Windows
Analysis Report
SolPen.exe
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- SolPen.exe (PID: 6848 cmdline:
"C:\Users\ user\Deskt op\SolPen. exe" MD5: 3F743B632A0A52E5D8BA262C13134B17) - cmd.exe (PID: 408 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Ba ttle Battl e.cmd & Ba ttle.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 2748 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6776 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 3640 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5896 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 1436 cmdline:
cmd /c md 701961 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 6472 cmdline:
findstr /V "Cigarett eSmallPlat esCalgary" Tits MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 1200 cmdline:
cmd /c cop y /b ..\Re lationship + ..\Play ing + ..\C losely + . .\Reducing + ..\Inve ntory + .. \Kingdom + ..\Suppos e j MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Puts.com (PID: 5960 cmdline:
Puts.com j MD5: 78BA0653A340BAC5FF152B21A83626CC) - choice.exe (PID: 6412 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-17T20:34:55.293581+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49838 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:56.639858+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49845 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:57.918738+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49854 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:59.164492+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49861 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:00.805303+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49871 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:02.282969+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49879 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:03.774093+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49890 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:07.523541+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49911 | 172.67.128.233 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-17T20:34:55.915640+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49838 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:57.166666+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49845 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:08.405636+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49911 | 172.67.128.233 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-17T20:34:55.915640+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49838 | 172.67.128.233 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-17T20:34:57.166666+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49845 | 172.67.128.233 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-17T20:34:58.517037+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49854 | 172.67.128.233 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062FC |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 11 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | 11 Input Capture | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
18% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
battle-curbe.cyou | 172.67.128.233 | true | true | unknown | |
QbeMCwQrsKPS.QbeMCwQrsKPS | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.128.233 | battle-curbe.cyou | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1557219 |
Start date and time: | 2024-11-17 20:33:22 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SolPen.exe |
Detection: | MAL |
Classification: | mal96.troj.spyw.evad.winEXE@22/13@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: SolPen.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, Amadey, Credential Flusher, LummaC Stealer, Panda Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\701961\Puts.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | RedLine | Browse | |||
Get hash | malicious | AsyncRAT, AveMaria, StormKitty, VenomRAT | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Unknown | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 943784 |
Entropy (8bit): | 6.625461630496363 |
Encrypted: | false |
SSDEEP: | 24576:FJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:FC7hGOSPT/PxebaiO |
MD5: | 78BA0653A340BAC5FF152B21A83626CC |
SHA1: | B12DA9CB5D024555405040E65AD89D16AE749502 |
SHA-256: | 05D8CF394190F3A707ABFB25FB44D7DA9D5F533D7D2063B23C00CC11253C8BE7 |
SHA-512: | EFB75E4C1E0057FFB47613FD5AAE8CE3912B1558A4B74DBF5284C942EAC78ECD9ACA98F7C1E0E96EC38E8177E58FFDF54F2EB0385E73EEF39E8A2CE611237317 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 517871 |
Entropy (8bit): | 7.999633155090557 |
Encrypted: | true |
SSDEEP: | 12288:4xAxUy3Kulezxs7KGqxGTyTLbxpwuptd5FGt69AYTWg:sAxkulezhGqYTyrxpwuptd5EQ9P |
MD5: | B4E6782B85BD29593DC52C87C0C00312 |
SHA1: | 784B595BA81BDB9093CA3C3228188ECAC613DEFD |
SHA-256: | F11BFA5482BEDA3C3E7C4A86797E8C2BE7D640D7FBA4B469F90962CC0A64D4B3 |
SHA-512: | D769498C6BB62929584CC74549C1D1ABC77A1B0DFF0468A00742F74A1615354AC0CC2FB2C9237635FFEA53072D793B2C6133359F01C78988924959E734036EEF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11611 |
Entropy (8bit): | 5.1413164768389805 |
Encrypted: | false |
SSDEEP: | 192:/EotvOz1fIr2anFrInFZZ2q/rDXylaQMoZ9Ri3mmrO8LanuO8N+EoEWDO9evo2vQ:3VU1fIrBG3/3ylaQpnSmmC8LauO8sEoa |
MD5: | B468E489F7478DD1AB553F2A8AC7DD9B |
SHA1: | 4AC8E9CF88787F01255E349620A55A7BCFC7FC35 |
SHA-256: | 507CDA0B4A35A655C4396515401F7CC68ED71DCEA35139840EE841F3D4FB3B07 |
