Windows
Analysis Report
H33UCslPzv.exe
Overview
General Information
Sample name: | H33UCslPzv.exerenamed because original name is a hash value |
Original sample name: | 462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed.exe |
Analysis ID: | 1542720 |
MD5: | 9ecae0d26219ddb2355ad7b597887760 |
SHA1: | 3946b3ad9b7233bdda8053c2410d796bdc9fa21d |
SHA256: | 462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed |
Tags: | CloudflareTunnelsRATexeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- H33UCslPzv.exe (PID: 1528 cmdline:
"C:\Users\ user\Deskt op\H33UCsl Pzv.exe" MD5: 9ECAE0D26219DDB2355AD7B597887760) - H33UCslPzv.exe (PID: 5968 cmdline:
"C:\Users\ user\Deskt op\H33UCsl Pzv.exe" MD5: 9ECAE0D26219DDB2355AD7B597887760)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["xwor3july.duckdns.org"], "Port": "9402", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T08:45:04.331057+0200 | 2852870 | 1 | Malware Command and Control Activity Detected | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:09.456365+0200 | 2852870 | 1 | Malware Command and Control Activity Detected | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:23.795545+0200 | 2852870 | 1 | Malware Command and Control Activity Detected | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:34.355458+0200 | 2852870 | 1 | Malware Command and Control Activity Detected | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T08:45:04.331057+0200 | 2852874 | 1 | Malware Command and Control Activity Detected | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:34.355458+0200 | 2852874 | 1 | Malware Command and Control Activity Detected | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T08:45:09.209046+0200 | 2855924 | 1 | Malware Command and Control Activity Detected | 192.168.2.9 | 58367 | 12.221.146.138 | 9402 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062F0 | |
Source: | Code function: | 0_2_004057B5 | |
Source: | Code function: | 0_2_00402765 | |
Source: | Code function: | 5_2_00402765 | |
Source: | Code function: | 5_2_004062F0 | |
Source: | Code function: | 5_2_004057B5 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00405252 |
Source: | Code function: | 0_2_00403248 | |
Source: | Code function: | 5_2_00403289 |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_70021A98 | |
Source: | Code function: | 5_2_000DEB98 | |
Source: | Code function: | 5_2_000D0E98 | |
Source: | Code function: | 5_2_38857950 | |
Source: | Code function: | 5_2_3885BF28 | |
Source: | Code function: | 5_2_38852240 | |
Source: | Code function: | 5_2_38851561 | |
Source: | Code function: | 5_2_3885B658 | |
Source: | Code function: | 5_2_388502B8 | |
Source: | Code function: | 5_2_38852230 | |
Source: | Code function: | 5_2_3885B310 |
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00403248 | |
Source: | Code function: | 5_2_00403289 |
Source: | Code function: | 0_2_0040450D |
Source: | Code function: | 0_2_00402138 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_70021A98 |
Source: | Code function: | 0_2_70022F8E |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | API coverage: |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Code function: | 0_2_004062F0 | |
Source: | Code function: | 0_2_004057B5 | |
Source: | Code function: | 0_2_00402765 | |
Source: | Code function: | 5_2_00402765 | |
Source: | Code function: | 5_2_004062F0 | |
Source: | Code function: | 5_2_004057B5 |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-4200 | ||
Source: | API call chain: | graph_0-4192 |
Source: | Code function: | 0_2_70021A98 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00403248 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | 11 Masquerading | OS Credential Dumping | 321 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 12 Process Injection | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Clipboard Data | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 31 Virtualization/Sandbox Evasion | Security Account Manager | 31 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 1 Access Token Manipulation | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 12 Process Injection | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | 23 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Deobfuscate/Decode Files or Information | Cached Domain Credentials | 215 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Obfuscated Files or Information | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Win32.Backdoor.Xworm | ||
63% | Virustotal | Browse | ||
100% | Avira | TR/AD.NsisInject.oovyn |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/AD.NsisInject.oovyn | ||
50% | ReversingLabs | Win32.Backdoor.Xworm | ||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
apslline.com | 103.53.40.62 | true | false | unknown | |
xwor3july.duckdns.org | 12.221.146.138 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
103.53.40.62 | apslline.com | India | 394695 | PUBLIC-DOMAIN-REGISTRYUS | false | |
12.221.146.138 | xwor3july.duckdns.org | United States | 7018 | ATT-INTERNET4US | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1542720 |
Start date and time: | 2024-10-26 08:42:17 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | H33UCslPzv.exerenamed because original name is a hash value |
Original Sample Name: | 462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@3/28@10/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
02:44:34 | API Interceptor | |
