Windows
Analysis Report
BnxBRWQWhy.exe
Overview
General Information
Sample name: | BnxBRWQWhy.exerenamed because original name is a hash value |
Original sample name: | ea6989e3a607d753377b05bae55140d8.exe |
Analysis ID: | 1525312 |
MD5: | ea6989e3a607d753377b05bae55140d8 |
SHA1: | 5c67ca11e96875c9beb0d320170e000698a65148 |
SHA256: | 9e857e6656ff0d6da789faa05f9fb49c323bdcea03b0b7887bbac919122f32fb |
Tags: | exeStealcuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- BnxBRWQWhy.exe (PID: 6936 cmdline:
"C:\Users\ user\Deskt op\BnxBRWQ Why.exe" MD5: EA6989E3A607D753377B05BAE55140D8)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Stealc | Stealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
{"C2 url": "http://193.233.112.44/383ccd496f3c5eee.php", "Botnet": "soft"}
{"C2 url": "https://t.me/hwlflcqshvwp/383ccd496f3c5eee.php", "Botnet": "soft"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Stealc_1 | Yara detected Stealc | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-04T00:57:00.721287+0200 | 2044243 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49716 | 193.233.112.44 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 0_2_0073C820 | |
Source: | Code function: | 0_2_00737240 | |
Source: | Code function: | 0_2_00739AC0 | |
Source: | Code function: | 0_2_00748EA0 | |
Source: | Code function: | 0_2_00739B60 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0073E430 | |
Source: | Code function: | 0_2_007438B0 | |
Source: | Code function: | 0_2_00744570 | |
Source: | Code function: | 0_2_0073ED20 | |
Source: | Code function: | 0_2_00744910 | |
Source: | Code function: | 0_2_0073BE70 | |
Source: | Code function: | 0_2_0073DE10 | |
Source: | Code function: | 0_2_007316D0 | |
Source: | Code function: | 0_2_0073F6B0 | |
Source: | Code function: | 0_2_00743EA0 | |
Source: | Code function: | 0_2_0073DA80 |
Networking |
---|
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00734880 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Static PE information: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00749600 |
Source: | Code function: | 0_2_00743720 |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Code function: | 0_2_00749860 |
Source: | Static PE information: |
Source: | Code function: | 0_2_0074B048 |
Source: | Code function: | 0_2_00749860 |
Malware Analysis System Evasion |
---|
Source: | Evasive API call chain: | graph_0-12416 |
Source: | Code function: | 0_2_0073E430 | |
Source: | Code function: | 0_2_007438B0 | |
Source: | Code function: | 0_2_00744570 | |
Source: | Code function: | 0_2_0073ED20 | |
Source: | Code function: | 0_2_00744910 | |
Source: | Code function: | 0_2_0073BE70 | |
Source: | Code function: | 0_2_0073DE10 | |
Source: | Code function: | 0_2_007316D0 | |
Source: | Code function: | 0_2_0073F6B0 | |
Source: | Code function: | 0_2_00743EA0 | |
Source: | Code function: | 0_2_0073DA80 |
Source: | Code function: | 0_2_00731160 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-12401 | ||
Source: | API call chain: | graph_0-12404 | ||
Source: | API call chain: | graph_0-12423 | ||
Source: | API call chain: | graph_0-12415 | ||
Source: | API call chain: | graph_0-12444 | ||
Source: | API call chain: | graph_0-12243 |
Source: | Code function: | 0_2_0074AD48 |
Source: | Code function: | 0_2_007345C0 |
Source: | Code function: | 0_2_00749860 |
Source: | Code function: | 0_2_00749750 |
Source: | Code function: | 0_2_00747850 |
Source: | Code function: | 0_2_0074AD48 | |
Source: | Code function: | 0_2_0074CEEA | |
Source: | Code function: | 0_2_0074B33A |
Source: | Memory protected: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_00749600 |
Source: | Code function: | 0_2_00747B90 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00746920 |
Source: | Code function: | 0_2_00747850 |
Source: | Code function: | 0_2_00747A30 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Native API | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 2 System Time Discovery | Remote Services | Data from Local System | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 21 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Disable or Modify Tools | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Process Injection | NTDS | 11 Process Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 Account Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | 1 System Owner/User Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 1 File and Directory Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 123 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Avira | TR/Crypt.XPACK.Gen7 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
t.me | 149.154.167.99 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
true | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
true | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
91.214.78.145 | unknown | Russian Federation | 49373 | FOTONTELECOM-STUB-ASFOTONTELECOMRU | false | |
193.233.112.44 | unknown | Russian Federation | 20549 | FREE-MPEIRU | true | |
149.154.167.99 | t.me | United Kingdom | 62041 | TELEGRAMRU | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1525312 |
