Windows
Analysis Report
75A0VTo3z9.exe
Overview
General Information
Sample name: | 75A0VTo3z9.exerenamed because original name is a hash value |
Original sample name: | 48d8297b4a9debaa7b777f877019ce73777fbaed.exe |
Analysis ID: | 1553817 |
MD5: | 921577c536c85169a26caf0b69a6d82d |
SHA1: | 48d8297b4a9debaa7b777f877019ce73777fbaed |
SHA256: | 4fc5f4f5462c4a65137c2121d4af6faae8e39aeb164842073a7e361527e879e5 |
Tags: | exeuser-NDA0E |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 75A0VTo3z9.exe (PID: 2556 cmdline:
"C:\Users\ user\Deskt op\75A0VTo 3z9.exe" MD5: 921577C536C85169A26CAF0B69A6D82D) - wpbcreds.exe (PID: 3788 cmdline:
"C:\Window s\SysWOW64 \fwcfg\wpb creds.exe" MD5: 921577C536C85169A26CAF0B69A6D82D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Emotet | While Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021. |
{"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAOZ9fLJ8UrI0OZURpPsR3eijAyfPj3z6\nuS75f2igmYFW2aWgNcFIzsAYQleKzD0nlCFHOo7Zf8/4wY2UW0CJ4dJEHnE/PHlz\n6uNk3pxjm7o4eCDyiJbzf+k0Azjl0q54FQIDAQAB", "C2 list": ["177.23.7.151:80", "95.85.33.23:8080", "192.232.229.54:7080", "46.101.58.37:8080", "70.32.115.157:8080", "111.67.12.221:8080", "98.13.75.196:80", "5.196.35.138:7080", "1.226.84.243:8080", "12.162.84.2:8080", "87.106.46.107:8080", "60.93.23.51:80", "51.255.165.160:8080", "45.33.77.42:8080", "209.236.123.42:8080", "219.92.13.25:80", "217.13.106.14:8080", "170.81.48.2:80", "202.29.239.162:443", "83.169.21.32:7080", "37.187.161.206:8080", "68.183.190.199:8080", "216.47.196.104:80", "104.131.41.185:8080", "177.144.130.105:443", "51.38.124.206:80", "51.75.33.127:80", "5.189.178.202:8080", "200.127.14.97:80", "202.134.4.210:7080", "186.103.141.250:443", "12.163.208.58:80", "190.115.18.139:8080", "181.129.96.162:8080", "46.105.114.137:8080", "45.46.37.97:80", "35.143.99.174:80", "185.94.252.27:443", "188.135.15.49:80", "177.74.228.34:80", "51.15.7.189:80", "105.209.235.113:8080", "212.71.237.140:8080", "24.232.228.233:80", "191.191.23.135:80", "101.187.81.254:80", "185.94.252.12:80", "152.169.22.67:80", "185.183.16.47:80", "128.92.203.42:80", "192.81.38.31:80", "138.97.60.140:8080", "64.201.88.132:80", "181.30.61.163:443", "178.211.45.66:8080", "189.2.177.210:443", "68.183.170.114:8080", "85.214.26.7:8080", "177.73.0.98:443", "70.32.84.74:8080", "201.213.177.139:80", "46.43.2.95:8080", "50.28.51.143:8080", "190.188.245.242:80", "177.129.17.170:443", "178.250.54.208:8080", "137.74.106.111:7080", "177.144.130.105:8080", "51.15.7.145:80", "192.241.143.52:8080", "138.97.60.141:7080", "94.176.234.118:443", "82.76.111.249:443", "190.24.243.186:80", "174.118.202.24:443", "149.202.72.142:7080", "70.169.17.134:80", "172.104.169.32:8080", "191.182.6.118:80", "213.197.182.158:8080", "50.121.220.50:80", "62.84.75.50:80", "77.238.212.227:80"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security |
Source: | Author: Florian Roth (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-11T18:19:48.724884+0100 | 2022930 | 1 | A Network Trojan was detected | 4.175.87.197 | 443 | 192.168.2.5 | 49707 | TCP |
2024-11-11T18:20:26.471992+0100 | 2022930 | 1 | A Network Trojan was detected | 4.175.87.197 | 443 | 192.168.2.5 | 49982 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-11T18:19:44.132415+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 177.23.7.151 | 80 | TCP |
2024-11-11T18:19:55.423980+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 95.85.33.23 | 8080 | TCP |
2024-11-11T18:20:00.010809+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49805 | 192.232.229.54 | 7080 | TCP |
2024-11-11T18:20:11.143464+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49827 | 46.101.58.37 | 8080 | TCP |
2024-11-11T18:20:23.732625+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49910 | 70.32.115.157 | 8080 | TCP |
2024-11-11T18:20:26.817308+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49983 | 111.67.12.221 | 8080 | TCP |
2024-11-11T18:20:38.793014+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49984 | 98.13.75.196 | 80 | TCP |
2024-11-11T18:20:42.795138+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49985 | 5.196.35.138 | 7080 | TCP |
2024-11-11T18:20:54.808412+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49986 | 74.58.215.226 | 80 | TCP |
2024-11-11T18:21:06.802079+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49989 | 186.70.127.199 | 8090 | TCP |
2024-11-11T18:21:19.028845+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49990 | 1.226.84.243 | 8080 | TCP |
2024-11-11T18:21:31.114013+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.5 | 49991 | 12.162.84.2 | 8080 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-11T18:19:44.132415+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 177.23.7.151 | 80 | TCP |
2024-11-11T18:19:55.423980+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 95.85.33.23 | 8080 | TCP |