SHA-512: | 5D926CB49A7B8E3E57F392D64DF2B684AB9602379493EE3976ADBE24EB30A87E2FEA74E2C8E21EDAE7A7DD3483AE9C6AE788DC3889D22DFD7A51E29E632591D5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11611 |
Entropy (8bit): | 5.1413164768389805 |
Encrypted: | false |
SSDEEP: | 192:/EotvOz1fIr2anFrInFZZ2q/rDXylaQMoZ9Ri3mmrO8LanuO8N+EoEWDO9evo2vQ:3VU1fIrBG3/3ylaQpnSmmC8LauO8sEoa |
MD5: | B468E489F7478DD1AB553F2A8AC7DD9B |
SHA1: | 4AC8E9CF88787F01255E349620A55A7BCFC7FC35 |
SHA-256: | 507CDA0B4A35A655C4396515401F7CC68ED71DCEA35139840EE841F3D4FB3B07 |
SHA-512: | 5D926CB49A7B8E3E57F392D64DF2B684AB9602379493EE3976ADBE24EB30A87E2FEA74E2C8E21EDAE7A7DD3483AE9C6AE788DC3889D22DFD7A51E29E632591D5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61440 |
Entropy (8bit): | 7.997269555598351 |
Encrypted: | true |
SSDEEP: | 1536:cxwxOD1l+dSjGNB+AlZDvNdeoLrnjmrn2cUUP5HGClMEkJ:cxHD1tjGNTvBrnajlp3SEC |
MD5: | FA2E55CF1A770C71E719D461D4387EB9 |
SHA1: | CC65F46982D93A1E629CBC1C9AD968940B2BDD74 |
SHA-256: | E806C729C9E72295A20290418A5D9A3DA99545B71E8DA2FB7567346A19A52D8F |
SHA-512: | 1FD4AB24F80A4CFBF8343E0F0AF055F03151EFF43FE3B9081650BECBC2A3B276F9FA083B54CA5C9DC306F511E12CC48117E3D462FA22986DFF79C36BF38B9823 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74752 |
Entropy (8bit): | 7.998199557715884 |
Encrypted: | true |
SSDEEP: | 1536:9dAgd/SI4S7ZZ/GcMi2FLKlLG9ljZfkVwhJaryWhFNaFR7YJBZdg5MC6iGtli:fACLfALW4JCVwhJpkNU35LZ7 |
MD5: | DC2906AAE8ABF4E2E1541ED078112ADA |
SHA1: | 9538D56FBD8ACB57F62437F68019AC6055A40E4D |
SHA-256: | 7CF33FD97326F3CAAC0C005D6C17CAD3BEE8588DE8F92F9731A3846CB1475002 |
SHA-512: | F977C0380DDEC015A4C0349B8FC0883E8C77236E46D91CEA9BD447BED665FCB6582B3372986735AF85BDA5680FA8F60A8C00C1EC3DDD827C466AEEAABD072606 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 96256 |
Entropy (8bit): | 7.998286456517395 |
Encrypted: | true |
SSDEEP: | 1536:FKnMLoKw4WpkP2ohtDdIS3aGwJNCBXp4zeOyBy/kf0ygssFYf5XQ5Rl0S6FLbGDw:8MLoKAkLFISKdjIXBz5A5kS6haDBAuhE |
MD5: | 87DEB0E74BC8FD2AE4AC39FAD86F7544 |
SHA1: | D465935D4EB28029F61E5DBCF98B85416A51ECD3 |
SHA-256: | 9215EC62BC6473F16955E39B4B36016E80604853A3F3AF2E2C26338673EA3F0B |
SHA-512: | A5FE490F74316BE7F8DF51FF7FE01BC9EE97DE0B574C8A0A9550E9761729EE21F8E0F0ACD16B26B7C2FF5CB7D7CFC5040A366886958D94AC645252CF609371A1 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 7.997411691237014 |
Encrypted: | true |
SSDEEP: | 1536:/fnWeQEMxL9Sx3IPu5BQlKQKZfZ+zb/5KmXgyIuZ2C0S5/YEnn:nnJMGxj5ylKQKmfRKygvusxSJn |
MD5: | 9847BFC360FDAE334C6F1CA9C50BE501 |
SHA1: | 600323C36F2E0ADF7C555F89E892EB1059A031FB |
SHA-256: | E51AD11AB6DD79FEF226FE7EB61E8F749A46B33D1212BF1C5EA76C5E4CC927CB |
SHA-512: | 1259219261256FA9012A300F7A4667AB4C0E2BC57D56232E4BA83C06B9CAF6500F7D4A3FCF312E1B78A2CB3D1803899DC0C5F3F97116A42C12B3C1CFB14BA0AF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.997638584474584 |
Encrypted: | true |
SSDEEP: | 1536:bHwTrWBRH0i0qjXCsllovjSMrcbglllZTJBm:LRH0i0qDCjLOb8xTJBm |
MD5: | 3444CAB11B6809CBE675B9F64828A65C |
SHA1: | 615CF824D3CBD00BE15D1F085C5B3FD6BC0422FF |
SHA-256: | 0050C8566416FD7BD6F45ABC6D053BF2FF9FB45BFD1141A7A0B1B047B860CD94 |
SHA-512: | 98A09564F42220A3A0AD55348EFD92C92BA97BC1451EB675DF1FD413A6AFF90E9D8C7F2DBC349FE1EE560ED0BB30FFB1E79A20806B67E18960F9D68F2A6AA1A1 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.997890113667306 |
Encrypted: | true |
SSDEEP: | 1536:nbPuF48xIwLoTlCmoMfsn77SfudEiYUZC41OB9K5d3Uz36OAuRxxldgxhscnf:nk/xIfRxfs77SfQYyC4IB9K/3U+OAuRU |
MD5: | 93BF8C8B82622A4045265138BB4C51AE |
SHA1: | 6B5DA660E66ACA669D203C6B522AFFC3A06F0347 |
SHA-256: | 5F5C51D9A18AA81535E2F71CC681F8012369048F4886D45DA3783BEB5215DB71 |
SHA-512: | 371B4D3A76405E5553D9B9A56ACC7D636161FB93274E08A64A953C411F3E039390FF5235AF7E9DF3FEF2C73C3375800D04662313EBA5C0589027CB49A0ADDDE8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 943550 |
Entropy (8bit): | 6.625315424935375 |
Encrypted: | false |
SSDEEP: | 24576:jJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:jC7hGOSPT/PxebaiO |
MD5: | 663FD2C0EDE6B605CF51CDBF708D064B |
SHA1: | 90007034AC17CD96D381D67446C9A1D52D3B53F2 |
SHA-256: | 6916F08C938585B6151BC98997FF230D146A9F1013F8F5A22346AD908B062EE9 |
SHA-512: | D3EC0D440474110BC5B87505135E96E7EF5FC198B3DF50C24BF9D48B56C7587BE0CCDFD117BFF9AD4CFECFEE68A7041E250EAC5E9179CC178E281E3F87BA97ED |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55023 |
Entropy (8bit): | 7.996817684180921 |
Encrypted: | true |
SSDEEP: | 1536:odBmGfgJ3dmSt2Y3lC3UjZY56/V9wmlqJOP:odBmjTHgY1CEjm8VCmIsP |
MD5: | 81A6D18B69F315FE47286A6D8C270A05 |
SHA1: | 727A37E936E503AFC7BF19B209E641AEBD423FD6 |
SHA-256: | F47E3E89169A13F01AD4899328B8B3E8CC746028631FDF3D2FEC816A612754D7 |
SHA-512: | A7055C1871C5C1E371DAF0BBB6971DFF273C546989CF5BB748078FC3A84449F1B8FBBA81C6D30E969985D40E168158D71C80C195F4F0326C0BAC501F4A223EE9 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SolPen.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 263 |
Entropy (8bit): | 5.1081162865604774 |
Encrypted: | false |
SSDEEP: | 6:T4Acj4zYUw9qjvVg3F+X32Cxscu7D6xp6sx6lFT2r:T4ALYUw9yGSGCqcQex0FA |
MD5: | 57D598BB11C33379FE385DFF81C08519 |
SHA1: | F6253EB3026C6C6C877E896B6BAEAF52AD89256F |
SHA-256: | 3714555DF8F9AD0598BB38E64EB6F1164FA242D8EFBF541373BBEED392BC4E6E |
SHA-512: | C73EF7E89C5BCA387D0795BBB58547222E59AF48AAFC12A9F0C7757107AC0E7C4DF5F41DC0BF91136984F826D7916BDCB3132B3A06C85231EDEC5A55EC327575 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.035353320065626 |
TrID: |
|
File name: | SolPen.exe |
File size: | 10'496'122 bytes |
MD5: | 3f743b632a0a52e5d8ba262c13134b17 |
SHA1: | 3a0938ca3cccf15af99258c070620e5809a8eaa8 |
SHA256: | 5553e4e355ee0dade1223c455c8232a49a1b53d7f55bfcd27f6aeaff166f67bf |