Start date and time: | 2024-10-04 00:56:06 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 10s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | BnxBRWQWhy.exerenamed because original name is a hash value |
Original Sample Name: | ea6989e3a607d753377b05bae55140d8.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/0@1/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: BnxBRWQWhy.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
91.214.78.145 | Get hash | malicious | Stealc, Vidar | Browse |
| |
193.233.112.44 | Get hash | malicious | Stealc, Vidar | Browse |
| |
149.154.167.99 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cinoshi Stealer | Browse |
| ||
Get hash | malicious | Gurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
t.me | Get hash | malicious | Stealc, Vidar | Browse |
| |
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | Stealc, Vidar | Browse |
| |
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
FOTONTELECOM-STUB-ASFOTONTELECOMRU | Get hash | malicious | Stealc, Vidar | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
FREE-MPEIRU | Get hash | malicious | Stealc, Vidar | Browse |
| |
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Phisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | RDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, Xmrig | Browse |
| |
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 6.408555467669457 |
TrID: |
|
File name: | BnxBRWQWhy.exe |
File size: | 336'040 bytes |
MD5: | ea6989e3a607d753377b05bae55140d8 |
SHA1: | 5c67ca11e96875c9beb0d320170e000698a65148 |
SHA256: | 9e857e6656ff0d6da789faa05f9fb49c323bdcea03b0b7887bbac919122f32fb |
SHA512: | 80b021d768456c797e8ff1e44f6e1c4699705917cb4b735d1286e470251c279cf4273fc0ff8360e77142bdec02e5213aa251a0cedfbb1bc315810ea89f32e1c2 |
SSDEEP: | 6144:gihi8LYtUokCulxMfpbLve/NlHWTAFQnE7w+Uw3NKR9hU/W93+z27:/UtUoH3RvA6EFO4wx8KRF93+i7 |
TLSH: | 42646C32F65018BDE4A2457C95DE5F299BB978320310CEDB53D00A851FE22F5ED39A2B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........C..............X.......m.......Y.......p.....y.........`...............\.......n.....Rich............PE..L...3..f........... |
Icon Hash: | 2f232d67b7934633 |
Entrypoint: | 0x4169f0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66FE8833 [Thu Oct 3 12:04:03 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 8e9e6de8c6aa184371108e1074479bb3 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 88F0356B1045C86B3BE429E369E41C0B |
Thumbprint SHA-1: | 22C7A21648690E1B610F1E964AFB3044EAE24335 |
Thumbprint SHA-256: | 8C5E3683E3D73A2E9C9452FC91757931A5333EAE9670BAF00874D3C8D6D6A52A |
Serial: | 015A6BEC4D7F549FE525C852DF670E13 |
Instruction |
---|
push ebp |
mov ebp, esp |
sub esp, 4Ch |
call 00007FB404BD07EAh |
call 00007FB404BE7DE5h |
push 00420AEFh |
lea ecx, dword ptr [ebp-0Ch] |
call 00007FB404BE8CB8h |
call 00007FB404BCF743h |
call 00007FB404BCF6CEh |
call 00007FB404BCF679h |
call 00007FB404BCF784h |
call 00007FB404BE4CCFh |
call 00007FB404BCF6EAh |
call 00007FB404BE5DA5h |
push eax |
lea eax, dword ptr [ebp-4Ch] |
push eax |
push 00421110h |
lea ecx, dword ptr [ebp-40h] |
push ecx |
call 00007FB404BE5E22h |
push eax |
lea edx, dword ptr [ebp-34h] |
push edx |
push 0042110Ch |
lea eax, dword ptr [ebp-28h] |
push eax |
mov ecx, dword ptr [0064A540h] |
push ecx |
lea edx, dword ptr [ebp-1Ch] |
push edx |
lea ecx, dword ptr [ebp-0Ch] |
call 00007FB404BE8ED1h |
mov ecx, eax |
call 00007FB404BE8ECAh |
mov ecx, eax |
call 00007FB404BE8EC3h |
mov ecx, eax |
call 00007FB404BE8EBCh |
mov ecx, eax |
call 00007FB404BE8EB5h |
push eax |
lea ecx, dword ptr [ebp-0Ch] |
call 00007FB404BE8D9Ch |
lea ecx, dword ptr [ebp-4Ch] |
call 00007FB404BE8CF4h |
lea ecx, dword ptr [ebp-40h] |
call 00007FB404BE8CECh |
lea ecx, dword ptr [ebp-34h] |
call 00007FB404BE8CE4h |
lea ecx, dword ptr [ebp-28h] |
call 00007FB404BE8CDCh |
lea ecx, dword ptr [ebp-1Ch] |
call 00007FB404BE8CD4h |
mov eax, 00000001h |
test eax, eax |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2aa88 | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x261000 | 0x292a | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x4f600 | 0x2aa8 | .data |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x25c000 | 0x24e0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1e000 | 0x104 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1cc8f | 0x1ce00 | 772877cbef91323cce1e5e6fd7751dfb | False | 0.468259604978355 | Matlab v4 mat-file (little endian) \352\316A, numeric, rows 4316256, columns 0 | 6.091301719361258 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x1e000 | 0xcfec | 0xd000 | b2323904f62b167dba799c7c680521a5 | False | 0.5270244891826923 | data | 6.652181615943377 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x2b000 | 0x2303a4 | 0x1e400 | 47130f1bd451e62a6f3377958ec20b2f | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x25c000 | 0x459e | 0x4600 | 8ab3c7ccd47f8b4178413c498003e08e | False | 0.4401227678571429 | data | 4.493567457805053 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x261000 | 0x292a | 0x2a00 | 5f69202e3e076ee40a63c6506aad42d5 | False | 0.34337797619047616 | data | 4.70793889785315 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x2611a0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 0, 16 important colors | 0.6216216216216216 | ||