2024-11-11T18:20:00.010809+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49805 | 192.232.229.54 | 7080 | TCP |
2024-11-11T18:20:11.143464+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49827 | 46.101.58.37 | 8080 | TCP |
2024-11-11T18:20:23.732625+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49910 | 70.32.115.157 | 8080 | TCP |
2024-11-11T18:20:26.817308+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49983 | 111.67.12.221 | 8080 | TCP |
2024-11-11T18:20:38.793014+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49984 | 98.13.75.196 | 80 | TCP |
2024-11-11T18:20:54.808412+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49986 | 74.58.215.226 | 80 | TCP |
2024-11-11T18:21:06.802079+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49989 | 186.70.127.199 | 8090 | TCP |
2024-11-11T18:21:19.028845+0100 | 2854388 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49990 | 1.226.84.243 | 8080 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_000B36A0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Code function: | 0_2_000B8210 | |
Source: | Code function: | 0_2_000B7E50 | |
Source: | Code function: | 0_2_000B3D10 | |
Source: | Code function: | 0_2_000B3B10 | |
Source: | Code function: | 0_2_000B7620 | |
Source: | Code function: | 0_2_000B3D37 | |
Source: | Code function: | 0_2_000B6340 | |
Source: | Code function: | 0_2_000B39B0 | |
Source: | Code function: | 0_2_000B1BE0 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_000B87E0 |
Source: | Code function: | 0_2_000B4E60 |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_000B5B01 | |
Source: | Code function: | 0_2_000B5B31 | |
Source: | Code function: | 0_2_000B5C41 | |
Source: | Code function: | 0_2_000B5D61 | |
Source: | Code function: | 0_2_000B5B71 | |
Source: | Code function: | 0_2_000B5C71 | |
Source: | Code function: | 0_2_000B5D81 | |
Source: | Code function: | 0_2_000B5DC1 | |
Source: | Code function: | 0_2_000B5BC1 | |
Source: | Code function: | 0_2_000B5CD1 | |
Source: | Code function: | 0_2_000B5BF1 |
Persistence and Installation Behavior |
---|
Source: | Executable created and started: | Jump to behavior |
Source: | PE file moved: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Malware Analysis System Evasion |
---|
Source: | Evasive API call chain: | graph_0-5712 |
Source: | Code function: | 0_2_000B4E60 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | File Volume queried: | Jump to behavior |
Source: | Code function: | 0_2_000B36A0 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_000B4C10 | |
Source: | Code function: | 0_2_000B3D10 |
Source: | Code function: | 0_2_000B6F10 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_000B8210 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Service Execution | 2 Windows Service | 2 Windows Service | 12 Masquerading | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 Process Injection | 1 Process Injection | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 11 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Hidden Files and Directories | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 1 System Service Discovery | Distributed Component Object Model | Input Capture | 111 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 File Deletion | Cached Domain Credentials | 14 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
76% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
191.182.6.118 | unknown | Brazil | 28573 | CLAROSABR | true | |
191.191.23.135 | unknown | Brazil | 28573 | CLAROSABR | true | |
94.176.234.118 | unknown | Lithuania | 62282 | RACKRAYUABRakrejusLT | true | |
177.73.0.98 | unknown | Brazil | 53184 | INBTelecomEIRELIBR | true | |
70.32.84.74 | unknown | United States | 398110 | GO-DADDY-COM-LLCUS | true | |
12.162.84.2 | unknown | United States | 7018 | ATT-INTERNET4US | true | |
170.81.48.2 | unknown | Brazil | 263634 | TACNETTELECOMBR | true | |
219.92.13.25 | unknown | Malaysia | 4788 | TMNET-AS-APTMNetInternetServiceProviderMY | true | |
213.197.182.158 | unknown | Lithuania | 15440 | BALTNETACustomersASLT | true | |
209.236.123.42 | unknown | United States | 393398 | ASN-DISUS | true | |
51.15.7.189 | unknown | France | 12876 | OnlineSASFR | true | |
51.15.7.145 | unknown | France | 12876 | OnlineSASFR | true | |
5.196.35.138 | unknown | France | 16276 | OVHFR | true | |
185.183.16.47 | unknown | Spain | 201453 | AKIWIFIAKIWIFIES | true | |
189.2.177.210 | unknown | Brazil | 4230 | CLAROSABR | true | |
51.38.124.206 | unknown | France | 16276 | OVHFR | true | |
200.127.14.97 | unknown | Argentina | 10481 | TelecomArgentinaSAAR | true | |
64.201.88.132 | unknown | United States | 21555 | LHTCUS | true | |
186.103.141.250 | unknown | Chile | 15311 | TelefonicaEmpresasCL | true | |
50.121.220.50 | unknown | United States | 5650 | FRONTIER-FRTRUS | true | |
181.129.96.162 | unknown | Colombia | 13489 | EPMTelecomunicacionesSAESPCO | true | |
68.183.190.199 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