07:44:25 | Autostart | |
07:44:33 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
103.53.40.62 | Get hash | malicious | GuLoader, XWorm | Browse | ||
Get hash | malicious | GuLoader, XWorm | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
12.221.146.138 | Get hash | malicious | XWorm | Browse | ||
Get hash | malicious | GuLoader, XWorm | Browse | |||
Get hash | malicious | GuLoader, XWorm | Browse | |||
Get hash | malicious | PureLog Stealer | Browse | |||
Get hash | malicious | PureLog Stealer, XWorm | Browse | |||
Get hash | malicious | PureLog Stealer, XWorm | Browse | |||
Get hash | malicious | PureLog Stealer, XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | PureLog Stealer | Browse | |||
Get hash | malicious | PureLog Stealer, zgRAT | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
xwor3july.duckdns.org | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | GuLoader, XWorm | Browse |
| ||
Get hash | malicious | GuLoader, XWorm | Browse |
| ||
apslline.com | Get hash | malicious | GuLoader, XWorm | Browse |
| |
Get hash | malicious | GuLoader, XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ATT-INTERNET4US | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
PUBLIC-DOMAIN-REGISTRYUS | Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | FormBook, GuLoader | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll | Get hash | malicious | GuLoader, XWorm | Browse | ||
Get hash | malicious | GuLoader, XWorm | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3212629 |
Entropy (8bit): | 7.954369753521349 |
Encrypted: | false |
SSDEEP: | 98304:EH5hTCwpsZGol4OU0HTVHzyCj+7BN72vBqx/Yapu5koUX:A20Rol4Sz1H+7j2JiFpu5kPX |
MD5: | 9ECAE0D26219DDB2355AD7B597887760 |
SHA1: | 3946B3AD9B7233BDDA8053C2410D796BDC9FA21D |
SHA-256: | 462C6C970323F0E94EECB835032D8E993FCA9EE0C6F944F656DFEBDE036479ED |
SHA-512: | 728A4282EED54BEF2B75E61EF26104A81F036D89D474ABF49DB406260178D319480A505B1AAC324CAA92D93D3D2383FF69D064367C1F88BAC16611FD21276BD1 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.441667212304602 |
Encrypted: | false |
SSDEEP: | 3:sEMBQEJkJVEjDF7VJimxQoXUn:GVJimxvUn |
MD5: | 1DA505643EAC073F4677751E8EB03E73 |
SHA1: | 94A9A883DCE8CE8332369F51DCF316F74D747659 |
SHA-256: | C7D506524D0BB4E1D083F5556DA506EA08A535906AED5CF1F5DF461104E087CE |
SHA-512: | 3B5F71E89F9B9EB5FEE66273770EC2D907ECC0FBF912DFA67AFEE88EC9C9804806556A91409337B8B8A00D4B32D6E1A7597979F4C869254387B60713B9BB34E4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56 |
Entropy (8bit): | 4.228669708547486 |
Encrypted: | false |
SSDEEP: | 3:sAAEVvjsqb7VJ8VL84n:fLlVJ8P |
MD5: | 4FA88BBEE4C8AEA1ECA565750B019480 |
SHA1: | EF36BA5B8BB8C3C8E99D51C74034E28482FF60B8 |
SHA-256: | 247F8AE8C1A5CE9D7D7F80ED5F08D0DD42F0706CF1DBFD9BA2E7F0B4EECC85D0 |
SHA-512: | B6FB444DF47B8F11BA13CD5DF82A33E9DDA9223FCD91D827C580960AC3CCD576DD84F53B850D465D60B93E6443017148132686F0EA5656121CF6802DDCAD434D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 4.256564762130954 |
Encrypted: | false |
SSDEEP: | 3:DyWgLQIfLBJXmgU:mkIP25 |
MD5: | F15BFDEBB2DF02D02C8491BDE1B4E9BD |
SHA1: | 93BD46F57C3316C27CAD2605DDF81D6C0BDE9301 |
SHA-256: | C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043 |
SHA-512: | 1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74 |
Entropy (8bit): | 3.9637832956585757 |
Encrypted: | false |
SSDEEP: | 3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D |
MD5: | 16D513397F3C1F8334E8F3E4FC49828F |
SHA1: | 4EE15AFCA81CA6A13AF4E38240099B730D6931F0 |
SHA-256: | D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36 |
SHA-512: | 4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 52 |
Entropy (8bit): | 4.0914493934217315 |
Encrypted: | false |
SSDEEP: | 3:sBa99k1NoCFOn:KankVg |
MD5: | 5D04A35D3950677049C7A0CF17E37125 |
SHA1: | CAFDD49A953864F83D387774B39B2657A253470F |
SHA-256: | A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266 |
SHA-512: | C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11776 |
Entropy (8bit): | 5.854901984552606 |
Encrypted: | false |
SSDEEP: | 192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4 |
MD5: | 0063D48AFE5A0CDC02833145667B6641 |
SHA1: | E7EB614805D183ECB1127C62DECB1A6BE1B4F7A8 |
SHA-256: | AC9DFE3B35EA4B8932536ED7406C29A432976B685CC5322F94EF93DF920FEDE7 |
SHA-512: | 71CBBCAEB345E09306E368717EA0503FE8DF485BE2E95200FEBC61BCD8BA74FB4211CD263C232F148C0123F6C6F2E3FD4EA20BDECC4070F5208C35C6920240F0 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 100766 |
Entropy (8bit): | 4.60805090125263 |
Encrypted: | false |
SSDEEP: | 1536:NbCCACwyqugZe9tygI+SjuzpXoCwsY/rs7q5/Kj0:06wyqugZ7gI+SjUZoxnjs7dj0 |
MD5: | 378CA253C3EA95BCE064BB50CF6D9B7B |
SHA1: | 82BA0A64C26F14B022B6CB0095D75111B5A9F4B1 |
SHA-256: | EDEFCD83AF9EBB6E6F254C3093ACBC5F87A69EEE3A6E0AD3487EE81139BF1749 |
SHA-512: | 815CF7499AFB757D6FF31F52BC6CC8417CA28D56A71C3493378A3AC310AED293C62409B87C3D595E299FE630157C3BF9C07AA34517A0FC295D580A7675F3CCEC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 495473 |
Entropy (8bit): | 1.252683728528738 |
Encrypted: | false |
SSDEEP: | 1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH |
MD5: | EF47BA5BA9823E8C3469035CF70773D2 |
SHA1: | 21D1961813BA8BABF395C3AFE324487EE355578F |
SHA-256: | 895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B |
SHA-512: | E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8601 |
Entropy (8bit): | 1.1545164397538636 |
Encrypted: | false |
SSDEEP: | 48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV |
MD5: | F4A704DD6599AA965F753CF4AFF41544 |
SHA1: | 27F6166A11011BF9340B9477D469A5E39B67CF5B |
SHA-256: | 689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F |
SHA-512: | F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 100766 |
Entropy (8bit): | 4.60805090125263 |
Encrypted: | false |
SSDEEP: | 1536:NbCCACwyqugZe9tygI+SjuzpXoCwsY/rs7q5/Kj0:06wyqugZ7gI+SjUZoxnjs7dj0 |
MD5: | 378CA253C3EA95BCE064BB50CF6D9B7B |
SHA1: | 82BA0A64C26F14B022B6CB0095D75111B5A9F4B1 |
SHA-256: | EDEFCD83AF9EBB6E6F254C3093ACBC5F87A69EEE3A6E0AD3487EE81139BF1749 |
SHA-512: | 815CF7499AFB757D6FF31F52BC6CC8417CA28D56A71C3493378A3AC310AED293C62409B87C3D595E299FE630157C3BF9C07AA34517A0FC295D580A7675F3CCEC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2097152 |
Entropy (8bit): | 7.999905497796009 |
Encrypted: | true |
SSDEEP: | 49152:OKpsKgWBpFkzf6Pe4OU0IIdZgKjxas7VcGzyCj+Y2a8N7XGvBq/:1psZGol4OU0HTVHzyCj+7BN72vBq/ |
MD5: | 9DFBEE307FA56AC84912B5744E8363C5 |
SHA1: | DCE2BA9DE54AE3C748FDE2F879160C2FE495B726 |
SHA-256: | C269CC2E768FE7BDF34BC5CCEED86644E80FAC2454B2AFD066B6B1F6DD2CC1EF |
SHA-512: | F65169D3201C7419105F4275BFE15BD18E24ED60CB3A5E602C163751E240CBBAEC862DB5DC79EADE1220372E193EF2F17C83AC9DDE8289C0BBE4E1116E13FA46 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 495473 |
Entropy (8bit): | 1.252683728528738 |
Encrypted: | false |
SSDEEP: | 1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH |
MD5: | EF47BA5BA9823E8C3469035CF70773D2 |
SHA1: | 21D1961813BA8BABF395C3AFE324487EE355578F |
SHA-256: | 895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B |
SHA-512: | E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8601 |
Entropy (8bit): | 1.1545164397538636 |
Encrypted: | false |
SSDEEP: | 48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV |
MD5: | F4A704DD6599AA965F753CF4AFF41544 |
SHA1: | 27F6166A11011BF9340B9477D469A5E39B67CF5B |
SHA-256: | 689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F |
SHA-512: | F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 225561 |
Entropy (8bit): | 1.2509602063831964 |
Encrypted: | false |
SSDEEP: | 768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U |
MD5: | 6865DE99FA19A6862DF5C404DE274F27 |
SHA1: | 4EFBD7E416C513C7B2516052EFD42DB502306C35 |
SHA-256: | 3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3 |
SHA-512: | F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 406185 |
Entropy (8bit): | 7.094898375766347 |
Encrypted: | false |
SSDEEP: | 6144:PuQjFDMjr4I88sZ8g3zg8CIRgDIAsH23zAxB6CGQ5IH6k0B4H8cMeWq/:9jxIJI3zuSSDAn6CGqIH6HBeWk |
MD5: | EDCB191EC3A9CF0DC9BC8ED381C5CAAF |
SHA1: | 80A5D8F2AE9017263EF50BAD71504D1C96526F91 |
SHA-256: | 7681DA5A05E9A04207C6861FDF19A758F7FE5608BEC05B2A420FBEED61816CDE |
SHA-512: | D93EF198E99ADC5972D2534D25C3D7237058F2A5BA73B81C6E4A44F48B7BC76A6E69F8A6591F2344A6467E2DA7132C6ABB82A62DA9D4F3ED917EEA12437C9E1A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56731 |
Entropy (8bit): | 1.2442160585209034 |
Encrypted: | false |
SSDEEP: | 384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD |
MD5: | BCA0C962216D9B512E1FEE1F72EBA35B |
SHA1: | FF228246A15FA291474DF13F96C51A6BBE03FDBE |
SHA-256: | 9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923 |
SHA-512: | 848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 44084 |
Entropy (8bit): | 1.251987965137089 |
Encrypted: | false |
SSDEEP: | 384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9 |
MD5: | 8E1ECD1CAD1A69BA46F3589D3EE05FCD |
SHA1: | 511FE3218234DFD061C85834E32694D500A2D8CA |
SHA-256: | 027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534 |
SHA-512: | D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 669932 |
Entropy (8bit): | 5.5314845590929895 |
Encrypted: | false |
SSDEEP: | 6144:gKk30jClLCugYQs0Om0TmZi6ZYMdCZcZtaW22ibSd4MoX1DXI5nR9mx2KdQJf6mC:ghdCugMm0TWNIJpbIu945c2iAWeO |
MD5: | 43AB379A4F5EB535BEEFA8769D0F145C |
SHA1: | B5BEDA93EDAB6D45FC87C74406F28575AE3BA633 |
SHA-256: | E35EFD069097EFCED37EB9A320F9D1519558C61B3C6B606E659A28B0432ADF35 |
SHA-512: | 27B864E0C981CBC385505AB031A5BF245F8DA6588A7762447305A72E8513F904A4509EB104E6A75EB279D364EF853B936405E3B12C6F63082CB2F33D674826A0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7049 |
Entropy (8bit): | 5.427889010283913 |
Encrypted: | false |
SSDEEP: | 192:tVcb400g8jt9vE3Udc0OctTnJ6Bw2uYcJIt:tLNnskKFctTnszcJw |
MD5: | 96263BC3F25CD2A239A1242E344FAEBD |
SHA1: | 1A71FBC9456836750FEE1ADF87A2EF037344716D |
SHA-256: | 551FA2D5828E69144048B3E0F0582C992A8E5A2E74D68C0DD3A1BD5AC697330B |
SHA-512: | 5E58804079FD246C8D5005B666BA5FEE853424B34EA1423C6110F1A098CF3DF2793D6CF2430E952460FF1D5A10812BB5FB707E5F6FA9D1226B363703234F6BEB |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 213163 |
Entropy (8bit): | 1.2509035420987697 |
Encrypted: | false |
SSDEEP: | 768:E6Ak6TqKI8qNenRhDkU13nK/Owzmzj63GMIrCDVOAqiVyycSsOR2D+uFFO8ukH1m:a/TnkUFupj/vM9PV |
MD5: | 98B0761197297AB236BC284E2B596C55 |
SHA1: | D84B6FCBC7822AC3617AF2E06807F24B6CB09501 |
SHA-256: | 1B09158404A448B8B8DA21415D6D3FF844658BF441B5A5FB4C651B2B1F5F5809 |
SHA-512: | 6AB83D66E4E5874688F7A64C133EF3514CE355936CD66895EFE8249E316E2C87195B82FF4E7780180BA3B58C097196AA58736BA6A9365CC36943C6AC8D78A71D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 380 |
Entropy (8bit): | 4.150391372844806 |
Encrypted: | false |
SSDEEP: | 6:jKYlGRpzKVqXB++DC6XBRuN6kgrRmXLY8bOraYKFSX6WlWfHcSTQX97Mm2CXmVyg:mYsDmVqXBpC6XnDk+wXcj5KFSk+X97xE |
MD5: | DCEB38A26FFEAB28D24D304205DD1CFD |
