Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe
Analysis ID:1547563
MD5:d8188612b8eaf56cebceae7c54c12426
SHA1:c82a28a4954ea5e11a221f89747c03c3c5f5d2ea
SHA256:33e83e77afd9dbcf216839f46d32803571c3242a03680f6b7e40892cd530b49d
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe (PID: 7284 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe" MD5: D8188612B8EAF56CEBCEAE7C54C12426)
    • conhost.exe (PID: 7292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7396 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826833456.0000000140313000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_f9152404-d
Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1827005249.000000014162A000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1827005249.000000014162A000.00000040.00000001.01000000.00000003.sdmp
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: dullwave.ru
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/?format=text
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org?format=text
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org?format=texte
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orglDrive0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826833456.0000000140313000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1734957483.0000000002410000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dullwave.ru/dlw_filebase/rust/check.php
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1771490979.000000000058C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1771446487.0000000000589000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dullwave.ru/dlw_filebase/rust/check.php?
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dullwave.ru/dlw_filebase/rust/check.php?file=Bootstrup.exe&hash=D8188612B8EAF56CEBCEAE7C54C1
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49738 version: TLS 1.2

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: Number of sections : 13 > 10
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: Section: ZLIB complexity 0.997327302631579
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
Source: classification engineClassification label: mal80.evad.winEXE@4/1@2/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7292:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSection loaded: schannel.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic file information: File size 22509072 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x17f200
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x135a400
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1827005249.000000014162A000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1827005249.000000014162A000.00000040.00000001.01000000.00000003.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name: .bhnb
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeStatic PE information: section name: .boot

Boot Survival

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeWindow searched: window name: RegmonClassJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1804741986.00000000005E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HOOKEXPLORER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1804741986.00000000005E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826342529.000000000260D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1771446487.0000000000589000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeNtSetInformationThread: Indirect: 0x1400BF795Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeNtQueryInformationProcess: Indirect: 0x1418034B1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeNtQueryInformationProcess: Indirect: 0x1417F9DA2Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeNtSetInformationThread: Indirect: 0x1417BA3CDJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeNtCreateThreadEx: Indirect: 0x1400C0BD2Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeNtQuerySystemInformation: Indirect: 0x141800781Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826342529.000000000260D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Wireshark.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
33
Virtualization/Sandbox Evasion
OS Credential Dumping641
Security Software Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
11
Process Injection
LSASS Memory33
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.ipify.org0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
104.26.12.205
truefalse
    unknown
    dullwave.ru
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.ipify.org?format=textSecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://api.ipify.orgSecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://api.ipify.org?format=texteSecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://dullwave.ru/dlw_filebase/rust/check.php?SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1771490979.000000000058C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1771446487.0000000000589000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://api.ipify.org/?format=textSecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://dullwave.ru/dlw_filebase/rust/check.phpSecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://dullwave.ru/dlw_filebase/rust/check.php?file=Bootstrup.exe&hash=D8188612B8EAF56CEBCEAE7C54C1SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826833456.0000000140313000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000003.1734957483.0000000002410000.00000004.00001000.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.orglDrive0SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe, 00000000.00000002.1826121439.000000000056C000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.26.12.205
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    IP
                    127.0.0.1
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1547563
                    Start date and time:2024-11-02 17:33:10 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 39s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:3
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe
                    Detection:MAL
                    Classification:mal80.evad.winEXE@4/1@2/2
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Excluded IPs from analysis (whitelisted): 4.175.87.197
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.26.12.205Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/
                    6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                    • api.ipify.org/
