Windows
Analysis Report
re.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- re.exe (PID: 7644 cmdline:
"C:\Users\ user\Deskt op\re.exe" MD5: DD22CB80ECEF115E6F102DB1FC33B99B) - conhost.exe (PID: 7652 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Click to jump to signature section
AV Detection |
---|
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF633A61CE3 |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00007FF633A629B0 |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF633A6836B | |
Source: | Code function: | 0_2_00007FF633A68363 | |
Source: | Code function: | 0_2_00007FF633A6839B | |
Source: | Code function: | 0_2_00007FF633A683AB | |
Source: | Code function: | 0_2_00007FF633A68383 |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF633A61180 | |
Source: | Code function: | 0_2_00007FF633A6295A | |
Source: | Code function: | 0_2_00007FF633A68380 |
Remote Access Functionality |
---|
Source: | Code function: | 0_2_00007FF633A629B0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Remote Access Software | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
87.120.113.125 | unknown | Bulgaria | 25206 | UNACS-AS-BG8000BurgasBG | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1545841 |
Start date and time: | 2024-10-31 06:47:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 53s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | re.exe |
Detection: | MAL |
Classification: | mal52.troj.winEXE@2/0@0/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: re.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
87.120.113.125 | Get hash | malicious | Havoc | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
UNACS-AS-BG8000BurgasBG | Get hash | malicious | Havoc | Browse |
| |
Get hash | malicious | LiteHTTP Bot | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
File type: | |
Entropy (8bit): | 5.1071141650389125 |
TrID: |
|
File name: | re.exe |
File size: | 19'968 bytes |
MD5: | dd22cb80ecef115e6f102db1fc33b99b |
SHA1: | dfd3f46c7438e835f2e339db3bd5c5b118cfd15a |
SHA256: | 88ee723fde45e51459624f7bfb3a9fbeab82ccac444823b83ced60aacd71dc8f |
SHA512: | 55eca58fa5a51fc1fe2e77177c06d4e9cf1d1079ad5373b336c8fb6daf1b08fbf5ae21970e49d046abf27a95021223efb1204ace7de954fe3a93e3143f2828d2 |
SSDEEP: | 192:rV9A/rARcJeFQAUOVgUBZIcK9IPO9ZKShMyGA3IUSoTTTTTTTTTTTTTTTTTTTTTy:rVYsRseFX5vL2kO9wJbPZhYsBIkCW |
TLSH: | D192091EB71658ECC787C1B4D2EB4B72EEB6BD16022062391214F2391E35DA2DE7F605 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....F g...............*.....J.................@.....................................U....`... ............................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x1400013f0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x672046DF [Tue Oct 29 02:22:23 2024 UTC] |
TLS Callbacks: | 0x400015a0, 0x1, 0x40001570, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 0f15d8212ccc6a485ec40b0f2cb15303 |
Instruction |
---|
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00003005h] |
mov dword ptr [eax], 00000000h |
call 00007FF6D08F629Fh |
nop |
nop |
dec eax |
add esp, 28h |
ret |
nop dword ptr [eax] |
dec eax |
sub esp, 28h |
call 00007FF6D08F77BCh |
dec eax |
cmp eax, 01h |
sbb eax, eax |
dec eax |
add esp, 28h |
ret |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
dec eax |
lea ecx, dword ptr [00000009h] |
jmp 00007FF6D08F64F9h |
nop dword ptr [eax+00h] |
ret |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
jmp dword ptr [0000712Ah] |
nop |
nop |
jmp dword ptr [0000711Ah] |
nop |
nop |
jmp dword ptr [0000710Ah] |
nop |
nop |
jmp dword ptr [000070FAh] |
nop |
nop |
jmp dword ptr [000070EAh] |
nop |
nop |
jmp dword ptr [000070DAh] |
nop |
nop |
jmp dword ptr [000070CAh] |
nop |
nop |
jmp dword ptr [000070BAh] |
nop |
nop |
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00001B65h] |
dec eax |
mov eax, dword ptr [eax] |
dec eax |
test eax, eax |
je 00007FF6D08F6544h |
nop dword ptr [eax+eax+00h] |
call eax |
dec eax |
mov eax, dword ptr [00001B4Fh] |
dec eax |
lea edx, dword ptr [eax+08h] |
dec eax |
mov eax, dword ptr [eax+00h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8000 | 0xbd0 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb000 | 0x4e8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x5000 | 0x264 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xc000 | 0x90 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x4040 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8340 | 0x250 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1d98 | 0x1e00 | 150bf272b5d7eb44dba1e7e1cc6f2672 | False | 0.558203125 | data | 5.880571877186384 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x3000 | 0x100 | 0x200 | 91c0f3b655372a9f6361f4b9654be824 | False | 0.193359375 | data | 1.4396691916168416 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x4000 | 0xa90 | 0xc00 | 057bf69255acb6be3c2d33b503f48ecc | False | 0.19889322916666666 | data | 4.467551377251061 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.pdata | 0x5000 | 0x264 | 0x400 | cd880c1930c68f755a92655748beb431 | False | 0.3466796875 | data | 2.62058338570906 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.xdata | 0x6000 | 0x1e0 | 0x200 | 5752b5f8977e5562b6ef25d63abd9cf0 | False | 0.43359375 | data | 3.6768225053484747 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.bss | 0x7000 | 0x180 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x8000 | 0xbd0 | 0xc00 | 6b915218920bc9126fc0073de6c07b5e | False | 0.3401692708333333 | data | 4.037243653299285 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0x9000 | 0x60 | 0x200 | 1b4cf2a002c45f387d7940a48fcbfa9b | False | 0.068359375 | data | 0.28655982431271465 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xa000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xb000 | 0x4e8 | 0x600 | 3b7f4d778dd55680650e27ddd712b430 | False | 0.333984375 | data | 4.778477168376261 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xc000 | 0x90 | 0x200 | bf1b9dd3acd0e7526ebd55072de13a12 | False | 0.267578125 | data | 1.6932143824916048 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0xb058 | 0x48f | XML 1.0 document, ASCII text | 0.40102827763496146 |
DLL | Import |
---|---|
KERNEL32.dll | CloseHandle, CreateProcessA, DeleteCriticalSection, EnterCriticalSection, FreeConsole, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject |
api-ms-win-crt-convert-l1-1-0.dll | atoi |
api-ms-win-crt-environment-l1-1-0.dll | __p__environ, __p__wenviron |
api-ms-win-crt-heap-l1-1-0.dll | _set_new_mode, calloc, free, malloc |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-private-l1-1-0.dll | __C_specific_handler, memcpy |
api-ms-win-crt-runtime-l1-1-0.dll | __p___argc, __p___argv, __p___wargv, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _exit, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, signal |
api-ms-win-crt-stdio-l1-1-0.dll | __acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, fwrite |
api-ms-win-crt-string-l1-1-0.dll | memset, strcmp, strlen, strncmp |
api-ms-win-crt-time-l1-1-0.dll | __daylight, __timezone, __tzname, _tzset |