50.28.51.143 | unknown | United States | 32244 | LIQUIDWEBUS | true | |
149.202.72.142 | unknown | France | 16276 | OVHFR | true | |
177.144.130.105 | unknown | Brazil | 27699 | TELEFONICABRASILSABR | true | |
181.30.61.163 | unknown | Argentina | 10318 | TelecomArgentinaSAAR | true | |
82.76.111.249 | unknown | Romania | 8708 | RCS-RDS73-75DrStaicoviciRO | true | |
77.238.212.227 | unknown | Bosnia and Herzegowina | 42560 | BA-TELEMACH-ASTelemachdooSarajevoBA | true | |
217.13.106.14 | unknown | Hungary | 12301 | INVITECHHU | true | |
12.163.208.58 | unknown | United States | 7018 | ATT-INTERNET4US | true | |
101.187.81.254 | unknown | Australia | 1221 | ASN-TELSTRATelstraCorporationLtdAU | true | |
62.84.75.50 | unknown | Lebanon | 42334 | BBP-ASLB | true | |
37.187.161.206 | unknown | France | 16276 | OVHFR | true | |
202.134.4.210 | unknown | Indonesia | 7713 | TELKOMNET-AS-APPTTelekomunikasiIndonesiaID | true | |
201.213.177.139 | unknown | Argentina | 10481 | TelecomArgentinaSAAR | true | |
68.183.170.114 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
177.129.17.170 | unknown | Brazil | 262807 | RedfoxTelecomunicacoesLtdaBR | true | |
85.214.26.7 | unknown | Germany | 6724 | STRATOSTRATOAGDE | true | |
1.226.84.243 | unknown | Korea Republic of | 9277 | SKB-T-AS-KRSKBroadbandCoLtdKR | true | |
51.75.33.127 | unknown | France | 16276 | OVHFR | true | |
137.74.106.111 | unknown | France | 16276 | OVHFR | true | |
46.43.2.95 | unknown | United Kingdom | 35425 | BYTEMARK-ASGB | true | |
172.104.169.32 | unknown | United States | 63949 | LINODE-APLinodeLLCUS | true | |
178.250.54.208 | unknown | United Kingdom | 20860 | IOMART-ASGB | true | |
45.33.77.42 | unknown | United States | 63949 | LINODE-APLinodeLLCUS | true | |
202.29.239.162 | unknown | Thailand | 4621 | UNINET-AS-APUNINET-TH | true | |
190.188.245.242 | unknown | Argentina | 10481 | TelecomArgentinaSAAR | true | |
74.58.215.226 | unknown | Canada | 5769 | VIDEOTRONCA | true | |
87.106.46.107 | unknown | Germany | 8560 | ONEANDONE-ASBrauerstrasse48DE | true | |
104.131.41.185 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
46.101.58.37 | unknown | Netherlands | 14061 | DIGITALOCEAN-ASNUS | true | |
177.23.7.151 | unknown | Brazil | 262886 | LansofNetLTDAMEBR | true | |
95.85.33.23 | unknown | European Union | 14061 | DIGITALOCEAN-ASNUS | true | |
98.13.75.196 | unknown | United States | 11351 | TWC-11351-NORTHEASTUS | true | |
105.209.235.113 | unknown | South Africa | 16637 | MTNNS-ASZA | true | |
216.47.196.104 | unknown | United States | 12083 | WOW-INTERNETUS | true | |
5.189.178.202 | unknown | Germany | 51167 | CONTABODE | true | |
83.169.21.32 | unknown | Germany | 8972 | GD-EMEA-DC-SXB1DE | true | |
70.32.115.157 | unknown | United States | 31815 | MEDIATEMPLEUS | true | |
190.115.18.139 | unknown | Belize | 262254 | DDOS-GUARDCORPBZ | true | |
51.255.165.160 | unknown | France | 16276 | OVHFR | true | |
212.71.237.140 | unknown | United Kingdom | 63949 | LINODE-APLinodeLLCUS | true | |
185.94.252.27 | unknown | Germany | 197890 | MEGASERVERS-DE | true | |
45.46.37.97 | unknown | United States | 11351 | TWC-11351-NORTHEASTUS | true | |
178.211.45.66 | unknown | Turkey | 197328 | INETLTDTR | true | |
186.70.127.199 | unknown | Ecuador | 14522 | SatnetEC | true | |
188.135.15.49 | unknown | Oman | 50010 | NAWRAS-ASSultanateofOmanOM | true | |
35.143.99.174 | unknown | United States | 33363 | BHN-33363US | true | |
174.118.202.24 | unknown | Canada | 812 | ROGERS-COMMUNICATIONSCA | true | |
192.241.143.52 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
60.93.23.51 | unknown | Japan | 17676 | GIGAINFRASoftbankBBCorpJP | true | |
128.92.203.42 | unknown | United States | 20115 | CHARTER-20115US | true | |
111.67.12.221 | unknown | Australia | 55803 | DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAU | true | |
177.74.228.34 | unknown | Brazil | 263652 | CMDNETInternetInformaticaLtdaBR | true | |
185.94.252.12 | unknown | Germany | 197890 | MEGASERVERS-DE | true | |
24.232.228.233 | unknown | Argentina | 10318 | TelecomArgentinaSAAR | true | |
138.97.60.140 | unknown | Brazil | 264130 | GISTELECOMBR | true | |
192.81.38.31 | unknown | United States | 30091 | ACCESS-CABLEUS | true | |
192.232.229.54 | unknown | United States | 46606 | UNIFIEDLAYER-AS-1US | true | |
46.105.114.137 | unknown | France | 16276 | OVHFR | true | |
152.169.22.67 | unknown | Argentina | 10318 | TelecomArgentinaSAAR | true | |
70.169.17.134 | unknown | United States | 22773 | ASN-CXA-ALL-CCI-22773-RDCUS | true | |
138.97.60.141 | unknown | Brazil | 264130 | GISTELECOMBR | true | |
190.24.243.186 | unknown | Colombia | 19429 | ETB-ColombiaCO | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1553817 |
Start date and time: | 2024-11-11 18:18:39 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 75A0VTo3z9.exerenamed because original name is a hash value |
