Windows
Analysis Report
SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe (PID: 2196 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Win32.Malw are-gen.17 468.9520.e xe" MD5: 6824B9059B9C6F285F3C6CAF2EE19ECC) - mXfByV.exe (PID: 5008 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\mXfByV. exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96) - WerFault.exe (PID: 2448 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 008 -s 153 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Bdaejec | Yara detected Bdaejec | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-11T10:32:00.466633+0200 | 2807908 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49710 | 44.221.84.105 | 799 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-11T10:31:59.975702+0200 | 2838522 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 64889 | 1.1.1.1 | 53 | UDP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | URL Reputation: | ||
Source: | URL Reputation: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: |
Spreading |
---|
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior |
Source: | Code function: | 2_2_006429E2 |
Source: | Code function: | 2_2_00642B8C |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 2_2_00641099 |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: | memstr_bb1dc225-0 |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 2_2_00646076 | |
Source: | Code function: | 2_2_00646D00 |
Source: | Dropped File: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 2_2_0064119F |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 2_2_0064170E | |
Source: | Code function: | 2_2_0064600D | |
Source: | Code function: | 2_2_00646425 | |
Source: | Code function: | 2_2_00642DAB |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior | ||
Source: | System file written: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Network traffic detected: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Binary or memory string: |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Evasive API call chain: | graph_2-1068 |
Source: | Code function: | 2_2_00641718 |
Source: | Code function: | 2_2_006429E2 |
Source: | Code function: | 2_2_00642B8C |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_2-1042 |
Source: | Process information queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Code function: | 2_2_00641718 |
Source: | Code function: | 2_2_0064139F |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Access Token Manipulation | 1 Masquerading | 1 Credential API Hooking | 11 System Time Discovery | 1 Taint Shared Content | 1 Credential API Hooking | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 2 Process Injection | 1 Access Token Manipulation | 11 Input Capture | 211 Security Software Discovery | Remote Desktop Protocol | 11 Input Capture | 11 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 2 Process Injection | Security Account Manager | 2 Process Discovery | SMB/Windows Admin Shares | 1 Archive Collected Data | 2 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | 3 File and Directory Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 12 Software Packing | LSA Secrets | 3 System Information Discovery | SSH | Keylogging | 12 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
55% | ReversingLabs | Win32.Trojan.Strictor | ||
50% | Virustotal | Browse | ||
100% | Avira | TR/Black.Gen2 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | W32/Jadtre.B | ||
100% | Avira | W32/Jadtre.B | ||
100% | Avira | TR/Dldr.Small.Z.haljq | ||
100% | Avira | W32/Jadtre.B | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | ReversingLabs | Win32.Trojan.Skeeyah | ||
96% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
11% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
100% | URL Reputation | malware | ||
100% | URL Reputation | malware | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Virustotal | Browse | ||
100% | Avira URL Cloud | phishing | ||
9% | Virustotal | Browse | ||
12% | Virustotal | Browse | ||
9% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ddos.dnsnb8.net | 44.221.84.105 | true | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
44.221.84.105 | ddos.dnsnb8.net | United States | 14618 | AMAZON-AESUS | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1509229 |
Start date and time: | 2024-09-11 10:31:06 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe |
Detection: | MAL |
Classification: | mal100.spre.troj.evad.winEXE@5/11@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.21
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, tile-service.weather.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, PID 2196 because there are no executed function
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
04:32:06 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
44.221.84.105 | Get hash | malicious | ADWIND, Lokibot, Ramnit, Sality | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Simda Stealer | Browse |
| ||
Get hash | malicious | Simda Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ddos.dnsnb8.net | Get hash | malicious | Bdaejec | Browse |
| |
Get hash | malicious | Bdaejec, Stealc | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec, Sality | Browse |
| ||
Get hash | malicious | Babuk, Bdaejec, Djvu | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-AESUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | ADWIND, Lokibot, Ramnit, Sality | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\mXfByV.exe | Get hash | malicious | Bdaejec | Browse | ||
Get hash | malicious | Bdaejec | Browse | |||
Get hash | malicious | Bdaejec | Browse | |||
Get hash | malicious | Bdaejec, Sality | Browse | |||
Get hash | malicious | Bdaejec, Sality | Browse | |||
Get hash | malicious | Bdaejec, Sality | Browse | |||
Get hash | malicious | Babadeda, Bdaejec, Neshta | Browse | |||
Get hash | malicious | Babadeda, Bdaejec, Neshta | Browse | |||
Get hash | malicious | Bdaejec | Browse | |||
Get hash | malicious | Bdaejec, GhostRat, Nitol, Young Lotus | Browse |
Process: | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19456 |
Entropy (8bit): | 6.589789589884768 |
Encrypted: | false |
SSDEEP: | 384:1FaSnXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:bpQGPL4vzZq2o9W7GsxBbPr |
MD5: | A753D290B5F137C5E14F2C0FFA430DBA |
SHA1: | 15A954A280F95584F19BB242CB305AE1E17563C3 |
SHA-256: | B20E35DAAE001A1DCE2512FC5300313F27C9179DD43F864F7E195B58E7A8667A |
SHA-512: | F5DBA2283B80E1CF106D3CC2E4E0C4FE6FD618A768E0ED6E3AC0D4A48F352B25E57DFC8F04F0EF38ABDB9CC0C2753C92F8EDEBD954C0C12FEE35D53275375D6F |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
File Type: | |
Category: | modified |
Size (bytes): | 2389504 |
Entropy (8bit): | 6.731347692696707 |
Encrypted: | false |
SSDEEP: | 49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf |
MD5: | D3947937BD08ABD3E79D5C9532B77968 |
SHA1: | 2BB33A367ED584FF60253A9A9805A4A4947E0CA9 |
SHA-256: | C1723D1C47E41F293E7959801A089CA09E3E3697670B5BE6D7075CE64A0EB40C |
SHA-512: | 7D6C8DBDC28F7C2F771AA80E8824697DFD24C5C65A7A5036F91F6BACD48D5EE1AD46163F278FED1A69B2FC55B989882143BA89C4ADF74B632D54EBF0CC2F8CCE |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 31744 |
Entropy (8bit): | 6.365993044865997 |
Encrypted: | false |
SSDEEP: | 768:uWQ3655Kv1X/qY1MSdV9QGPL4vzZq2o9W7GsxBbPr:uHqaNrFdVKGCq2iW7z |
MD5: | F56AB5FE7D06146EDCFFF516B39ED9C4 |
SHA1: | 45564D45C08D0A0B7C0D98EEA9848F6BC5155385 |
SHA-256: | D9E8CB1FF172D9E11D22BF512567583FF00B7C17A0F568DD08C53598BE056F49 |
SHA-512: | 3A947238ED99538D468C1885544E19571565AD26FF792B7959465C381BF79E3566348723FD8B0ECBF90941F41A2CAF786592C607C2E82AD91B9E9F31E584D6F0 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_mXfByV.exe_919bb28fed6369b5f15fcb8611a4c2ec66970_160339ea_7b1e5d23-ca14-442c-a24d-bd558aa78ac0\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9883072157444156 |
Encrypted: | false |
SSDEEP: | 96:CHpxFEcl9PsbhnJ7afzQXIDcQwc6gcEocw3f+HbHg/5ksS/YyNl1zWDUMsxzLOyF:CJx+cnPq0OkSoj8/AmzuiFYZ24IO8RQ |
MD5: | 7364782E8723ED51EB2EB948EF77110B |
SHA1: | 3FB3E072558308C63FA99A364E5DA3B2B69A08C6 |
SHA-256: | 1BD2F3A51A9C5485D90F7087BD87735D50E957297FC16B701A19BEDA9C50FB6F |