SHA512: | 60813c38db484fa365da3fe37f86a49d3e671e7f9fedcd8082696cf7160a171b5ecb5fd7ee0a76577ae585f3481a1866607a919a2a3efd80553bab9356e17326 |
SSDEEP: | 24576:q2T2ETkozkFJ22KXLyGPMK2p/2lYRfKDgJ4tfG2i5:b2ETuFJVCLJGpOlYRiUJ4U2i5 |
TLSH: | 1DB655A99B8FB35E024B5B4EBAF11806933250A335418BBE3CEF64450657B4867E7373 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8..... |
Icon Hash: | b170d4d4d4e87183 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F429788727974C52EF1B4CD93D03B8F |
Thumbprint SHA-1: | CD7BE0F00F2A5EE102C3037E098AF3F457D3B1AB |
Thumbprint SHA-256: | 4B59D847D7187ED910590D52798FD7E6FCB13396092FDBC1FE43B2311AAB6EEB |
Serial: | 060E2F8F9E1B8BE518D5FE2B69CFCCB1 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F669507342Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F669507310Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F66950730FBh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F66950709FAh |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F6695072DD1h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F6695070A83h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F66950709FAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x181e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xa00012 | 0x2868 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x181e | 0x1a00 | 0616e836336f8093bf4565d61a7af885 | False | 0.45072115384615385 | data | 4.397786605022115 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xf6000 | 0xf32 | 0x1000 | 5c9850b0c8b38cf5e0b2665b13213c20 | False | 0.599609375 | data | 5.517617619608361 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf4190 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.48360655737704916 |
RT_DIALOG | 0xf52b8 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0xf53b8 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0xf54d4 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0xf5534 | 0x14 | data | English | United States | 1.05 |
RT_MANIFEST | 0xf5548 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-17T20:34:55.293581+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49838 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:55.915640+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49838 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:55.915640+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49838 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:56.639858+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49845 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:57.166666+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49845 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:57.166666+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49845 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:57.918738+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49854 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:58.517037+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49854 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:34:59.164492+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49861 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:00.805303+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49871 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:02.282969+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49879 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:03.774093+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49890 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:07.523541+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49911 | 172.67.128.233 | 443 | TCP |
2024-11-17T20:35:08.405636+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49911 | 172.67.128.233 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 17, 2024 20:34:54.669509888 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:54.669557095 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:54.669646025 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:54.671158075 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:54.671174049 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.293329000 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.293581009 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.298197031 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.298203945 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.298465967 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.352797985 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.367042065 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.367074013 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.367122889 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.915667057 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.915757895 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.916138887 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.917467117 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.917481899 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:55.917500019 CET | 49838 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:55.917505026 CET | 443 | 49838 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:56.026923895 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:56.026951075 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:56.027107954 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:56.028382063 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:56.028393984 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:56.639749050 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:56.639858007 