Original Sample Name: | 48d8297b4a9debaa7b777f877019ce73777fbaed.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@3/0@0/84 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 75A0VTo3z9.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
191.182.6.118 | Get hash | malicious | Emotet | Browse |
| |
191.191.23.135 | Get hash | malicious | Emotet | Browse | ||
Get hash | malicious | Emotet | Browse | |||
94.176.234.118 | Get hash | malicious | Emotet | Browse | ||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
Get hash | malicious | Emotet | Browse | |||
177.73.0.98 | Get hash | malicious | Emotet | Browse |
| |
Get hash | malicious | Emotet | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
RACKRAYUABRakrejusLT | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
CLAROSABR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLAROSABR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 3.57045342606847 |
TrID: |
|
File name: | 75A0VTo3z9.exe |
File size: | 117'248 bytes |
MD5: | 921577c536c85169a26caf0b69a6d82d |
SHA1: | 48d8297b4a9debaa7b777f877019ce73777fbaed |
SHA256: | 4fc5f4f5462c4a65137c2121d4af6faae8e39aeb164842073a7e361527e879e5 |
SHA512: | 3b67a27f5d2346201427d1b11bed311d7cd1b7439d63790b097a79b7cc7cce8b6602a382cfc3300539a17f8d726db13a41229b6e314b87f52c9434ff68669daf |
SSDEEP: | 768:S4TAjkyUEfZGvPpNPqzvuhR/2Q293H7lbqne6ZlOS/1XlkcROFsNjle23:SYpEfoHpNSzvuhk9XxMe6/tXlLdle |
TLSH: | D4B30713BD86E7B7ED99D0F91299B1325A6BE83153434EE3633434D2CD22AE409B438D |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.../.../.../...".J.....R.p.....R.K.....Rich/...................PE..L...Imj_.............................Z............@........ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x405ad0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5F6A6D49 [Tue Sep 22 21:31:53 2020 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
call 00007F6C0921A6F0h |
mov eax, dword ptr [0040DC08h] |
test eax, eax |
jne 00007F6C09219E9Dh |
mov ecx, FC2B3A39h |
call 00007F6C092180ADh |
mov edx, CBEC572Eh |
mov ecx, eax |
call 00007F6C09218001h |
mov dword ptr [0040DC08h], eax |
push 00000000h |
call eax |
retn 0010h |
push ecx |
mov dword ptr [esp], 0000A2E6h |
add dword ptr [esp], FFFF7562h |
add dword ptr [esp], 0000A078h |
add dword ptr [esp], 0000E5E0h |
add dword ptr [esp], FFFF3334h |
xor dword ptr [esp], 0000D094h |
mov eax, dword ptr [esp] |
pop ecx |
ret |
push ecx |
mov dword ptr [esp], 0000FA5Dh |
xor dword ptr [esp], F1A223BDh |
add dword ptr [esp], FFFF6D32h |
shl dword ptr [esp], 10h |
shl dword ptr [esp], 06h |
or dword ptr [esp], F886370Ch |
xor dword ptr [esp], 7EE3CF9Fh |
xor dword ptr [esp], 8265F833h |
mov eax, dword ptr [esp] |
pop ecx |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push ecx |
mov dword ptr [esp], 0000C5A7h |
mov eax, BACF914Dh |
mov ecx, dword ptr [esp] |
mul ecx |
mov eax, CCCCCCCDh |
sub ecx, edx |
shr ecx, 1 |
add ecx, edx |
shr ecx, 05h |
mov dword ptr [esp], ecx |
add dword ptr [esp], 00005C43h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x10000 | 0x1086c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xf000 | 0x6f8 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xa414 | 0xa600 | e7cc42b73cead3402805381dd905f35a | False | 0.5446159638554217 | data | 6.784082086728776 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xc000 | 0x2 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xd000 | 0x18bc | 0xc00 | 4167e51df8e443e63cd314d7aedaa4d7 | False | 0.8297526041666666 | data | 7.290256002041044 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0xf000 | 0x6f8 | 0x800 | 5badcb3381e3a2c196449dac289bce10 | False | 0.77197265625 | data | 6.257800178446006 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x10000 | 0x1086c | 0x10a00 | 6f6ad4f970d17eba523a27c49c1a5aff | False | 0.0026580122180451127 | data | 0.010291792732545248 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_RCDATA | 0x1006c | 0x10800 | data | 0.0019679214015151515 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-11T18:19:44.132415+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49704 | 177.23.7.151 | 80 | TCP |
2024-11-11T18:19:44.132415+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49704 | 177.23.7.151 | 80 | TCP |
2024-11-11T18:19:48.724884+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.175.87.197 | 443 | 192.168.2.5 | 49707 | TCP |
2024-11-11T18:19:55.423980+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49705 | 95.85.33.23 | 8080 | TCP |
2024-11-11T18:19:55.423980+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49705 | 95.85.33.23 | 8080 | TCP |
2024-11-11T18:20:00.010809+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49805 | 192.232.229.54 | 7080 | TCP |
2024-11-11T18:20:00.010809+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49805 | 192.232.229.54 | 7080 | TCP |
2024-11-11T18:20:11.143464+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49827 | 46.101.58.37 | 8080 | TCP |