WS2_32.dll | WSACleanup, WSAConnect, WSASocketA, WSAStartup, closesocket, htons, inet_addr, recv |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 31, 2024 06:48:07.927968025 CET | 49706 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:07.932920933 CET | 4444 | 49706 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:07.933104038 CET | 49706 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:08.524280071 CET | 4444 | 49706 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:08.525690079 CET | 49706 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:08.525768995 CET | 49706 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:08.530615091 CET | 4444 | 49706 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:13.649826050 CET | 49707 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:13.655242920 CET | 4444 | 49707 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:13.655352116 CET | 49707 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:14.240151882 CET | 4444 | 49707 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:14.240243912 CET | 49707 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:14.240328074 CET | 49707 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:14.245120049 CET | 4444 | 49707 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:19.257155895 CET | 49710 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:19.262454033 CET | 4444 | 49710 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:19.262561083 CET | 49710 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:19.847953081 CET | 4444 | 49710 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:19.848623991 CET | 49710 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:19.848731041 CET | 49710 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:19.853498936 CET | 4444 | 49710 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:24.873054981 CET | 49712 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:24.878004074 CET | 4444 | 49712 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:24.878202915 CET | 49712 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:25.480544090 CET | 4444 | 49712 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:25.480681896 CET | 49712 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:25.480823040 CET | 49712 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:25.485696077 CET | 4444 | 49712 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:30.489274025 CET | 49713 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:30.494259119 CET | 4444 | 49713 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:30.494430065 CET | 49713 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:31.080488920 CET | 4444 | 49713 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:31.080596924 CET | 49713 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:31.080729008 CET | 49713 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:31.085760117 CET | 4444 | 49713 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:36.097970009 CET | 49714 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:36.103261948 CET | 4444 | 49714 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:36.103347063 CET | 49714 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:36.721168995 CET | 4444 | 49714 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:36.721699953 CET | 49714 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:36.722371101 CET | 49714 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:36.742372036 CET | 4444 | 49714 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:41.738253117 CET | 49715 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:41.743318081 CET | 4444 | 49715 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:41.743393898 CET | 49715 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:42.362313986 CET | 4444 | 49715 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:42.362392902 CET | 49715 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:42.362478971 CET | 49715 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:42.367285013 CET | 4444 | 49715 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:47.378658056 CET | 49716 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:47.383527040 CET | 4444 | 49716 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:47.383656979 CET | 49716 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:47.975528002 CET | 4444 | 49716 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:47.975600958 CET | 49716 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:47.975687027 CET | 49716 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:47.980463028 CET | 4444 | 49716 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:52.989026070 CET | 49717 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:52.994002104 CET | 4444 | 49717 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:52.994141102 CET | 49717 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:53.593972921 CET | 4444 | 49717 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:53.594048977 CET | 49717 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:53.594140053 CET | 49717 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:53.598927975 CET | 4444 | 49717 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:58.614403963 CET | 49719 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:58.619235039 CET | 4444 | 49719 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:58.619319916 CET | 49719 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:59.207088947 CET | 4444 | 49719 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:48:59.207202911 CET | 49719 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:59.207281113 CET | 49719 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:48:59.212203026 CET | 4444 | 49719 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:04.224663973 CET | 49720 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:04.229856014 CET | 4444 | 49720 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:04.230102062 CET | 49720 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:04.824038029 CET | 4444 | 49720 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:04.824223995 CET | 49720 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:04.824320078 CET | 49720 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:04.829317093 CET | 4444 | 49720 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:09.842686892 CET | 49721 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:09.847598076 CET | 4444 | 49721 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:09.847687960 CET | 49721 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:10.446233034 CET | 4444 | 49721 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:10.446449041 CET | 49721 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:10.446536064 CET | 49721 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:10.451361895 CET | 4444 | 49721 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:15.457849979 CET | 49722 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:15.463231087 CET | 4444 | 49722 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:15.463310957 CET | 49722 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:16.055738926 CET | 4444 | 49722 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:16.055908918 CET | 49722 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:16.055984020 