RT_ICON | 0x2612c8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0, 256 important colors | 0.5794797687861272 | ||
RT_ICON | 0x261830 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 0, 16 important colors | 0.5080645161290323 | ||
RT_ICON | 0x261b18 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0, 256 important colors | 0.5446750902527075 | ||
RT_ICON | 0x2623c0 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 0 | 0.3621951219512195 | ||
RT_ICON | 0x262a28 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | 0.4224413646055437 | ||
RT_GROUP_ICON | 0x2638d0 | 0x5a | data | 0.7333333333333333 |
DLL | Import |
---|---|
msvcrt.dll | strncpy, ??_V@YAXPAX@Z, memchr, ??_U@YAPAXI@Z, strtok, atexit, strtok_s, strcpy_s, vsprintf_s, memmove, strlen, malloc, free, memcmp, ??2@YAPAXI@Z, memset, memcpy, __CxxFrameHandler3 |
KERNEL32.dll | GetCurrentProcess, RaiseException, GetStringTypeW, MultiByteToWideChar, LCMapStringW, IsValidCodePage, GetOEMCP, lstrlenA, HeapAlloc, GetProcessHeap, VirtualProtect, WaitForSingleObject, CreateProcessA, lstrcatA, VirtualQueryEx, OpenProcess, ReadProcessMemory, WriteFile, GetACP, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, EncodePointer, DecodePointer, TerminateProcess, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, EnterCriticalSection, RtlUnwind, GetProcAddress, GetModuleHandleW, ExitProcess, Sleep, GetStdHandle, GetModuleFileNameW, GetLastError, LoadLibraryW, TlsGetValue, TlsSetValue, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, WideCharToMultiByte |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-04T00:57:00.721287+0200 | 2044243 | ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in | 1 | 192.168.2.6 | 49716 | 193.233.112.44 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 4, 2024 00:56:56.250982046 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:56.251017094 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:56.251127958 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:56.264940977 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:56.264956951 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:56.906230927 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:56.907191992 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.535132885 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.535161018 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.535439968 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.535501003 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.539289951 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.579402924 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.726885080 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.726902008 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.726941109 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.726955891 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.726963043 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.726999044 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.727049112 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.736054897 CEST | 49714 | 443 | 192.168.2.6 | 149.154.167.99 |
Oct 4, 2024 00:56:57.736068964 CEST | 443 | 49714 | 149.154.167.99 | 192.168.2.6 |
Oct 4, 2024 00:56:57.754158020 CEST | 49715 | 80 | 192.168.2.6 | 91.214.78.145 |
Oct 4, 2024 00:56:57.759234905 CEST | 80 | 49715 | 91.214.78.145 | 192.168.2.6 |
Oct 4, 2024 00:56:57.759413958 CEST | 49715 | 80 | 192.168.2.6 | 91.214.78.145 |
Oct 4, 2024 00:56:57.759588003 CEST | 49715 | 80 | 192.168.2.6 | 91.214.78.145 |
Oct 4, 2024 00:56:57.764365911 CEST | 80 | 49715 | 91.214.78.145 | 192.168.2.6 |
Oct 4, 2024 00:56:59.464976072 CEST | 80 | 49715 | 91.214.78.145 | 192.168.2.6 |
Oct 4, 2024 00:56:59.465089083 CEST | 49715 | 80 | 192.168.2.6 | 91.214.78.145 |
Oct 4, 2024 00:56:59.465727091 CEST | 49715 | 80 | 192.168.2.6 | 91.214.78.145 |
Oct 4, 2024 00:56:59.470124006 CEST | 49716 | 80 | 192.168.2.6 | 193.233.112.44 |
Oct 4, 2024 00:56:59.471800089 CEST | 80 | 49715 | 91.214.78.145 | 192.168.2.6 |
Oct 4, 2024 00:56:59.476260900 CEST | 80 | 49716 | 193.233.112.44 | 192.168.2.6 |
Oct 4, 2024 00:56:59.476358891 CEST | 49716 | 80 | 192.168.2.6 | 193.233.112.44 |
Oct 4, 2024 00:56:59.476568937 CEST | 49716 | 80 | 192.168.2.6 | 193.233.112.44 |
Oct 4, 2024 00:56:59.482949018 CEST | 80 | 49716 | 193.233.112.44 | 192.168.2.6 |
Oct 4, 2024 00:57:00.305043936 CEST | 80 | 49716 | 193.233.112.44 | 192.168.2.6 |
Oct 4, 2024 00:57:00.305114985 CEST | 49716 | 80 | 192.168.2.6 | 193.233.112.44 |
Oct 4, 2024 00:57:00.328989029 CEST | 49716 | 80 | 192.168.2.6 | 193.233.112.44 |
Oct 4, 2024 00:57:00.335839987 CEST | 80 | 49716 | 193.233.112.44 | 192.168.2.6 |
Oct 4, 2024 00:57:00.721211910 CEST | 80 | 49716 | 193.233.112.44 | 192.168.2.6 |
Oct 4, 2024 00:57:00.721287012 CEST | 49716 | 80 | 192.168.2.6 | 193.233.112.44 |