SHA-512: | E9771C50D8F7AB583D0EDC85F1458E32A015DF44FBE71B12C5EB0287FA6D4A04F00E3ECF5B1428C5863CC5672037AB6ADD56EED591ED9A63036B8411A79D05BF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 160792 |
Entropy (8bit): | 1.8652145089301015 |
Encrypted: | false |
SSDEEP: | 768:wnI9uC4eB93FrsQrqw87Dl0SI4V0tSDN/:sIsCpFsQmpDl00kON/ |
MD5: | 95997C0E8495D92607AE40643A8EE906 |
SHA1: | 690A39CFDD66C5E08BFB9AE7F65DE4F0C6D4C10A |
SHA-256: | E37B409054E972937AD4A76501C31B94EE76C721B8DCEAF620BE3EC13473792A |
SHA-512: | DFC3E766BA6FF8471658990843DC8111E80CBF85848AA4A56092AF5F7A11102D5D396FE8FA4180CD1E0C16DB9CD51CA42CA1B682A393DE0073D53F883C47A662 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6268 |
Entropy (8bit): | 3.720973423639949 |
Encrypted: | false |
SSDEEP: | 96:RSIU6o7wVetbKE6zLsYmBvtQWLZ5aMQUG89bVIsfCnm:R6l7wVeJKE6kYmJG8pDG89bVIsfCnm |
MD5: | 6F25A9D7915CE13FDE39FEAFCE66554B |
SHA1: | 4E84CEC28BF8D7644554D5297486FB2E50E34320 |
SHA-256: | C13F7EB563A1A7E9AC389781387FF09EDA67D6346990E1762B5C9D3AF857A592 |
SHA-512: | 9A3CDFCB7E860A16B8C4E48F8F4B7719D9748B0C326E15EB48E70B40BE9CCD61FDF4059B4813F7AE4D1CA9E45E75F31EFAED9C729786835BD32A8D20A4786D4A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4551 |
Entropy (8bit): | 4.45364063961648 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsiJg77aI9x2WpW8VYfaYm8M4J4jFUm+q8cdUvD6gRfd:uIjfwI7TX7VCJS/UvOgRfd |
MD5: | 01A038703E171E14F019E715CC95D2D3 |
SHA1: | A000B99146B0F9AD1E380137E9C66455220324F1 |
SHA-256: | 1B4493BE345E12D94225AF3269F9C891F2CA9FA21EDE74DDAB63391100D2DC5F |
SHA-512: | 965DC77D6C0998D7C981819E40A245641C35D02CE58A92749C9D107011721ACEF3794FE13896C66FFFFE76597373868068D8D2B96C0F530C5B7211FFAEC2F2C4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 1.5 |
Encrypted: | false |
SSDEEP: | 3:Nv:9 |
MD5: | D3B07384D113EDEC49EAA6238AD5FF00 |
SHA1: | F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15 |
SHA-256: | B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C |
SHA-512: | 0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 1.5 |
Encrypted: | false |
SSDEEP: | 3:Nv:9 |
MD5: | D3B07384D113EDEC49EAA6238AD5FF00 |
SHA1: | F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15 |
SHA-256: | B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C |
SHA-512: | 0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15872 |
Entropy (8bit): | 7.031113762428177 |
Encrypted: | false |
SSDEEP: | 384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr |
MD5: | 56B2C3810DBA2E939A8BB9FA36D3CF96 |
SHA1: | 99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC |
SHA-256: | 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07 |
SHA-512: | 27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.469001989449703 |
Encrypted: | false |
SSDEEP: | 6144:jzZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuN7jDH5Sk:fZHtBZWOKnMM6bFptj4 |
MD5: | 05AB553A4D136945501F414C2E0267D6 |
SHA1: | 03D5FFBFDE6149F154C1AF9B155DF99B9B08F106 |
SHA-256: | 3F90DD350C036731B1FADB9C1B79AF9378B80258B103A37452B9BF65E3641559 |
SHA-512: | 77B35367EED3813B00841D2D666FBC5A9FD349399F6114287A55C03E77679EBE63370F098AAE2B034A7708226452809E396619583EFC240783789171BF03EEF2 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.994384033112603 |
TrID: |
|
File name: | SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe |
File size: | 3'678'720 bytes |
MD5: | 6824b9059b9c6f285f3c6caf2ee19ecc |
SHA1: | 81e01ba0fe5279ad470cecbb287cb20aec28a13b |
SHA256: | 89926d7f0153f7258e706acad4ddfe3106bf4ee11fa711170b2133971022b56f |
SHA512: | b77047369d587ddb38ea8d50d12a5b1f10cb7da56cc6c15bb25930a9669cda65d037e7c51f3121333f2b461dff805557f4cf376f6152a89cc0292bf3c5e99ab3 |
SSDEEP: | 98304:Av9a5NA1EhlI30MPxbHVAk5vnx1r+7N9+Au2W2xrXMqvqDMk:Av4zkNPpVT7GbG2Wkrbhk |
TLSH: | B806330B30435D95E1DC213CD7EEAD352664BAFF551204FDFA4C4AE963A412AE827A33 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&b.OG..OG..OG...g..LG......CG.. 1..~G...HQ.MG..F?..ZG..OG...G..ya...G.. 1...G.. 1...G...X..NG.. 1..NG.. 1..NG..RichOG......... |
Icon Hash: | 638393a30b523248 |
Entrypoint: | 0xa1c92e |