2024-11-11T18:20:11.143464+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49827 | 46.101.58.37 | 8080 | TCP |
2024-11-11T18:20:23.732625+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49910 | 70.32.115.157 | 8080 | TCP |
2024-11-11T18:20:23.732625+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49910 | 70.32.115.157 | 8080 | TCP |
2024-11-11T18:20:26.471992+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.175.87.197 | 443 | 192.168.2.5 | 49982 | TCP |
2024-11-11T18:20:26.817308+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49983 | 111.67.12.221 | 8080 | TCP |
2024-11-11T18:20:26.817308+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49983 | 111.67.12.221 | 8080 | TCP |
2024-11-11T18:20:38.793014+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49984 | 98.13.75.196 | 80 | TCP |
2024-11-11T18:20:38.793014+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49984 | 98.13.75.196 | 80 | TCP |
2024-11-11T18:20:42.795138+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49985 | 5.196.35.138 | 7080 | TCP |
2024-11-11T18:20:54.808412+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49986 | 74.58.215.226 | 80 | TCP |
2024-11-11T18:20:54.808412+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49986 | 74.58.215.226 | 80 | TCP |
2024-11-11T18:21:06.802079+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49989 | 186.70.127.199 | 8090 | TCP |
2024-11-11T18:21:06.802079+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49989 | 186.70.127.199 | 8090 | TCP |
2024-11-11T18:21:19.028845+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49990 | 1.226.84.243 | 8080 | TCP |
2024-11-11T18:21:19.028845+0100 | 2854388 | ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 | 1 | 192.168.2.5 | 49990 | 1.226.84.243 | 8080 | TCP |
2024-11-11T18:21:31.114013+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.5 | 49991 | 12.162.84.2 | 8080 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 11, 2024 18:19:42.372733116 CET | 49704 | 80 | 192.168.2.5 | 177.23.7.151 |
Nov 11, 2024 18:19:42.377868891 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:42.377938986 CET | 49704 | 80 | 192.168.2.5 | 177.23.7.151 |
Nov 11, 2024 18:19:42.378078938 CET | 49704 | 80 | 192.168.2.5 | 177.23.7.151 |
Nov 11, 2024 18:19:42.378108025 CET | 49704 | 80 | 192.168.2.5 | 177.23.7.151 |
Nov 11, 2024 18:19:42.382910967 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:42.382934093 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:42.382953882 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:42.382962942 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:42.382973909 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:44.132297039 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:44.132415056 CET | 49704 | 80 | 192.168.2.5 | 177.23.7.151 |
Nov 11, 2024 18:19:44.132607937 CET | 49704 | 80 | 192.168.2.5 | 177.23.7.151 |
Nov 11, 2024 18:19:44.132613897 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:44.132657051 CET | 49704 | 80 | 192.168.2.5 | 177.23.7.151 |
Nov 11, 2024 18:19:44.137605906 CET | 80 | 49704 | 177.23.7.151 | 192.168.2.5 |
Nov 11, 2024 18:19:46.931725979 CET | 49705 | 8080 | 192.168.2.5 | 95.85.33.23 |
Nov 11, 2024 18:19:47.083909035 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:47.084053040 CET | 49705 | 8080 | 192.168.2.5 | 95.85.33.23 |
Nov 11, 2024 18:19:47.084258080 CET | 49705 | 8080 | 192.168.2.5 | 95.85.33.23 |
Nov 11, 2024 18:19:47.084319115 CET | 49705 | 8080 | 192.168.2.5 | 95.85.33.23 |
Nov 11, 2024 18:19:47.089044094 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:47.089164019 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:47.089174986 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:47.089210033 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:47.089219093 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:55.423873901 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:55.423979998 CET | 49705 | 8080 | 192.168.2.5 | 95.85.33.23 |
Nov 11, 2024 18:19:55.424099922 CET | 49705 | 8080 | 192.168.2.5 | 95.85.33.23 |
Nov 11, 2024 18:19:55.429027081 CET | 8080 | 49705 | 95.85.33.23 | 192.168.2.5 |
Nov 11, 2024 18:19:59.600291967 CET | 49805 | 7080 | 192.168.2.5 | 192.232.229.54 |
Nov 11, 2024 18:19:59.605340004 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:19:59.605442047 CET | 49805 | 7080 | 192.168.2.5 | 192.232.229.54 |
Nov 11, 2024 18:19:59.605706930 CET | 49805 | 7080 | 192.168.2.5 | 192.232.229.54 |
Nov 11, 2024 18:19:59.605763912 CET | 49805 | 7080 | 192.168.2.5 | 192.232.229.54 |
Nov 11, 2024 18:19:59.610676050 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:19:59.610794067 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:19:59.610805035 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:19:59.610816956 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:19:59.610827923 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:20:00.010669947 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:20:00.010808945 CET | 49805 | 7080 | 192.168.2.5 | 192.232.229.54 |