Oct 4, 2024 00:57:01.832484961 CEST | 49716 | 80 | 192.168.2.6 | 193.233.112.44 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 4, 2024 00:56:56.237881899 CEST | 60700 | 53 | 192.168.2.6 | 1.1.1.1 |
Oct 4, 2024 00:56:56.246144056 CEST | 53 | 60700 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 4, 2024 00:56:56.237881899 CEST | 192.168.2.6 | 1.1.1.1 | 0x675d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 4, 2024 00:56:56.246144056 CEST | 1.1.1.1 | 192.168.2.6 | 0x675d | No error (0) | 149.154.167.99 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49715 | 91.214.78.145 | 80 | 6936 | C:\Users\user\Desktop\BnxBRWQWhy.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 4, 2024 00:56:57.759588003 CEST | 88 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49716 | 193.233.112.44 | 80 | 6936 | C:\Users\user\Desktop\BnxBRWQWhy.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 4, 2024 00:56:59.476568937 CEST | 89 | OUT | |
Oct 4, 2024 00:57:00.305043936 CEST | 170 | IN | |
Oct 4, 2024 00:57:00.328989029 CEST | 412 | OUT | |
Oct 4, 2024 00:57:00.721211910 CEST | 178 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49714 | 149.154.167.99 | 443 | 6936 | C:\Users\user\Desktop\BnxBRWQWhy.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-03 22:56:57 UTC | 91 | OUT | |
2024-10-03 22:56:57 UTC | 511 | IN | |
2024-10-03 22:56:57 UTC | 12415 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 18:56:54 |
Start date: | 03/10/2024 |
Path: | C:\Users\user\Desktop\BnxBRWQWhy.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x730000 |
File size: | 336'040 bytes |
MD5 hash: | EA6989E3A607D753377B05BAE55140D8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 13% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 9.8% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 26 |
Graph
Function 007345C0 Relevance: 112.1, APIs: 34, Strings: 30, Instructions: 114stringmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00749860 Relevance: 61.5, APIs: 33, Strings: 2, Instructions: 212libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00734880 Relevance: 28.5, APIs: 11, Strings: 5, Instructions: 479networkstringfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00747850 Relevance: 4.5, APIs: 3, Instructions: 36memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00731160 Relevance: 3.0, APIs: 2, Instructions: 15COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00749C10 Relevance: 203.7, APIs: 112, Strings: 4, Instructions: 684libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00736280 Relevance: 24.7, APIs: 11, Strings: 3, Instructions: 191networkfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007417A0 Relevance: 24.7, APIs: 13, Strings: 1, Instructions: 160stringCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00745510 Relevance: 23.1, APIs: 7, Strings: 6, Instructions: 383sleepCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007452C0 Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 138stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00747500 Relevance: 14.1, APIs: 5, Strings: 3, Instructions: 106memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007469F0 Relevance: 10.6, APIs: 7, Instructions: 89sleepCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007347B0 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 60stringnetworkCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00746AF3 Relevance: 6.0, APIs: 4, Instructions: 30sleepCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007478E0 Relevance: 4.5, APIs: 3, Instructions: 40memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00731110 Relevance: 4.5, APIs: 3, Instructions: 21memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007310A0 Relevance: 2.5, APIs: 2, Instructions: 41memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00731190 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007438B0 Relevance: 51.0, APIs: 21, Strings: 8, Instructions: 250filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073BE70 Relevance: 40.9, APIs: 17, Strings: 6, Instructions: 675fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00744910 Relevance: 40.4, APIs: 18, Strings: 5, Instructions: 172fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00744570 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 137stringmemoryfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00743EA0 Relevance: 26.4, APIs: 12, Strings: 3, Instructions: 133fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073ED20 Relevance: 21.4, APIs: 9, Strings: 3, Instructions: 369fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073DE10 Relevance: 19.6, APIs: 7, Strings: 4, Instructions: 370fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073F6B0 Relevance: 19.5, APIs: 8, Strings: 3, Instructions: 275fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073DA80 Relevance: 19.5, APIs: 9, Strings: 2, Instructions: 255fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007316D0 Relevance: 18.0, APIs: 7, Strings: 3, Instructions: 492fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073E430 Relevance: 14.5, APIs: 4, Strings: 4, Instructions: 514fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00747B90 