |
SHA1: | 19DFD86294C4A525BA21C6AF77681B2A9BBECB55 |
SHA-256: | 99A2C778C9A6486639D0AFF1A7D2D494C2B0DC4C7913EBCB7BFEA50A2F1D0B09 |
SHA-512: | 94F0ACE37CAE77BE9935CF4FC8AAA94691343D3B38DE5E16C663B902C220BFF513CD02256C7AF2D815A23DD30439582DDBB0880009C76BBF36FF8FBC1A6DDC18 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\AppData\Roaming\QGwHqTR\QGwHqTR.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 221 |
Entropy (8bit): | 4.801526423190794 |
Encrypted: | false |
SSDEEP: | 6:zx3Me21f1LRJIQtAMw/VgRZBXVN+1GFJqozrCib:zKpj1JIUwqBFN+1Q3b |
MD5: | A3DCA41A950A7DF7ECE76A867A17400E |
SHA1: | AA9EFDBCF37BEE2C7FD0986F1A4308A73EC3F7BB |
SHA-256: | 6B2BE177016DF867316A0C432DAB0B71B6E51B35D169B0ACB1ABB47A4C03D7C0 |
SHA-512: | F80207B5B78C7AE867AAB139196BBBEDE0437961DD03E790AEF3B877A228D7A90B9178B3342324B0EEA1C270E2A232A769B2F2D9E5DB4C065EB95140FA12239D |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.679530393533328 |
TrID: |
|
File name: | invoice727282_PDF..exe |
File size: | 256'072 bytes |
MD5: | 8a1b3f441a8f2da1b6bb52359fa5694d |
SHA1: | 0d522e50748a4ea1f098091865c594a16d75794c |
SHA256: | 30c2e1e5a35089de9990cf07fd080b4dbed13bd07823b3d54f173337cb25f8c1 |
SHA512: | 0ba981a402187f3d699505555391a7402c38472f92583e5155e15e69152fa9c93229b98f88ead069c74354220bc57fa93250fd973bd1c955f903723efaf78697 |
SSDEEP: | 6144:/py2XUv1yW68ntR5Xnb1FioABMPe1ruojcqD/4TqAJ:xy2kdyW68tRNnZoogzuo7/gz |
TLSH: | D744F1969BD2CE83D94DAFF860A35F984F65E517690293C76148621A0F223D77C3E80F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0.................. ...@....@.. ....................................`................................ |
Icon Hash: | 1203233b23333b82 |
Entrypoint: | 0x432e0e |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66829CB2 [Mon Jul 1 12:10:26 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | EAE713DFC05244CF4301BF1C9F68B1BE |
Thumbprint SHA-1: | 9CD1DDB78ED05282353B20CDFE8FA0A4FB6C1ECE |
Thumbprint SHA-256: | 9D7620A4CEBA92370E8828B3CB1007AEFF63AB36A2CBE5F044FDDE14ABAB1EBF |
Serial: | 0DBF152DEAF0B981A8A938D53F769DB8 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x32db4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x36000 | 0x8d9c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x3a200 | 0x4648 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x34000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x2e724 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x30e14 | 0x31000 | 57cc5f6d3a2f36f8f4a620c5053538c6 | False | 0.9327118542729592 | SysEx File - | 7.897390111297712 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x34000 | 0xc | 0x200 | d9cf14401c5ef53741cbf6c694c316a1 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x36000 | 0x8d9c | 0x8e00 | 250aed1fb7125b4aa9f8476c8e1fa7a6 | False | 0.3537632042253521 | data | 5.284802229972301 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x361f0 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | 0.29074161549362304 | ||
RT_ICON | 0x3a418 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | 0.4104771784232365 | ||
RT_ICON | 0x3c9c0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | 0.38367729831144465 | ||
RT_ICON | 0x3da68 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | 0.5372950819672131 | ||
RT_ICON | 0x3e3f0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | 0.5673758865248227 | ||
RT_GROUP_ICON | 0x3e858 | 0x4c | data | 0.8026315789473685 | ||
RT_VERSION | 0x3e8a4 | 0x30c | data | 0.4307692307692308 | ||
RT_MANIFEST | 0x3ebb0 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 9, 2024 09:08:48.320233107 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:48.320266008 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:48.320395947 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:48.329253912 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:48.329272032 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:48.801471949 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:48.801553965 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:48.806868076 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:48.806881905 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:48.807147026 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:48.851562977 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:48.937020063 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:48.984507084 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:49.046163082 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:49.046228886 CEST | 443 | 49703 | 172.67.74.152 | 192.168.2.7 |
Aug 9, 2024 09:08:49.046293974 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:49.052509069 CEST | 49703 | 443 | 192.168.2.7 | 172.67.74.152 |
Aug 9, 2024 09:08:53.194360018 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:53.199402094 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:53.199656010 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:53.884090900 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:53.929794073 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:53.935537100 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:53.935671091 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:53.946594000 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:53.951610088 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.060529947 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.074464083 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:54.080002069 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.192979097 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.208905935 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:54.215951920 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.334613085 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.334670067 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.334708929 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.334759951 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:54.361738920 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:54.366698980 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.485852003 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.488749981 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:54.493649960 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.603168964 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.604650021 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:54.610230923 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.734134912 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:54.735488892 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:54.740298986 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.058451891 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.058774948 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.063612938 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.173789978 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.175730944 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.183578014 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.326159954 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.326600075 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.333070993 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.442224026 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.444508076 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.444508076 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.444648981 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.444648981 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.444648981 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.444678068 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.444688082 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.449412107 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.449537992 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.449547052 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.449552059 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.449564934 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.449568987 