Nov 11, 2024 18:20:00.011029005 CET | 49805 | 7080 | 192.168.2.5 | 192.232.229.54 |
Nov 11, 2024 18:20:00.016829014 CET | 7080 | 49805 | 192.232.229.54 | 192.168.2.5 |
Nov 11, 2024 18:20:02.799365997 CET | 49827 | 8080 | 192.168.2.5 | 46.101.58.37 |
Nov 11, 2024 18:20:02.804371119 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:02.804505110 CET | 49827 | 8080 | 192.168.2.5 | 46.101.58.37 |
Nov 11, 2024 18:20:02.804625988 CET | 49827 | 8080 | 192.168.2.5 | 46.101.58.37 |
Nov 11, 2024 18:20:02.804663897 CET | 49827 | 8080 | 192.168.2.5 | 46.101.58.37 |
Nov 11, 2024 18:20:02.809525013 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:02.809536934 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:02.809566021 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:02.809575081 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:02.809737921 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:11.143389940 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:11.143464088 CET | 49827 | 8080 | 192.168.2.5 | 46.101.58.37 |
Nov 11, 2024 18:20:11.144231081 CET | 49827 | 8080 | 192.168.2.5 | 46.101.58.37 |
Nov 11, 2024 18:20:11.150329113 CET | 8080 | 49827 | 46.101.58.37 | 192.168.2.5 |
Nov 11, 2024 18:20:14.944189072 CET | 49910 | 8080 | 192.168.2.5 | 70.32.115.157 |
Nov 11, 2024 18:20:15.393939018 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:15.394066095 CET | 49910 | 8080 | 192.168.2.5 | 70.32.115.157 |
Nov 11, 2024 18:20:15.394347906 CET | 49910 | 8080 | 192.168.2.5 | 70.32.115.157 |
Nov 11, 2024 18:20:15.394390106 CET | 49910 | 8080 | 192.168.2.5 | 70.32.115.157 |
Nov 11, 2024 18:20:15.401778936 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:15.401849031 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:15.402652979 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:15.402791977 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:15.402801991 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:23.732526064 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:23.732625008 CET | 49910 | 8080 | 192.168.2.5 | 70.32.115.157 |
Nov 11, 2024 18:20:23.732721090 CET | 49910 | 8080 | 192.168.2.5 | 70.32.115.157 |
Nov 11, 2024 18:20:23.737627029 CET | 8080 | 49910 | 70.32.115.157 | 192.168.2.5 |
Nov 11, 2024 18:20:26.273328066 CET | 49983 | 8080 | 192.168.2.5 | 111.67.12.221 |
Nov 11, 2024 18:20:26.278342009 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:26.278485060 CET | 49983 | 8080 | 192.168.2.5 | 111.67.12.221 |
Nov 11, 2024 18:20:26.278662920 CET | 49983 | 8080 | 192.168.2.5 | 111.67.12.221 |
Nov 11, 2024 18:20:26.278700113 CET | 49983 | 8080 | 192.168.2.5 | 111.67.12.221 |
Nov 11, 2024 18:20:26.283842087 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:26.283900023 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:26.283932924 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:26.283942938 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:26.284020901 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:26.817042112 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:26.817307949 CET | 49983 | 8080 | 192.168.2.5 | 111.67.12.221 |
Nov 11, 2024 18:20:26.817456007 CET | 49983 | 8080 | 192.168.2.5 | 111.67.12.221 |
Nov 11, 2024 18:20:26.822338104 CET | 8080 | 49983 | 111.67.12.221 | 192.168.2.5 |
Nov 11, 2024 18:20:30.455580950 CET | 49984 | 80 | 192.168.2.5 | 98.13.75.196 |
Nov 11, 2024 18:20:30.460555077 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:30.460633993 CET | 49984 | 80 | 192.168.2.5 | 98.13.75.196 |
Nov 11, 2024 18:20:30.460777998 CET | 49984 | 80 | 192.168.2.5 | 98.13.75.196 |
Nov 11, 2024 18:20:30.460812092 CET | 49984 | 80 | 192.168.2.5 | 98.13.75.196 |
Nov 11, 2024 18:20:30.465884924 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:30.465934992 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:30.465985060 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:30.466061115 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:30.466069937 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:38.792929888 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:38.793014050 CET | 49984 | 80 | 192.168.2.5 | 98.13.75.196 |
Nov 11, 2024 18:20:38.793102980 CET | 49984 | 80 | 192.168.2.5 | 98.13.75.196 |
Nov 11, 2024 18:20:38.797904968 CET | 80 | 49984 | 98.13.75.196 | 192.168.2.5 |
Nov 11, 2024 18:20:42.383889914 CET | 49985 | 7080 | 192.168.2.5 | 5.196.35.138 |
Nov 11, 2024 18:20:42.388889074 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:42.388978004 CET | 49985 | 7080 | 192.168.2.5 | 5.196.35.138 |
Nov 11, 2024 18:20:42.389178991 CET | 49985 | 7080 | 192.168.2.5 | 5.196.35.138 |
Nov 11, 2024 18:20:42.389218092 CET | 49985 | 7080 | 192.168.2.5 | 5.196.35.138 |