                    perfcc.elfGet hashmaliciousXmrigBrowse
                    • api.ipify.org/
                    SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                    • api.ipify.org/
                    SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                    • api.ipify.org/
                    hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                    • api.ipify.org/
                    file.exeGet hashmaliciousRDPWrap ToolBrowse
                    • api.ipify.org/
                    file.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/
                    file.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/
                    file.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    api.ipify.orgTROODOS AIR PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 104.26.13.205
                    SecureMessageATT.htmlGet hashmaliciousHTMLPhisherBrowse
                    • 104.26.12.205
                    COSCO SHIPPING WISDOM VESSEL DETAILS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 104.26.12.205
                    kill.exeGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 104.26.13.205
                    w9ap9yNeCb.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.13.205
                    Payslip_October_2024.pdf.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.12.205
                    ae713827-e32c-f66b-fbdb-5405db450711.emlGet hashmaliciousUnknownBrowse
                    • 104.26.13.205
                    kill.exeGet hashmaliciousUnknownBrowse
                    • 104.26.13.205
                    rMT103_126021720924.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.12.205
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDFLARENETUShttps://parrots-run-fjh.craft.me/kKsdDph47M82kHGet hashmaliciousUnknownBrowse
                    • 104.16.40.28
                    file.exeGet hashmaliciousLummaCBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousLummaCBrowse
                    • 188.114.97.3
                    m66Mwr3koh.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    m66Mwr3koh.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    file.exeGet hashmaliciousLummaCBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                    • 188.114.97.3
                    SecuriteInfo.com.Trojan.GenericKD.74442994.24259.8937.exeGet hashmaliciousUnknownBrowse
                    • 162.159.61.3
                    Reservation Detail Booking.com ID4336.vbsGet hashmaliciousAsyncRAT, PureLog Stealer, zgRATBrowse
                    • 104.18.86.42
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ce5f3254611a8c095a3d821d44539877SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    No context
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):189
                    Entropy (8bit):4.65143144403424
                    Encrypted:false
                    SSDEEP:3:7AeTABFReHLLmzRcPLStA3YEIAeeSAZQ68AeTABFReHLLmzRz6zX6AbQZ/Mj9GXY:YoLLmRM0A3YhveVQ6PoLLmRzMqI
                    MD5:0C486B471EC0CB8315A78D385BA87320
                    SHA1:1C4541DC73F4636AEBE6013D18D23FA1253A1BFC
                    SHA-256:72B2E02B178A0DCAC14DC894A874FA7753EBE6B8224393DD7AF6F95CB45FAB58
                    SHA-512:82C3C3AC8F2AC3C4D37EEA19B0FEBD4A36DD681EEBE882929AC6E7880D3663F1A99C133570781F7E0FEF5F29B050FCFDA2490B1AF1639CD5F9BF579219763085
                    Malicious:false
                    Reputation:low
                    Preview:[DullWave] Failed to send GET request: Couldn't resolve host name...[DullWave] Auth.......[DullWave] Failed to send GET request: SSL connect error.....[DullWave] Connection not established.
                    File type:PE32+ executable (console) x86-64, for MS Windows
                    Entropy (8bit):7.969478726781011
                    TrID:
                    • Win64 Executable Console (202006/5) 92.65%
                    • Win64 Executable (generic) (12005/4) 5.51%
                    • Generic Win/DOS Executable (2004/3) 0.92%
                    • DOS Executable Generic (2002/1) 0.92%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe
                    File size:22'509'072 bytes
                    MD5:d8188612b8eaf56cebceae7c54c12426
                    SHA1:c82a28a4954ea5e11a221f89747c03c3c5f5d2ea
                    SHA256:33e83e77afd9dbcf216839f46d32803571c3242a03680f6b7e40892cd530b49d
                    SHA512:a73eb049c2a4d767a018be7094e8c192b22c2490c34295cdab7bf45b44be2c83165f0b2c3003d37da53703c71e48d119eabac58268ac006ac90bb47d3a1ac81d
                    SSDEEP:393216:uGmEP/TbVLYeJvFTXqVPTQmbTz6Um6TJjo8mBeH4fqNEed6/b/SuTt:uq5YeZF7yMSz6Umqo8UeYfuEed67Sq
                    TLSH:3837333428C37E2AEAB597B58FF7148D8630AA1546DF69C76B4F30474A5731F4BB2208
                    File Content Preview:MZ......................@...................................P...........!..L.!This program cannot be run in DOS mode....$.......Z.....w...w...w.U.t...w.U.r...w.U.s...w...s...w...s.v.w...r.=.w...t...w.-.s...w.......w.x.....w.L.s...w.L.t...w.L.r.~.w...s...w
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x1423f7058
                    Entrypoint Section:.boot
                    Digitally signed:false
                    Imagebase:0x140000000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                    Time Stamp:0x67207A0F [Tue Oct 29 06:00:47 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:4c217a11cb1e73ae3df30fb8b8c95892
                    Instruction
                    call 00007F0A44DA7C77h
                    inc ecx
                    push edx
                    dec ecx
                    mov edx, esp
                    inc ecx
                    push edx
                    dec ecx
                    mov esi, dword ptr [edx+10h]
                    dec ecx
                    mov edi, dword ptr [edx+20h]
                    cld
                    mov dl, 80h
                    mov al, byte ptr [esi]
                    dec eax
                    inc esi
                    mov byte ptr [edi], al
                    dec eax
                    inc edi
                    mov ebx, 00000002h
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    jnc 00007F0A44DA7AD6h
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    jnc 00007F0A44DA7B50h
                    xor eax, eax
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    jnc 00007F0A44DA7BF8h
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    adc eax, eax
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    adc eax, eax