SHA1: | 7C3CD56A0E4A2A768D14EA41D88D163C8A3E66DD |
SHA-256: | 68F09ACCAE0DF5988DF3AACFFF32C8025F07A266367AD77E1614814B2A05C98F |
SHA-512: | 27469F330E5F57D253084536619CAED2F220CC1AAB74B476C175FAA24467301BA0DD1CC52E9F2F15B5052F0CFC397A4C95B7147C7BD6369ECACD7319FF2BCAE5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 213163 |
Entropy (8bit): | 1.2509035420987697 |
Encrypted: | false |
SSDEEP: | 768:E6Ak6TqKI8qNenRhDkU13nK/Owzmzj63GMIrCDVOAqiVyycSsOR2D+uFFO8ukH1m:a/TnkUFupj/vM9PV |
MD5: | 98B0761197297AB236BC284E2B596C55 |
SHA1: | D84B6FCBC7822AC3617AF2E06807F24B6CB09501 |
SHA-256: | 1B09158404A448B8B8DA21415D6D3FF844658BF441B5A5FB4C651B2B1F5F5809 |
SHA-512: | 6AB83D66E4E5874688F7A64C133EF3514CE355936CD66895EFE8249E316E2C87195B82FF4E7780180BA3B58C097196AA58736BA6A9365CC36943C6AC8D78A71D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 380 |
Entropy (8bit): | 4.150391372844806 |
Encrypted: | false |
SSDEEP: | 6:jKYlGRpzKVqXB++DC6XBRuN6kgrRmXLY8bOraYKFSX6WlWfHcSTQX97Mm2CXmVyg:mYsDmVqXBpC6XnDk+wXcj5KFSk+X97xE |
MD5: | DCEB38A26FFEAB28D24D304205DD1CFD |
SHA1: | 7C3CD56A0E4A2A768D14EA41D88D163C8A3E66DD |
SHA-256: | 68F09ACCAE0DF5988DF3AACFFF32C8025F07A266367AD77E1614814B2A05C98F |
SHA-512: | 27469F330E5F57D253084536619CAED2F220CC1AAB74B476C175FAA24467301BA0DD1CC52E9F2F15B5052F0CFC397A4C95B7147C7BD6369ECACD7319FF2BCAE5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 225561 |
Entropy (8bit): | 1.2509602063831964 |
Encrypted: | false |
SSDEEP: | 768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U |
MD5: | 6865DE99FA19A6862DF5C404DE274F27 |
SHA1: | 4EFBD7E416C513C7B2516052EFD42DB502306C35 |
SHA-256: | 3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3 |
SHA-512: | F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 406185 |
Entropy (8bit): | 7.094898375766347 |
Encrypted: | false |
SSDEEP: | 6144:PuQjFDMjr4I88sZ8g3zg8CIRgDIAsH23zAxB6CGQ5IH6k0B4H8cMeWq/:9jxIJI3zuSSDAn6CGqIH6HBeWk |
MD5: | EDCB191EC3A9CF0DC9BC8ED381C5CAAF |
SHA1: | 80A5D8F2AE9017263EF50BAD71504D1C96526F91 |
SHA-256: | 7681DA5A05E9A04207C6861FDF19A758F7FE5608BEC05B2A420FBEED61816CDE |
SHA-512: | D93EF198E99ADC5972D2534D25C3D7237058F2A5BA73B81C6E4A44F48B7BC76A6E69F8A6591F2344A6467E2DA7132C6ABB82A62DA9D4F3ED917EEA12437C9E1A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56731 |
Entropy (8bit): | 1.2442160585209034 |
Encrypted: | false |
SSDEEP: | 384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD |
MD5: | BCA0C962216D9B512E1FEE1F72EBA35B |
SHA1: | FF228246A15FA291474DF13F96C51A6BBE03FDBE |
SHA-256: | 9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923 |
SHA-512: | 848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\H33UCslPzv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 44084 |
Entropy (8bit): | 1.251987965137089 |
Encrypted: | false |
SSDEEP: | 384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9 |
MD5: | 8E1ECD1CAD1A69BA46F3589D3EE05FCD |
SHA1: | 511FE3218234DFD061C85834E32694D500A2D8CA |
SHA-256: | 027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534 |
SHA-512: | D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.954369753521349 |
TrID: |
|
File name: | H33UCslPzv.exe |
File size: | 3'212'629 bytes |
MD5: | 9ecae0d26219ddb2355ad7b597887760 |
SHA1: | 3946b3ad9b7233bdda8053c2410d796bdc9fa21d |
SHA256: | 462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed |
SHA512: | 728a4282eed54bef2b75e61ef26104a81f036d89d474abf49db406260178d319480a505b1aac324caa92d93d3d2383ff69d064367c1f88bac16611fd21276bd1 |
SSDEEP: | 98304:EH5hTCwpsZGol4OU0HTVHzyCj+7BN72vBqx/Yapu5koUX:A20Rol4Sz1H+7j2JiFpu5kPX |
TLSH: | C8E533663341D538C21A53782422F67C673EDBA958081B677720BE697E33B91FF06D22 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@............/...........r.../...............+.......Rich............PE..L......].................b....9.....H2............@ |
Icon Hash: | 1e175ed66c3c9347 |
Entrypoint: | 0x403248 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5DF6D4D5 [Mon Dec 16 00:50:29 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | e9c0657252137ac61c1eeeba4c021000 |
Instruction |
---|
sub esp, 00000184h |
push ebx |
push esi |
push edi |
xor ebx, ebx |
push 00008001h |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 0040A198h |
mov dword ptr [esp+20h], ebx |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [004080A0h] |
call dword ptr [0040809Ch] |
and eax, BFFFFFFFh |
cmp ax, 00000006h |
mov dword ptr [007A2F4Ch], eax |
je 00007F2380D89533h |
push ebx |
call 00007F2380D8C61Bh |
cmp eax, ebx |
je 00007F2380D89529h |
push 00000C00h |
call eax |
mov esi, 00408298h |
push esi |
call 00007F2380D8C597h |
push esi |
call dword ptr [00408098h] |
lea esi, dword ptr [esi+eax+01h] |
cmp byte ptr [esi], bl |
jne 00007F2380D8950Dh |
push 0000000Ah |
call 00007F2380D8C5EFh |
push 00000008h |
call 00007F2380D8C5E8h |
push 00000006h |
mov dword ptr [007A2F44h], eax |
call 00007F2380D8C5DCh |
cmp eax, ebx |
je 00007F2380D89531h |
push 0000001Eh |
call eax |
test eax, eax |
je 00007F2380D89529h |
or byte ptr [007A2F4Fh], 00000040h |
push ebp |
call dword ptr [00408040h] |
push ebx |
call dword ptr [00408284h] |
mov dword ptr [007A3018h], eax |
push ebx |
lea eax, dword ptr [esp+38h] |
push 00000160h |
push eax |
push ebx |
push 0079E508h |
call dword ptr [00408178h] |