Nov 11, 2024 18:20:42.393954992 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:42.394028902 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:42.394038916 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:42.394433975 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:42.394469023 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:42.794977903 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:42.795137882 CET | 49985 | 7080 | 192.168.2.5 | 5.196.35.138 |
Nov 11, 2024 18:20:42.795342922 CET | 49985 | 7080 | 192.168.2.5 | 5.196.35.138 |
Nov 11, 2024 18:20:42.800206900 CET | 7080 | 49985 | 5.196.35.138 | 192.168.2.5 |
Nov 11, 2024 18:20:46.464622974 CET | 49986 | 80 | 192.168.2.5 | 74.58.215.226 |
Nov 11, 2024 18:20:46.469784021 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:46.469872952 CET | 49986 | 80 | 192.168.2.5 | 74.58.215.226 |
Nov 11, 2024 18:20:46.470030069 CET | 49986 | 80 | 192.168.2.5 | 74.58.215.226 |
Nov 11, 2024 18:20:46.470077991 CET | 49986 | 80 | 192.168.2.5 | 74.58.215.226 |
Nov 11, 2024 18:20:46.474996090 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:46.475016117 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:46.475025892 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:46.475037098 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:46.475272894 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:54.808249950 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:54.808412075 CET | 49986 | 80 | 192.168.2.5 | 74.58.215.226 |
Nov 11, 2024 18:20:54.808612108 CET | 49986 | 80 | 192.168.2.5 | 74.58.215.226 |
Nov 11, 2024 18:20:54.813966036 CET | 80 | 49986 | 74.58.215.226 | 192.168.2.5 |
Nov 11, 2024 18:20:58.457366943 CET | 49989 | 8090 | 192.168.2.5 | 186.70.127.199 |
Nov 11, 2024 18:20:58.462425947 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:20:58.462527990 CET | 49989 | 8090 | 192.168.2.5 | 186.70.127.199 |
Nov 11, 2024 18:20:58.462727070 CET | 49989 | 8090 | 192.168.2.5 | 186.70.127.199 |
Nov 11, 2024 18:20:58.462786913 CET | 49989 | 8090 | 192.168.2.5 | 186.70.127.199 |
Nov 11, 2024 18:20:58.467744112 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:20:58.467758894 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:20:58.467767954 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:20:58.467777967 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:20:58.467871904 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:21:06.801879883 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:21:06.802078962 CET | 49989 | 8090 | 192.168.2.5 | 186.70.127.199 |
Nov 11, 2024 18:21:06.802246094 CET | 49989 | 8090 | 192.168.2.5 | 186.70.127.199 |
Nov 11, 2024 18:21:06.806974888 CET | 8090 | 49989 | 186.70.127.199 | 192.168.2.5 |
Nov 11, 2024 18:21:10.455652952 CET | 49990 | 8080 | 192.168.2.5 | 1.226.84.243 |
Nov 11, 2024 18:21:10.671499968 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:10.671633005 CET | 49990 | 8080 | 192.168.2.5 | 1.226.84.243 |
Nov 11, 2024 18:21:10.671874046 CET | 49990 | 8080 | 192.168.2.5 | 1.226.84.243 |
Nov 11, 2024 18:21:10.671926975 CET | 49990 | 8080 | 192.168.2.5 | 1.226.84.243 |
Nov 11, 2024 18:21:10.676651001 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:10.676810026 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:10.676820040 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:10.676827908 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:10.679944992 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:19.028773069 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:19.028845072 CET | 49990 | 8080 | 192.168.2.5 | 1.226.84.243 |
Nov 11, 2024 18:21:19.028932095 CET | 49990 | 8080 | 192.168.2.5 | 1.226.84.243 |
Nov 11, 2024 18:21:19.033759117 CET | 8080 | 49990 | 1.226.84.243 | 192.168.2.5 |
Nov 11, 2024 18:21:22.755518913 CET | 49991 | 8080 | 192.168.2.5 | 12.162.84.2 |
Nov 11, 2024 18:21:22.760776997 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
Nov 11, 2024 18:21:22.760898113 CET | 49991 | 8080 | 192.168.2.5 | 12.162.84.2 |
Nov 11, 2024 18:21:22.761102915 CET | 49991 | 8080 | 192.168.2.5 | 12.162.84.2 |
Nov 11, 2024 18:21:22.761157990 CET | 49991 | 8080 | 192.168.2.5 | 12.162.84.2 |
Nov 11, 2024 18:21:22.765904903 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
Nov 11, 2024 18:21:22.766053915 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
Nov 11, 2024 18:21:22.766063929 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
Nov 11, 2024 18:21:22.766098976 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
Nov 11, 2024 18:21:22.766235113 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
Nov 11, 2024 18:21:31.113861084 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
Nov 11, 2024 18:21:31.114012957 CET | 49991 | 8080 | 192.168.2.5 | 12.162.84.2 |
Nov 11, 2024 18:21:31.114120960 CET | 49991 | 8080 | 192.168.2.5 | 12.162.84.2 |