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.449572086 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.591475010 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.632925987 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.641172886 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.646003008 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.756921053 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.757586002 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.758905888 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:55.763798952 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:55.763891935 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.288419962 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.288616896 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.293448925 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.401511908 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.401743889 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.406733036 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.518033028 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.520123959 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.525554895 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.642893076 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.642937899 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.642973900 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.643074036 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.672689915 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.677850008 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.785476923 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.818830967 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.823725939 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.931301117 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:56.931556940 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:56.936424971 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.044444084 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.045409918 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.050403118 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.166054964 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.166266918 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.171119928 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.281800985 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.285249949 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.290270090 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.450061083 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.451888084 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.456706047 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.563867092 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.564335108 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564367056 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564428091 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564465046 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564508915 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564558029 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564589024 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564589024 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564606905 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.564626932 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:08:57.569227934 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.569361925 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.569562912 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.569591045 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.569617033 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.569648027 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.712258101 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:08:57.757869959 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:25.570554018 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:25.575692892 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:25.684878111 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:25.685478926 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:25.686574936 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:25.691678047 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:25.693439960 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.208992004 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.209558964 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.214420080 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.322134018 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.323515892 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.328691006 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.441826105 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.445213079 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.450252056 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.568764925 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.568793058 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.568804979 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.568818092 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.568862915 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.578166962 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.583081961 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.692679882 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.697356939 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.702900887 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.812547922 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.812901974 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.817888975 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.933725119 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:26.933995962 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:26.938782930 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.168129921 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.168550014 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.173412085 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.281358957 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.281697035 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.286832094 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.441600084 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.442518950 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.447504044 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.582386017 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.583837986 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.583981991 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.584121943 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.584177017 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.584177017 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.584260941 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.584532022 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:10:27.588700056 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.588818073 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.589049101 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.589057922 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.589066982 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.589080095 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.589277029 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.724225998 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:10:27.773763895 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:12:05.587172031 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Aug 9, 2024 09:12:05.592117071 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:12:05.702533007 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 |
Aug 9, 2024 09:12:05.703227997 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 9, 2024 09:08:48.300947905 CEST | 54934 | 53 | 192.168.2.7 | 1.1.1.1 |