push 0040A188h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8430 | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x3b6000 | 0x3ad78 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x294 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x60d8 | 0x6200 | e59663060e65803bb6474d2af98f8aa9 | False | 0.6750637755102041 | data | 6.467400856752681 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x123e | 0x1400 | 7969015d02b2f673463f43156b28cdb4 | False | 0.428515625 | data | 5.032652926909017 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x399058 | 0x400 | 2d383339e780dfc9691f30584bbd0766 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x3a4000 | 0x12000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x3b6000 | 0x3ad78 | 0x3ae00 | a32d901976697d7bbce42d8596684b1d | False | 0.6666625199044586 | data | 6.294242973261698 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x3b6388 | 0x128ae | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9988545095457538 |
RT_ICON | 0x3c8c38 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | English | United States | 0.4953714657518041 |
RT_ICON | 0x3d9460 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | English | United States | 0.5109049821315955 |
RT_ICON | 0x3e2908 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | English | United States | 0.5138170055452865 |
RT_ICON | 0x3e7d90 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.5477680680207841 |
RT_ICON | 0x3ebfb8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.5617219917012448 |
RT_ICON | 0x3ee560 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.6238273921200751 |
RT_ICON | 0x3ef608 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.6639344262295082 |
RT_ICON | 0x3eff90 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7296099290780141 |
RT_DIALOG | 0x3f03f8 | 0x144 | data | English | United States | 0.5216049382716049 |
RT_DIALOG | 0x3f0540 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x3f0640 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x3f0760 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x3f07c0 | 0x84 | Targa image data - Map 32 x 10414 x 1 +1 | English | United States | 0.7348484848484849 |
RT_VERSION | 0x3f0848 | 0x1f0 | MS Windows COFF PowerPC object file | English | United States | 0.4959677419354839 |
RT_MANIFEST | 0x3f0a38 | 0x33e | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators | English | United States | 0.5542168674698795 |
DLL | Import |
---|---|
KERNEL32.dll | GetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetFileAttributesA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileTime, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, DeleteFileA, FindFirstFileA, FindNextFileA, FindClose, SetFilePointer, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, MultiByteToWideChar, FreeLibrary, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA |
USER32.dll | GetSystemMenu, SetClassLongA, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, LoadImageA, CreateDialogParamA, SetTimer, SetWindowTextA, SetForegroundWindow, ShowWindow, SetWindowLongA, SendMessageTimeoutA, FindWindowExA, IsWindow, AppendMenuA, TrackPopupMenu, CreatePopupMenu, DrawTextA, EndPaint, DestroyWindow, wsprintfA, PostQuitMessage |
GDI32.dll | SelectObject, SetTextColor, SetBkMode, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, GetDeviceCaps, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA |
ADVAPI32.dll | AdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T08:45:04.331057+0200 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:04.331057+0200 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:09.209046+0200 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.9 | 58367 | 12.221.146.138 | 9402 | TCP |
2024-10-26T08:45:09.456365+0200 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:23.795545+0200 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:34.355458+0200 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
2024-10-26T08:45:34.355458+0200 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 12.221.146.138 | 9402 | 192.168.2.9 | 58367 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 26, 2024 08:44:29.077681065 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:29.077714920 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:29.077770948 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:29.094818115 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:29.094837904 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.221956968 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.222151041 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.286184072 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.286206007 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.286663055 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.286727905 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.292140961 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.339338064 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.675580978 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.675652027 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.675705910 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.675721884 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.675755024 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.675784111 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.849754095 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.849961042 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:30.934884071 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:30.935075045 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:31.051495075 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:31.051563025 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:31.051587105 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:31.051599979 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:31.051625967 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:31.051647902 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:31.051651001 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:31.051697016 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:31.068434954 CEST | 50132 | 443 | 192.168.2.9 | 103.53.40.62 |