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:56.641490936 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:56.641500950 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:56.642098904 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:56.643721104 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:56.643757105 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:56.643855095 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166671991 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166717052 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166743994 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166775942 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166801929 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166806936 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.166825056 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166835070 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166841984 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.166870117 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.166919947 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.166959047 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.166969061 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.212385893 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.212418079 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.259052038 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.284020901 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.284095049 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.284132957 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.284149885 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.284168959 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.284420967 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.284435034 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.284482002 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.284630060 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.284643888 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.284672976 CET | 49845 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.284678936 CET | 443 | 49845 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.313123941 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.313193083 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.313378096 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.313668966 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.313678980 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.918633938 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.918737888 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.919856071 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.919864893 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.920262098 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:57.921415091 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.921561956 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:57.921591043 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:58.517086029 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:58.517328024 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:58.517385960 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:58.517420053 CET | 49854 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:58.517433882 CET | 443 | 49854 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:58.534061909 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:58.534146070 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:58.534343958 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:58.534667969 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:58.534708977 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.164376974 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.164491892 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:59.165824890 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:59.165854931 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.166274071 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.167362928 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:59.167507887 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:59.167602062 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.167669058 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:59.167682886 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.960886955 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.961003065 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:34:59.961081982 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:59.961272955 CET | 49861 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:34:59.961293936 CET | 443 | 49861 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:00.038382053 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.038482904 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:00.038575888 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.038932085 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.038966894 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:00.805201054 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:00.805303097 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.806579113 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.806608915 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:00.807455063 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:00.812446117 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.812616110 