CET | 49722 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:16.060873985 CET | 4444 | 49722 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:21.067365885 CET | 49723 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:21.073280096 CET | 4444 | 49723 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:21.073380947 CET | 49723 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:21.662348032 CET | 4444 | 49723 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:21.662472963 CET | 49723 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:21.662565947 CET | 49723 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:21.667504072 CET | 4444 | 49723 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:26.682745934 CET | 49724 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:26.687679052 CET | 4444 | 49724 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:26.688369989 CET | 49724 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:27.273572922 CET | 4444 | 49724 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:27.273654938 CET | 49724 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:27.273708105 CET | 49724 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:27.278675079 CET | 4444 | 49724 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:32.335473061 CET | 49725 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:32.341316938 CET | 4444 | 49725 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:32.341780901 CET | 49725 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:32.933727026 CET | 4444 | 49725 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:32.933938026 CET | 49725 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:32.934025049 CET | 49725 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:32.938849926 CET | 4444 | 49725 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:37.942584991 CET | 49726 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:37.948545933 CET | 4444 | 49726 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:37.948637009 CET | 49726 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:38.540143013 CET | 4444 | 49726 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:38.540282965 CET | 49726 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:38.540343046 CET | 49726 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:38.546551943 CET | 4444 | 49726 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:43.552160025 CET | 49727 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:43.557066917 CET | 4444 | 49727 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:43.557183981 CET | 49727 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:44.157397032 CET | 4444 | 49727 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:44.157473087 CET | 49727 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:44.160216093 CET | 49727 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:44.165215015 CET | 4444 | 49727 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:49.176892042 CET | 49728 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:49.181926966 CET | 4444 | 49728 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:49.182018995 CET | 49728 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:49.777498007 CET | 4444 | 49728 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:49.777616024 CET | 49728 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:49.777678013 CET | 49728 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:49.782783031 CET | 4444 | 49728 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:54.785866022 CET | 49729 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:54.790913105 CET | 4444 | 49729 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:54.790988922 CET | 49729 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:55.545593977 CET | 4444 | 49729 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:49:55.545813084 CET | 49729 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:55.545861959 CET | 49729 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:49:55.550704002 CET | 4444 | 49729 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:50:00.566876888 CET | 49730 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:00.572129011 CET | 4444 | 49730 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:50:00.572410107 CET | 49730 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:01.158958912 CET | 4444 | 49730 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:50:01.159024954 CET | 49730 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:01.159097910 CET | 49730 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:01.163990974 CET | 4444 | 49730 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:50:06.175829887 CET | 49731 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:06.181233883 CET | 4444 | 49731 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:50:06.181817055 CET | 49731 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:06.781821012 CET | 4444 | 49731 | 87.120.113.125 | 192.168.2.8 |
Oct 31, 2024 06:50:06.781888008 CET | 49731 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:06.781949043 CET | 49731 | 4444 | 192.168.2.8 | 87.120.113.125 |
Oct 31, 2024 06:50:06.786756992 CET | 4444 | 49731 | 87.120.113.125 | 192.168.2.8 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 01:48:01 |
Start date: | 31/10/2024 |
Path: | C:\Users\user\Desktop\re.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff633a60000 |
File size: | 19'968 bytes |
MD5 hash: | DD22CB80ECEF115E6F102DB1FC33B99B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 01:48:01 |
Start date: | 31/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 9.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 16.6% |
Total number of Nodes: | 199 |
Total number of Limit Nodes: | 2 |
Graph
Callgraph
Function 00007FF633A629B0 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 151networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61180 Relevance: 13.6, APIs: 9, Instructions: 145sleepstringCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A62CD0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 36COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61CE3 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 82COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A6295A Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A68380 Relevance: .0, Instructions: 3COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61750 Relevance: 14.1, APIs: 4, Strings: 4, Instructions: 138COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61930 Relevance: 7.2, APIs: 1, Strings: 3, Instructions: 240memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61640 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 38COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A616F0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A616E0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61720 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61710 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61700 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF633A61678 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 24COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|