Nov 11, 2024 18:21:31.118925095 CET | 8080 | 49991 | 12.162.84.2 | 192.168.2.5 |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 177.23.7.151 | 80 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:19:42.378078938 CET | 602 | OUT | |
Nov 11, 2024 18:19:42.378108025 CET | 4676 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 95.85.33.23 | 8080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:19:47.084258080 CET | 535 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49805 | 192.232.229.54 | 7080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:19:59.605706930 CET | 541 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49827 | 46.101.58.37 | 8080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:20:02.804625988 CET | 657 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49910 | 70.32.115.157 | 8080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:20:15.394347906 CET | 539 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49983 | 111.67.12.221 | 8080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:20:26.278662920 CET | 539 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49984 | 98.13.75.196 | 80 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:20:30.460777998 CET | 626 | OUT | |
Nov 11, 2024 18:20:30.460812092 CET | 4644 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49985 | 5.196.35.138 | 7080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:20:42.389178991 CET | 673 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49986 | 74.58.215.226 | 80 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:20:46.470030069 CET | 530 | OUT | |
Nov 11, 2024 18:20:46.470077991 CET | 4644 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.5 | 49989 | 186.70.127.199 | 8090 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:20:58.462727070 CET | 613 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.5 | 49990 | 1.226.84.243 | 8080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:21:10.671874046 CET | 583 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.5 | 49991 | 12.162.84.2 | 8080 | 3788 | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 11, 2024 18:21:22.761102915 CET | 487 | OUT |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 12:19:29 |
Start date: | 11/11/2024 |
Path: | C:\Users\user\Desktop\75A0VTo3z9.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb0000 |
File size: | 117'248 bytes |
MD5 hash: | 921577C536C85169A26CAF0B69A6D82D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 12:19:29 |
Start date: | 11/11/2024 |
Path: | C:\Windows\SysWOW64\fwcfg\wpbcreds.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb0000 |
File size: | 117'248 bytes |
MD5 hash: | 921577C536C85169A26CAF0B69A6D82D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 6.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 11.4% |
Total number of Nodes: | 1022 |
Total number of Limit Nodes: | 11 |
Graph
Function 000B7E50 Relevance: 9.0, APIs: 3, Strings: 2, Instructions: 237fileCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B8210 Relevance: 8.9, APIs: 1, Strings: 4, Instructions: 193fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B36A0 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 212fileCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B9680 Relevance: 12.4, APIs: 2, Strings: 5, Instructions: 200memoryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B2EA0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 142memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B4990 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 87processCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B40D0 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 30memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B5AD0 Relevance: 3.0, APIs: 2, Instructions: 13COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B3460 Relevance: 1.6, APIs: 1, Instructions: 63fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B6E70 Relevance: 1.5, APIs: 1, Instructions: 45libraryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B4E60 Relevance: 10.2, Strings: 8, Instructions: 226COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B7620 Relevance: 7.7, Strings: 6, Instructions: 242COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B87E0 Relevance: 5.2, Strings: 4, Instructions: 161COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B3D10 Relevance: 3.9, Strings: 3, Instructions: 102COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B3D37 Relevance: 3.8, Strings: 3, Instructions: 83COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B3B10 Relevance: 3.8, Strings: 3, Instructions: 77COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B39B0 Relevance: 3.8, Strings: 3, Instructions: 72COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B1BE0 Relevance: .1, Instructions: 105COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000B4C10 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|