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 114memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073C820 Relevance: 10.6, APIs: 7, Instructions: 93stringencryptionCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00746920 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 67timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00739AC0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 55encryptionmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00749600 Relevance: 7.5, APIs: 5, Instructions: 42processCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00743720 Relevance: 4.6, APIs: 3, Instructions: 100comCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0074CEEA Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00749750 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00740250 Relevance: 77.4, APIs: 32, Strings: 12, Instructions: 363stringmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00735960 Relevance: 42.5, APIs: 19, Strings: 5, Instructions: 493networkstringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00744D70 Relevance: 35.1, APIs: 10, Strings: 10, Instructions: 119stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073CEF0 Relevance: 31.9, APIs: 21, Instructions: 374stringmemoryfileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073C990 Relevance: 26.6, APIs: 14, Strings: 1, Instructions: 383filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00748320 Relevance: 24.7, APIs: 11, Strings: 3, Instructions: 196registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00740A60 Relevance: 23.0, APIs: 12, Strings: 1, Instructions: 205stringprocesssynchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00731310 Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 139stringfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007360A0 Relevance: 19.4, APIs: 9, Strings: 2, Instructions: 133networkfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007375D0 Relevance: 15.8, APIs: 8, Strings: 1, Instructions: 91stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007372D0 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 149registrymemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00744780 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 101stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00748100 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 67memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073BA80 Relevance: 12.3, APIs: 4, Strings: 4, Instructions: 284stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00739E10 Relevance: 12.2, APIs: 4, Strings: 4, Instructions: 167memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00734FB0 Relevance: 12.1, APIs: 8, Instructions: 82networkmemoryfileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007483DC Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 64registrystringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00747690 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 43registrymemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00747720 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 42registrymemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007492E0 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 39fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00743560 Relevance: 9.1, APIs: 6, Instructions: 122stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00746F00 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 156stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007369B0 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 155libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00740D90 Relevance: 7.6, APIs: 5, Instructions: 120stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007487C0 Relevance: 7.6, APIs: 3, Strings: 2, Instructions: 64memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00749260 Relevance: 7.5, APIs: 4, Strings: 1, Instructions: 41stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00736BE0 Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 66memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0074A920 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 47stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00748D50 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 20memoryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00743BDB Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 16filestringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0073F4A0 Relevance: 6.2, APIs: 2, Strings: 2, Instructions: 154stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007494D0 Relevance: 6.1, APIs: 4, Instructions: 89COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00748680 Relevance: 6.1, APIs: 4, Instructions: 77processCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00744F40 Relevance: 6.1, APIs: 4, Instructions: 70stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00744BB0 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 118stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00745050 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 48stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|