Aug 9, 2024 09:08:48.309997082 CEST | 53 | 54934 | 1.1.1.1 | 192.168.2.7 |
Aug 9, 2024 09:08:52.983375072 CEST | 55839 | 53 | 192.168.2.7 | 1.1.1.1 |
Aug 9, 2024 09:08:53.192420006 CEST | 53 | 55839 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Aug 9, 2024 09:08:48.300947905 CEST | 192.168.2.7 | 1.1.1.1 | 0x4fe5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 9, 2024 09:08:52.983375072 CEST | 192.168.2.7 | 1.1.1.1 | 0x7198 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Aug 9, 2024 09:08:48.309997082 CEST | 1.1.1.1 | 192.168.2.7 | 0x4fe5 | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false | ||
Aug 9, 2024 09:08:48.309997082 CEST | 1.1.1.1 | 192.168.2.7 | 0x4fe5 | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false | ||
Aug 9, 2024 09:08:48.309997082 CEST | 1.1.1.1 | 192.168.2.7 | 0x4fe5 | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Aug 9, 2024 09:08:53.192420006 CEST | 1.1.1.1 | 192.168.2.7 | 0x7198 | No error (0) | 209.124.85.231 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49703 | 172.67.74.152 | 443 | 5680 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-08-09 07:08:48 UTC | 155 | OUT | |
2024-08-09 07:08:49 UTC | 211 | IN | |
2024-08-09 07:08:49 UTC | 11 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Aug 9, 2024 09:08:53.884090900 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 | 220-server.convergesolve.com ESMTP Exim 4.96.2 #2 Fri, 09 Aug 2024 03:08:53 -0400 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Aug 9, 2024 09:08:53.935537100 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 | 220-server.convergesolve.com ESMTP Exim 4.96.2 #2 Fri, 09 Aug 2024 03:08:53 -0400 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Aug 9, 2024 09:08:53.946594000 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 | EHLO 138727 |
Aug 9, 2024 09:08:54.060529947 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 | 250-server.convergesolve.com Hello 138727 [8.46.123.33] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Aug 9, 2024 09:08:54.074464083 CEST | 49704 | 587 | 192.168.2.7 | 209.124.85.231 | STARTTLS |
Aug 9, 2024 09:08:54.192979097 CEST | 587 | 49704 | 209.124.85.231 | 192.168.2.7 | 220 TLS go ahead |
Aug 9, 2024 09:08:56.288419962 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 | 220-server.convergesolve.com ESMTP Exim 4.96.2 #2 Fri, 09 Aug 2024 03:08:56 -0400 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Aug 9, 2024 09:08:56.288616896 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 | EHLO 138727 |
Aug 9, 2024 09:08:56.401511908 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 | 250-server.convergesolve.com Hello 138727 [8.46.123.33] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Aug 9, 2024 09:08:56.401743889 CEST | 49705 | 587 | 192.168.2.7 | 209.124.85.231 | STARTTLS |
Aug 9, 2024 09:08:56.518033028 CEST | 587 | 49705 | 209.124.85.231 | 192.168.2.7 | 220 TLS go ahead |
Aug 9, 2024 09:10:26.208992004 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 | 220-server.convergesolve.com ESMTP Exim 4.96.2 #2 Fri, 09 Aug 2024 03:10:26 -0400 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Aug 9, 2024 09:10:26.209558964 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 | EHLO 138727 |
Aug 9, 2024 09:10:26.322134018 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 | 250-server.convergesolve.com Hello 138727 [8.46.123.33] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Aug 9, 2024 09:10:26.323515892 CEST | 49714 | 587 | 192.168.2.7 | 209.124.85.231 | STARTTLS |
Aug 9, 2024 09:10:26.441826105 CEST | 587 | 49714 | 209.124.85.231 | 192.168.2.7 | 220 TLS go ahead |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 3 |
Start time: | 03:08:46 |
Start date: | 09/08/2024 |
Path: | C:\Users\user\Desktop\invoice727282_PDF..exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2e0000 |
File size: | 256'072 bytes |
MD5 hash: | 8A1B3F441A8F2DA1B6BB52359FA5694D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:08:46 |
Start date: | 09/08/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd10000 |
File size: | 56'368 bytes |
MD5 hash: | FDA8C8F2A4E100AFB14C13DFCBCAB2D2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 12 |
Start time: | 03:09:01 |
Start date: | 09/08/2024 |
Path: | C:\Users\user\AppData\Roaming\QGwHqTR\QGwHqTR.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x340000 |
File size: | 56'368 bytes |
MD5 hash: | FDA8C8F2A4E100AFB14C13DFCBCAB2D2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 13 |
Start time: | 03:09:02 |
Start date: | 09/08/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 15 |
Start time: | 04:14:57 |
Start date: | 09/08/2024 |
Path: | C:\Users\user\AppData\Roaming\QGwHqTR\QGwHqTR.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x500000 |
File size: | 56'368 bytes |
MD5 hash: | FDA8C8F2A4E100AFB14C13DFCBCAB2D2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 16 |
Start time: | 04:14:58 |
Start date: | 09/08/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 23.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 17 |
Total number of Limit Nodes: | 2 |
Graph
Function 00930A98 Relevance: 1.8, Strings: 1, Instructions: 530COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009327E1 Relevance: 1.8, Strings: 1, Instructions: 500COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009365F8 Relevance: 1.6, APIs: 1, Instructions: 106threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00936738 Relevance: 1.6, APIs: 1, Instructions: 104COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00936740 Relevance: 1.6, APIs: 1, Instructions: 100COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00936852 Relevance: 1.6, APIs: 1, Instructions: 98memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00936858 Relevance: 1.6, APIs: 1, Instructions: 95memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00936600 Relevance: 1.6, APIs: 1, Instructions: 88threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00936B68 Relevance: 1.6, APIs: 1, Instructions: 79threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00936B70 Relevance: 1.6, APIs: 1, Instructions: 66threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950A60 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950A80 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950414 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950560 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950218 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009509B4 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950A0C Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0095095C Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009503C4 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950430 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950A28 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009509D0 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950238 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950978 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00950580 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009503E0 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00932070 Relevance: 1.6, Strings: 1, Instructions: 385COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00932061 Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 12.8% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 1% |
Total number of Nodes: | 293 |
Total number of Limit Nodes: | 32 |
Graph