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.812661886 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:00.812764883 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:00.812781096 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:01.579488993 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:01.579607964 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:01.579667091 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:01.579750061 CET | 49871 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:01.579771042 CET | 443 | 49871 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:01.656393051 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:01.656430960 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:01.656510115 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:01.656816006 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:01.656833887 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:02.282898903 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:02.282968998 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:02.287425995 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:02.287445068 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:02.287863970 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:02.290731907 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:02.291033983 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:02.291038990 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:02.868248940 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:02.868498087 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:02.868587971 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:02.868762016 CET | 49879 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:02.868774891 CET | 443 | 49879 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.154761076 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.154809952 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.154876947 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.155277014 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.155289888 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.774019003 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.774092913 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.775279999 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.775285006 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.776251078 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.778156996 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.778889894 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.778949022 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.779068947 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.779115915 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.779220104 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.779241085 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.779324055 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.779479980 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.779500961 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.779547930 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.779613972 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.779818058 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.779844999 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.779989004 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.780018091 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.780035019 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.780041933 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.780165911 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.780194044 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.780210972 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.780229092 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.780334949 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.780366898 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.789351940 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.789671898 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.789704084 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:03.789730072 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.789768934 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:03.793246031 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:06.910896063 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:06.911180973 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:06.911254883 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:06.911407948 CET | 49890 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:06.911432981 CET | 443 | 49890 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:06.912826061 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:06.912919998 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:06.913583994 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:06.914407015 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:06.914441109 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:07.523453951 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:07.523540974 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:07.617645979 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:07.617681026 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:07.618130922 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:07.656696081 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:07.656723022 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:07.656790972 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:08.405693054 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:08.405930042 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:08.406022072 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:08.406363010 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:08.406414986 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Nov 17, 2024 20:35:08.406445980 CET | 49911 | 443 | 192.168.2.5 | 172.67.128.233 |