Entrypoint Section: | .vmp2 |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x63C67E77 [Tue Jan 17 10:54:47 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 7c16214c092ec2dcfa6bfaab4ef74f0f |
Instruction |
---|
jmp 00007FCC6CE31FFAh |
mov al, byte ptr [000000DFh] |
add byte ptr [eax], al |
add cl, ch |
adc edx, dword ptr [edi+44890032h] |
and eax, F6068B00h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x84ca6c | 0x168 | .vmp2 |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x97a000 | 0x10fe | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x979000 | 0x114 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x626000 | 0xd0 | .vmp2 |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x25cd16 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x25e000 | 0x275c6 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x286000 | 0xf50e0 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.vmp0 | 0x37c000 | 0x1290 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
+!i~u | 0x37e000 | 0x5000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.vmp1 | 0x383000 | 0x274068 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.vmp2 | 0x5f8000 | 0x380940 | 0x380a00 | d25d3a1c51d94ed87257b21815b90077 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x979000 | 0x114 | 0x200 | 0b17e0470b8dded571f1d14da359d4db | False | 0.4140625 | data | 2.6397875364567573 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x97a000 | 0x10fe | 0x1200 | 01a22eb9db3bcf4f46a1615b46310d7e | False | 0.7543402777777778 | data | 6.5866211706442135 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x97a0e8 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | Chinese | Taiwan | 0.8446162046908315 |
RT_GROUP_ICON | 0x97af90 | 0x14 | data | Chinese | Taiwan | 1.15 |
RT_MANIFEST | 0x97afa4 | 0x15a | ASCII text, with CRLF line terminators | English | United States | 0.5491329479768786 |
DLL | Import |
---|---|
IMM32.dll | ImmIsIME |
WS2_32.dll | gethostbyaddr |
KERNEL32.dll | GetVersionExA |
USER32.dll | CloseClipboard |
GDI32.dll | CreateFontIndirectA |
ole32.dll | CoInitialize |
WINMM.dll | waveOutGetVolume |
DDRAW.dll | DirectDrawCreate |
DSOUND.dll | |
COMDLG32.dll | ChooseColorA |
SHELL32.dll | SHGetPathFromIDListA |
WTSAPI32.dll | WTSSendMessageW |
KERNEL32.dll | GetCurrentProcess |
USER32.dll | CharUpperBuffW |
ADVAPI32.dll | RegQueryValueExA |
KERNEL32.dll | LocalAlloc, GetCurrentProcess, GetCurrentThread, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, GetLastError, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress |
ADVAPI32.dll | OpenSCManagerW, EnumServicesStatusExW, OpenServiceW, QueryServiceConfigW, CloseServiceHandle |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Chinese | Taiwan | |
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-11T10:31:59.975702+0200 | 2838522 | ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup | 1 | 192.168.2.6 | 64889 | 1.1.1.1 | 53 | UDP |
2024-09-11T10:32:00.466633+0200 | 2807908 | ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin | 1 | 192.168.2.6 | 49710 | 44.221.84.105 | 799 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2024 10:32:00.078910112 CEST | 49710 | 799 | 192.168.2.6 | 44.221.84.105 |
Sep 11, 2024 10:32:00.083893061 CEST | 799 | 49710 | 44.221.84.105 | 192.168.2.6 |
Sep 11, 2024 10:32:00.083987951 CEST | 49710 | 799 | 192.168.2.6 | 44.221.84.105 |
Sep 11, 2024 10:32:00.084156036 CEST | 49710 | 799 | 192.168.2.6 | 44.221.84.105 |
Sep 11, 2024 10:32:00.088951111 CEST | 799 | 49710 | 44.221.84.105 | 192.168.2.6 |
Sep 11, 2024 10:32:00.466561079 CEST | 799 | 49710 | 44.221.84.105 | 192.168.2.6 |
Sep 11, 2024 10:32:00.466592073 CEST | 799 | 49710 | 44.221.84.105 | 192.168.2.6 |
Sep 11, 2024 10:32:00.466633081 CEST | 49710 | 799 | 192.168.2.6 | 44.221.84.105 |
Sep 11, 2024 10:32:00.466662884 CEST | 49710 | 799 | 192.168.2.6 | 44.221.84.105 |
Sep 11, 2024 10:32:00.468745947 CEST | 49710 | 799 | 192.168.2.6 | 44.221.84.105 |
Sep 11, 2024 10:32:00.474230051 CEST | 799 | 49710 | 44.221.84.105 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2024 10:31:59.975702047 CEST | 64889 | 53 | 192.168.2.6 | 1.1.1.1 |