Oct 26, 2024 08:44:31.068454027 CEST | 443 | 50132 | 103.53.40.62 | 192.168.2.9 |
Oct 26, 2024 08:44:55.359270096 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:44:55.365428925 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:44:55.365516901 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:44:55.464358091 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:44:55.470969915 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:45:04.331057072 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:45:04.378631115 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:45:09.209045887 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:45:09.214927912 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:45:09.456365108 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:45:09.503691912 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:45:22.957272053 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:45:22.962677956 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:45:23.795545101 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:45:23.847517967 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Oct 26, 2024 08:45:34.355458021 CEST | 9402 | 58367 | 12.221.146.138 | 192.168.2.9 |
Oct 26, 2024 08:45:34.410075903 CEST | 58367 | 9402 | 192.168.2.9 | 12.221.146.138 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 26, 2024 08:43:38.604912996 CEST | 53 | 63915 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:28.566436052 CEST | 49783 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:29.068017960 CEST | 53 | 49783 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:35.569907904 CEST | 50807 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:36.566616058 CEST | 50807 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:37.581980944 CEST | 50807 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:39.580013037 CEST | 53 | 50807 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:39.580029011 CEST | 53 | 50807 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:39.580037117 CEST | 53 | 50807 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:39.926474094 CEST | 50568 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:40.925668001 CEST | 50568 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:41.954509974 CEST | 50568 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:43.936058044 CEST | 53 | 50568 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:43.936080933 CEST | 53 | 50568 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:43.936089993 CEST | 53 | 50568 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:48.536258936 CEST | 58030 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:49.535157919 CEST | 58030 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:49.542370081 CEST | 53 | 58030 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:52.546559095 CEST | 53 | 58030 | 1.1.1.1 | 192.168.2.9 |
Oct 26, 2024 08:44:54.739025116 CEST | 51849 | 53 | 192.168.2.9 | 1.1.1.1 |
Oct 26, 2024 08:44:55.358004093 CEST | 53 | 51849 | 1.1.1.1 | 192.168.2.9 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 26, 2024 08:44:28.566436052 CEST | 192.168.2.9 | 1.1.1.1 | 0x3400 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:35.569907904 CEST | 192.168.2.9 | 1.1.1.1 | 0xb367 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:36.566616058 CEST | 192.168.2.9 | 1.1.1.1 | 0xb367 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:37.581980944 CEST | 192.168.2.9 | 1.1.1.1 | 0xb367 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:39.926474094 CEST | 192.168.2.9 | 1.1.1.1 | 0xcb1a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:40.925668001 CEST | 192.168.2.9 | 1.1.1.1 | 0xcb1a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:41.954509974 CEST | 192.168.2.9 | 1.1.1.1 | 0xcb1a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:48.536258936 CEST | 192.168.2.9 | 1.1.1.1 | 0xc71e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:49.535157919 CEST | 192.168.2.9 | 1.1.1.1 | 0xc71e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:54.739025116 CEST | 192.168.2.9 | 1.1.1.1 | 0xc22f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 26, 2024 08:44:29.068017960 CEST | 1.1.1.1 | 192.168.2.9 | 0x3400 | No error (0) | 103.53.40.62 | A (IP address) | IN (0x0001) | false | ||