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    adc eax, eax
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    adc eax, eax
                    je 00007F0A44DA7AFBh
                    push edi
                    mov eax, eax
                    dec eax
                    sub edi, eax
                    mov al, byte ptr [edi]
                    pop edi
                    mov byte ptr [edi], al
                    dec eax
                    inc edi
                    mov ebx, 00000002h
                    jmp 00007F0A44DA7A7Ah
                    mov eax, 00000001h
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    adc eax, eax
                    add dl, dl
                    jne 00007F0A44DA7AF9h
                    mov dl, byte ptr [esi]
                    dec eax
                    inc esi
                    adc dl, dl
                    jc 00007F0A44DA7AD8h
                    sub eax, ebx
                    mov ebx, 00000001h
                    jne 00007F0A44DA7B20h
                    mov ecx, 00000001h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x4b40e40x160.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4b60000x1e4.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x23832000x359b8.bhnb
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x37520000x10.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x4b50180x28.tls
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    0x10000x3117bf0x17f20090584633929883ccf7bd949847b5f933unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    0x3130000x131fe60x642003ce3e6a2b665a0cba7543ab346ea701eFalse0.9884494967228464data7.967722916173756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    0x4450000x395900x1ee008b4722ff9bde9def87c7c9db204e2dacFalse0.997327302631579data7.980826378015273IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x47f0000x27c000x15a00ae39fca3d4d336ec4b89bef282fa4da1False0.9357952492774566OpenPGP Public Key7.639174288639525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    0x4a70000xf40x20043705aebb240ab792fe8de0b0e267a8fFalse0.30859375data2.6102546981887302IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    0x4a80000x1e80x200f900991f0e5afd193bd87a37ce42f60bFalse0.578125data4.796281619111505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    0x4a90000xa1640x44002a5e604efc34ebb33ea6959f3baa4340False0.9507697610294118data7.869525233927884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .idata0x4b40000x10000x40020634607a89b9b499059f8c447c8ac0fFalse0.2626953125data2.2499948325101418IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .tls0x4b50000x10000x2003ef58f471990ed2fd6b612d91337872cFalse0.0625data0.28456851570206254IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x4b60000x10000x200e692f3880af66948bf9886847bb6c35eFalse0.53515625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .bhnb0x4b70000x1f400000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .boot0x23f70000x135a4000x135a400948440173498d1792157d4696e2a79b1unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .reloc0x37520000x10000x107031894b7c72147c48baad4bf437a25aFalse1.5GLS_BINARY_LSB_FIRST2.474601752714581IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_MANIFEST0x4b60580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                    DLLImport
                    kernel32.dllGetModuleHandleA
                    WS2_32.dllioctlsocket
                    USER32.dllMessageBoxA
                    ADVAPI32.dllCryptCreateHash
                    SHELL32.dllShellExecuteW
                    bcrypt.dllBCryptGenRandom
                    ntdll.dllVerSetConditionMask
                    CRYPT32.dllCertOpenStore
                    WLDAP32.dll
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 2, 2024 17:34:14.177484035 CET49738443192.168.2.4104.26.12.205
                    Nov 2, 2024 17:34:14.177544117 CET44349738104.26.12.205192.168.2.4
                    Nov 2, 2024 17:34:14.177623034 CET49738443192.168.2.4104.26.12.205
                    Nov 2, 2024 17:34:14.350873947 CET49738443192.168.2.4104.26.12.205
                    Nov 2, 2024 17:34:14.350900888 CET44349738104.26.12.205192.168.2.4
                    Nov 2, 2024 17:34:14.971205950 CET44349738104.26.12.205192.168.2.4
                    Nov 2, 2024 17:34:14.971276045 CET49738443192.168.2.4104.26.12.205
                    Nov 2, 2024 17:34:16.049856901 CET49738443192.168.2.4104.26.12.205
                    Nov 2, 2024 17:34:16.049887896 CET44349738104.26.12.205192.168.2.4
                    Nov 2, 2024 17:34:16.049983978 CET49738443192.168.2.4104.26.12.205
                    Nov 2, 2024 17:34:16.050106049 CET44349738104.26.12.205192.168.2.4
                    Nov 2, 2024 17:34:16.050162077 CET49738443192.168.2.4104.26.12.205
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 2, 2024 17:34:12.453196049 CET6266553192.168.2.41.1.1.1
                    Nov 2, 2024 17:34:12.476638079 CET53626651.1.1.1192.168.2.4
                    Nov 2, 2024 17:34:13.679858923 CET5654253192.168.2.41.1.1.1
                    Nov 2, 2024 17:34:13.687139988 CET53565421.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Nov 2, 2024 17:34:12.453196049 CET192.168.2.41.1.1.10xc1b3Standard query (0)dullwave.ruA (IP address)IN (0x0001)false
                    Nov 2, 2024 17:34:13.679858923 CET192.168.2.41.1.1.10xc6b7Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Nov 2, 2024 17:34:13.687139988 CET1.1.1.1192.168.2.40xc6b7No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                    Nov 2, 2024 17:34:13.687139988 CET1.1.1.1192.168.2.40xc6b7No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                    Nov 2, 2024 17:34:13.687139988 CET1.1.1.1192.168.2.40xc6b7No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:12:34:07
                    Start date:02/11/2024
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exe"
                    Imagebase:0x140000000
                    File size:22'509'072 bytes
                    MD5 hash:D8188612B8EAF56CEBCEAE7C54C12426
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:12:34:07
                    Start date:02/11/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:12:34:11
                    Start date:02/11/2024
                    Path:C:\Windows\System32\cmd.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\cmd.exe /c cls
                    Imagebase:0x7ff6e1af0000
                    File size:289'792 bytes
                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    No disassembly