Sep 11, 2024 10:32:00.072731972 CEST | 53 | 64889 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 11, 2024 10:31:59.975702047 CEST | 192.168.2.6 | 1.1.1.1 | 0x4b85 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 11, 2024 10:32:00.072731972 CEST | 1.1.1.1 | 192.168.2.6 | 0x4b85 | No error (0) | 44.221.84.105 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49710 | 44.221.84.105 | 799 | 5008 | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 11, 2024 10:32:00.084156036 CEST | 288 | OUT |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:31:57 |
Start date: | 11/09/2024 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'678'720 bytes |
MD5 hash: | 6824B9059B9C6F285F3C6CAF2EE19ECC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 04:31:58 |
Start date: | 11/09/2024 |
Path: | C:\Users\user\AppData\Local\Temp\mXfByV.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x640000 |
File size: | 15'872 bytes |
MD5 hash: | 56B2C3810DBA2E939A8BB9FA36D3CF96 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 04:32:03 |
Start date: | 11/09/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x30000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 31.9% |
Dynamic/Decrypted Code Coverage: | 10.4% |
Signature Coverage: | 23.6% |
Total number of Nodes: | 297 |
Total number of Limit Nodes: | 12 |
Graph
Callgraph
Function 006429E2 Relevance: 31.6, APIs: 15, Strings: 3, Instructions: 128stringfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641099 Relevance: 22.8, APIs: 7, Strings: 6, Instructions: 74stringsleepprocessCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641718 Relevance: 14.1, APIs: 5, Strings: 3, Instructions: 65timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641E6E Relevance: 44.1, APIs: 20, Strings: 5, Instructions: 380fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641973 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 144filesleepmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006428B8 Relevance: 24.6, APIs: 9, Strings: 5, Instructions: 100stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641638 Relevance: 17.6, APIs: 6, Strings: 4, Instructions: 70stringsynchronizationthreadCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641000 Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 60fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00642C48 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 50threadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006414E1 Relevance: 4.6, APIs: 3, Instructions: 55COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641915 Relevance: 4.5, APIs: 3, Instructions: 41timeCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00646159 Relevance: 2.6, APIs: 2, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00646D00 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064239D Relevance: 56.2, APIs: 26, Strings: 6, Instructions: 239sleepfilestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064274A Relevance: 28.1, APIs: 9, Strings: 7, Instructions: 83fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641581 Relevance: 21.1, APIs: 7, Strings: 5, Instructions: 67filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064120E Relevance: 19.3, APIs: 8, Strings: 3, Instructions: 93librarymemoryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064189D Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 51processsynchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00642692 Relevance: 12.1, APIs: 8, Instructions: 64stringsynchronizationCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641B8A Relevance: 10.6, APIs: 5, Strings: 2, Instructions: 81stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641319 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 53libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00641DF6 Relevance: 7.5, APIs: 5, Instructions: 45stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064185B Relevance: 7.5, APIs: 5, Instructions: 31timeCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00646014 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 36libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|