Oct 26, 2024 08:44:39.580013037 CEST | 1.1.1.1 | 192.168.2.9 | 0xb367 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:39.580029011 CEST | 1.1.1.1 | 192.168.2.9 | 0xb367 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:39.580037117 CEST | 1.1.1.1 | 192.168.2.9 | 0xb367 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:43.936058044 CEST | 1.1.1.1 | 192.168.2.9 | 0xcb1a | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:43.936080933 CEST | 1.1.1.1 | 192.168.2.9 | 0xcb1a | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:43.936089993 CEST | 1.1.1.1 | 192.168.2.9 | 0xcb1a | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:52.546559095 CEST | 1.1.1.1 | 192.168.2.9 | 0xc71e | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 08:44:55.358004093 CEST | 1.1.1.1 | 192.168.2.9 | 0xc22f | No error (0) | 12.221.146.138 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.9 | 50132 | 103.53.40.62 | 443 | 5968 | C:\Users\user\Desktop\H33UCslPzv.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 06:44:30 UTC | 174 | OUT | |
2024-10-26 06:44:30 UTC | 248 | IN | |
2024-10-26 06:44:30 UTC | 7944 | IN | |
2024-10-26 06:44:30 UTC | 8000 | IN | |
2024-10-26 06:44:30 UTC | 8000 | IN | |
2024-10-26 06:44:31 UTC | 8000 | IN | |
2024-10-26 06:44:31 UTC | 2424 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:43:25 |
Start date: | 26/10/2024 |
Path: | C:\Users\user\Desktop\H33UCslPzv.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'212'629 bytes |
MD5 hash: | 9ECAE0D26219DDB2355AD7B597887760 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:44:09 |
Start date: | 26/10/2024 |
Path: | C:\Users\user\Desktop\H33UCslPzv.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'212'629 bytes |
MD5 hash: | 9ECAE0D26219DDB2355AD7B597887760 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 20.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 16.3% |
Total number of Nodes: | 1537 |
Total number of Limit Nodes: | 50 |
Graph
Function 00403248 Relevance: 89.6, APIs: 32, Strings: 19, Instructions: 366stringcomfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405252 Relevance: 54.3, APIs: 36, Instructions: 282windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004057B5 Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 159filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040380A Relevance: 47.5, APIs: 13, Strings: 14, Instructions: 215stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402DC4 Relevance: 24.7, APIs: 5, Strings: 9, Instructions: 181memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040600F Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 199stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401759 Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 147stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405114 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 73stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406317 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040206A Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 73libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405ED4 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040568C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401B63 Relevance: 4.6, APIs: 2, Strings: 1, Instructions: 72memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040576D Relevance: 4.5, APIs: 3, Instructions: 28fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004025EA Relevance: 3.0, APIs: 1, Strings: 1, Instructions: 34stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401E8F Relevance: 3.0, APIs: 2, Instructions: 25COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040156F Relevance: 3.0, APIs: 2, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B86 Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B61 Relevance: 3.0, APIs: 2, Instructions: 13COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405657 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402631 Relevance: 1.6, APIs: 1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040166A Relevance: 1.5, APIs: 1, Instructions: 38fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004026EF Relevance: 1.5, APIs: 1, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402363 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C2D Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BFE Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70022921 Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401563 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040C7 Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403200 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B0 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040409D Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70022A38 Relevance: 1.4, APIs: 1, Instructions: 143memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F48 Relevance: 1.3, APIs: 1, Instructions: 37COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004014D6 Relevance: 1.3, APIs: 1, Instructions: 19sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040450D Relevance: 23.0, APIs: 10, Strings: 3, Instructions: 274stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70021A98 Relevance: 20.1, APIs: 13, Instructions: 591stringlibrarymemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402765 Relevance: 1.5, APIs: 1, Instructions: 29fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404A80 Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 489windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004041E6 Relevance: 37.0, APIs: 19, Strings: 2, Instructions: 202windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C5C Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 129memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E2 Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 700224D8 Relevance: 10.6, APIs: 7, Instructions: 124COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049CE Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402CDD Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 700222F1 Relevance: 9.1, APIs: 6, Instructions: 140memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70021837 Relevance: 7.7, APIs: 5, Instructions: 194COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D41 Relevance: 7.6, APIs: 5, Instructions: 70windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401DFF Relevance: 7.5, APIs: 5, Instructions: 43COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C0A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048C4 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040243D Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 64registrystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405A73 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 46stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405985 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402D60 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405088 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004059CC Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 700210E0 Relevance: 5.1, APIs: 4, Instructions: 102memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405AEB Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.2% |
Dynamic/Decrypted Code Coverage: | 97.6% |
Signature Coverage: | 0% |
Total number of Nodes: | 123 |
Total number of Limit Nodes: | 11 |
Graph
Function 38857950 Relevance: 1.9, APIs: 1, Instructions: 396COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D711B Relevance: 6.1, APIs: 4, Instructions: 129threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D7120 Relevance: 6.1, APIs: 4, Instructions: 128threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 38851EB0 Relevance: 1.7, APIs: 1, Instructions: 166COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 38851F30 Relevance: 1.6, APIs: 1, Instructions: 113COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 388531F4 Relevance: 1.6, APIs: 1, Instructions: 97COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D7360 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D7368 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D2260 Relevance: 1.6, APIs: 1, Instructions: 60COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D2268 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0009D500 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0009D414 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000AD0FC Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0009D40F Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0009D4FB Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000AD0F7 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403289 Relevance: 73.8, APIs: 30, Strings: 12, Instructions: 288stringfilecomCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004057B5 Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 159filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404A80 Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 489windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405252 Relevance: 54.3, APIs: 36, Instructions: 282windowclipboardmemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040380A Relevance: 38.7, APIs: 13, Strings: 9, Instructions: 215stringregistryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004041E6 Relevance: 35.2, APIs: 19, Strings: 1, Instructions: 202windowstringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040336A Relevance: 31.7, APIs: 10, Strings: 8, Instructions: 156stringfilecomCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403248 Relevance: 22.8, APIs: 10, Strings: 3, Instructions: 93stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C5C Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 129memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040450D Relevance: 19.5, APIs: 10, Strings: 1, Instructions: 274stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040600F Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 199stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405114 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 73stringwindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E2 Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E52 Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 137memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049CE Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402CDD Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406317 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040206A Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 73libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D41 Relevance: 7.6, APIs: 5, Instructions: 70windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401DFF Relevance: 7.5, APIs: 5, Instructions: 43COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C0A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048C4 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004055DA Relevance: 6.0, APIs: 4, Instructions: 39COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402D60 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405A73 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405088 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405ED4 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44registryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405AEB Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|