Nov 17, 2024 20:35:08.406462908 CET | 443 | 49911 | 172.67.128.233 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 17, 2024 20:34:18.961772919 CET | 63218 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 17, 2024 20:34:18.970316887 CET | 53 | 63218 | 1.1.1.1 | 192.168.2.5 |
Nov 17, 2024 20:34:54.624612093 CET | 49652 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 17, 2024 20:34:54.661844015 CET | 53 | 49652 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 17, 2024 20:34:18.961772919 CET | 192.168.2.5 | 1.1.1.1 | 0x88f3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 17, 2024 20:34:54.624612093 CET | 192.168.2.5 | 1.1.1.1 | 0xe3d4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 17, 2024 20:34:18.970316887 CET | 1.1.1.1 | 192.168.2.5 | 0x88f3 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 17, 2024 20:34:54.661844015 CET | 1.1.1.1 | 192.168.2.5 | 0xe3d4 | No error (0) | 172.67.128.233 | A (IP address) | IN (0x0001) | false | ||
Nov 17, 2024 20:34:54.661844015 CET | 1.1.1.1 | 192.168.2.5 | 0xe3d4 | No error (0) | 104.21.2.80 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49838 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:34:55 UTC | 264 | OUT | |
2024-11-17 19:34:55 UTC | 8 | OUT | |
2024-11-17 19:34:55 UTC | 1017 | IN | |
2024-11-17 19:34:55 UTC | 7 | IN | |
2024-11-17 19:34:55 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49845 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:34:56 UTC | 265 | OUT | |
2024-11-17 19:34:56 UTC | 47 | OUT | |
2024-11-17 19:34:57 UTC | 1023 | IN | |
2024-11-17 19:34:57 UTC | 346 | IN | |
2024-11-17 19:34:57 UTC | 1369 | IN | |
2024-11-17 19:34:57 UTC | 1369 | IN | |
2024-11-17 19:34:57 UTC | 1369 | IN | |
2024-11-17 19:34:57 UTC | 1369 | IN | |
2024-11-17 19:34:57 UTC | 1369 | IN | |
2024-11-17 19:34:57 UTC | 1369 | IN | |
2024-11-17 19:34:57 UTC | 1045 | IN | |
2024-11-17 19:34:57 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49854 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:34:57 UTC | 277 | OUT | |
2024-11-17 19:34:57 UTC | 12799 | OUT | |
2024-11-17 19:34:58 UTC | 1022 | IN | |
2024-11-17 19:34:58 UTC | 23 | IN | |
2024-11-17 19:34:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49861 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:34:59 UTC | 282 | OUT | |
2024-11-17 19:34:59 UTC | 15071 | OUT | |
2024-11-17 19:34:59 UTC | 1019 | IN | |
2024-11-17 19:34:59 UTC | 23 | IN | |
2024-11-17 19:34:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49871 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:35:00 UTC | 276 | OUT | |
2024-11-17 19:35:00 UTC | 15331 | OUT | |
2024-11-17 19:35:00 UTC | 5194 | OUT | |
2024-11-17 19:35:01 UTC | 1017 | IN | |
2024-11-17 19:35:01 UTC | 23 | IN | |
2024-11-17 19:35:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49879 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:35:02 UTC | 275 | OUT | |
2024-11-17 19:35:02 UTC | 1196 | OUT | |
2024-11-17 19:35:02 UTC | 1020 | IN | |
2024-11-17 19:35:02 UTC | 23 | IN | |
2024-11-17 19:35:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49890 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:35:03 UTC | 278 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:03 UTC | 15331 | OUT | |
2024-11-17 19:35:06 UTC | 1031 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49911 | 172.67.128.233 | 443 | 5960 | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-17 19:35:07 UTC | 265 | OUT | |
2024-11-17 19:35:07 UTC | 82 | OUT | |
2024-11-17 19:35:08 UTC | 1022 | IN | |
2024-11-17 19:35:08 UTC | 54 | IN | |
2024-11-17 19:35:08 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:34:14 |
Start date: | 17/11/2024 |
Path: | C:\Users\user\Desktop\SolPen.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 10'496'122 bytes |
MD5 hash: | 3F743B632A0A52E5D8BA262C13134B17 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 14:34:15 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 14:34:15 |
Start date: | 17/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 14:34:16 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3f0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 14:34:16 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 14:34:17 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3f0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 14:34:17 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 14:34:17 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 14:34:17 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 14:34:17 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 14:34:17 |
Start date: | 17/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\701961\Puts.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb10000 |
File size: | 943'784 bytes |
MD5 hash: | 78BA0653A340BAC5FF152B21A83626CC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 12 |
Start time: | 14:34:17 |
Start date: | 17/11/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x90000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1526 |
Total number of Limit Nodes: | 33 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|