Function 06A47400 Relevance: 9.0, Strings: 6, Instructions: 1528COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4CF48 Relevance: 3.0, Strings: 2, Instructions: 480COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4AEB8 Relevance: 2.9, Strings: 2, Instructions: 418COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A419E0 Relevance: 2.8, Instructions: 2840COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A44DF8 Relevance: 2.3, Instructions: 2314COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A2A730 Relevance: 1.9, APIs: 1, Instructions: 396COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695E780 Relevance: 1.6, APIs: 1, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4B7B0 Relevance: .8, Instructions: 821COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A41220 Relevance: .4, Instructions: 406COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4E318 Relevance: 5.2, Strings: 4, Instructions: 231COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A49D18 Relevance: 3.9, Strings: 3, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4E30A Relevance: 2.7, Strings: 2, Instructions: 180COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A49D08 Relevance: 2.6, Strings: 2, Instructions: 140COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAABE1 Relevance: 1.7, APIs: 1, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4A958 Relevance: 1.7, Strings: 1, Instructions: 431COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAAC43 Relevance: 1.7, APIs: 1, Instructions: 171COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695BED2 Relevance: 1.6, APIs: 1, Instructions: 145COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06955970 Relevance: 1.6, APIs: 1, Instructions: 130COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695BF30 Relevance: 1.6, APIs: 1, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695B2D4 Relevance: 1.6, APIs: 1, Instructions: 97COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAC1DB Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAC1E0 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAC14C Relevance: 1.6, APIs: 1, Instructions: 62threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FADAB0 Relevance: 1.6, APIs: 1, Instructions: 61threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAA814 Relevance: 1.6, APIs: 1, Instructions: 60windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695B310 Relevance: 1.6, APIs: 1, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAE249 Relevance: 1.6, APIs: 1, Instructions: 59windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FADCFC Relevance: 1.6, APIs: 1, Instructions: 59fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAE9D9 Relevance: 1.6, APIs: 1, Instructions: 58fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695F7E0 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695517C Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A26BD0 Relevance: 1.6, APIs: 1, Instructions: 55libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A29B70 Relevance: 1.6, APIs: 1, Instructions: 55windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A258F0 Relevance: 1.6, APIs: 1, Instructions: 55libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A2ACF0 Relevance: 1.6, APIs: 1, Instructions: 53windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FABB7F Relevance: 1.6, APIs: 1, Instructions: 50COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695B7F8 Relevance: 1.6, APIs: 1, Instructions: 50COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695B800 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAC0E0 Relevance: 1.5, APIs: 1, Instructions: 46comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695B32C Relevance: 1.5, APIs: 1, Instructions: 46COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0695D379 Relevance: 1.5, APIs: 1, Instructions: 46COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A29BBC Relevance: 1.5, APIs: 1, Instructions: 46windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FACC00 Relevance: 1.5, APIs: 1, Instructions: 45comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A2B498 Relevance: 1.5, APIs: 1, Instructions: 45windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAC2A1 Relevance: 1.5, APIs: 1, Instructions: 41COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FAC2A3 Relevance: 1.5, APIs: 1, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A47265 Relevance: 1.4, Strings: 1, Instructions: 118COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A47278 Relevance: 1.4, Strings: 1, Instructions: 105COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A493DF Relevance: .3, Instructions: 288COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4120C Relevance: .2, Instructions: 243COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4976C Relevance: .2, Instructions: 243COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4B3B0 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A41740 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A49460 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A49780 Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4A783 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4A5D0 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48C50 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A47129 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48FA7 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A47138 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48AE0 Relevance: .1, Instructions: 85COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A410F8 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48D60 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48C60 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A41108 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A40FF8 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0131D118 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0131D200 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A41008 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4BEE0 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48D70 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48A2A Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4F4C8 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48210 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0131D113 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48A30 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0131D1FB Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A48FB8 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4F4D8 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4B631 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4B640 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4C868 Relevance: 13.0, Strings: 10, Instructions: 468COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4FAF8 Relevance: 10.2, Strings: 8, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4C268 Relevance: 7.9, Strings: 6, Instructions: 405COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4D5A0 Relevance: 5.3, Strings: 4, Instructions: 282COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06A4D9B8 Relevance: 5.2, Strings: 4, Instructions: 168COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA0C20 Relevance: 1.4, Strings: 1, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA0D58 Relevance: 1.3, Strings: 1, Instructions: 30COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA0D68 Relevance: 1.3, Strings: 1, Instructions: 24COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA06E0 Relevance: .3, Instructions: 320COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA0848 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA08A8 Relevance: .1, Instructions: 118COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA092D Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DA0D21 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60C23 Relevance: 1.3, Strings: 1, Instructions: 86COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60D58 Relevance: 1.3, Strings: 1, Instructions: 38COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60D68 Relevance: 1.3, Strings: 1, Instructions: 24COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D606E0 Relevance: .3, Instructions: 309COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60848 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D608A8 Relevance: .1, Instructions: 118COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D6092D Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60DB7 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60D21 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|