Windows
Analysis Report
injector V2.4.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- injector V2.4.exe (PID: 6348 cmdline:
"C:\Users\ user\Deskt op\injecto r V2.4.exe " MD5: 837840F37E344F8E7BC187F88F93C4A8) - conhost.exe (PID: 6772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - injector V2.4.exe (PID: 3720 cmdline:
"C:\Users\ user\Deskt op\injecto r V2.4.exe " MD5: 837840F37E344F8E7BC187F88F93C4A8) - injector V2.4.exe (PID: 1492 cmdline:
"C:\Users\ user\Deskt op\injecto r V2.4.exe " MD5: 837840F37E344F8E7BC187F88F93C4A8)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["peepburry828.sbs", "3xp3cts1aim.sbs", "fumblingactor.cyou", "processhol.sbs", "p10tgrace.sbs", "p3ar11fter.sbs"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T16:51:59.946351+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49710 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:02.044217+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49711 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:04.519436+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49712 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:06.697059+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49713 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:09.534774+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49714 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:12.576375+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49715 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:14.933335+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49716 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:18.362746+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49726 | 172.67.219.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T16:52:00.661859+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49710 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:02.776657+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49711 | 172.67.219.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T16:52:00.661859+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49710 | 172.67.219.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T16:52:02.776657+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49711 | 172.67.219.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T16:52:13.294353+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49715 | 172.67.219.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T16:52:14.962103+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.5 | 49716 | 172.67.219.199 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 4_2_0041941E |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00B4F680 | |
Source: | Code function: | 0_2_00B4F731 | |
Source: | Code function: | 3_2_00B4F680 | |
Source: | Code function: | 3_2_00B4F731 |
Source: | Code function: | 4_2_0040DBCA | |
Source: | Code function: | 4_2_004394C0 | |
Source: | Code function: | 4_2_0042E573 | |
Source: | Code function: | 4_2_0040CE25 | |
Source: | Code function: | 4_2_0042EED9 | |
Source: | Code function: | 4_2_0042EED9 | |
Source: | Code function: | 4_2_00423050 | |
Source: | Code function: | 4_2_00429055 | |
Source: | Code function: | 4_2_0041B87A | |
Source: | Code function: | 4_2_0041B87A | |
Source: | Code function: | 4_2_0041D834 | |
Source: | Code function: | 4_2_0041C03D | |
Source: | Code function: | 4_2_0041C03D | |
Source: | Code function: | 4_2_0041B09F | |
Source: | Code function: | 4_2_0041E8A1 | |
Source: | Code function: | 4_2_0041C951 | |
Source: | Code function: | 4_2_0043A170 | |
Source: | Code function: | 4_2_0040A130 | |
Source: | Code function: | 4_2_004241D0 | |
Source: | Code function: | 4_2_0042D9F4 | |
Source: | Code function: | 4_2_0042E986 | |
Source: | Code function: | 4_2_0042C9A0 | |
Source: | Code function: | 4_2_0042A24C | |
Source: | Code function: | 4_2_00407A50 | |
Source: | Code function: | 4_2_00407A50 | |
Source: | Code function: | 4_2_0041CA5F | |
Source: | Code function: | 4_2_00424A6F | |
Source: | Code function: | 4_2_0041CA0C | |
Source: | Code function: | 4_2_004272DE | |
Source: | Code function: | 4_2_0041B09F | |
Source: | Code function: | 4_2_0042A299 | |
Source: | Code function: | 4_2_0040A35B | |
Source: | Code function: | 4_2_0041DB1F | |
Source: | Code function: | 4_2_0041D3F0 | |
Source: | Code function: | 4_2_0042F39A | |
Source: | Code function: | 4_2_0042BBA5 | |
Source: | Code function: | 4_2_0041A45E | |
Source: | Code function: | 4_2_0041EC60 | |
Source: | Code function: | 4_2_00439C60 | |
Source: | Code function: | 4_2_0040D46E | |
Source: | Code function: | 4_2_0042C410 | |
Source: | Code function: | 4_2_00409430 | |
Source: | Code function: | 4_2_004272DE | |
Source: | Code function: | 4_2_0042BDC6 | |
Source: | Code function: | 4_2_0041A643 | |
Source: | Code function: | 4_2_00427E47 | |
Source: | Code function: | 4_2_004096C0 | |
Source: | Code function: | 4_2_00405E90 | |
Source: | Code function: | 4_2_0040AF50 | |
Source: | Code function: | 4_2_00439F60 | |
Source: | Code function: | 4_2_004367A0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 4_2_00434830 |
Source: | Code function: | 4_2_00434830 |
Source: | Code function: | 4_2_00434A10 |
Source: | Code function: | 0_2_00B3D4A0 | |
Source: | Code function: | 0_2_00B44CD0 | |
Source: | Code function: | 0_2_00B46CD0 | |
Source: | Code function: | 0_2_00B34CC0 | |
Source: | Code function: | 0_2_00B46800 | |
Source: | Code function: | 0_2_00B33440 | |
Source: | Code function: | 0_2_00B47840 | |
Source: | Code function: | 0_2_00B355F0 | |
Source: | Code function: | 0_2_00B25930 | |
Source: | Code function: | 0_2_00B41D30 | |
Source: | Code function: | 0_2_00B38129 | |
Source: | Code function: | 0_2_00B34910 | |
Source: | Code function: | 0_2_00B3DD00 | |
Source: | Code function: | 0_2_00B44170 | |
Source: | Code function: | 0_2_00B2B964 | |
Source: | Code function: | 0_2_00B32AE7 | |
Source: | Code function: | 0_2_00B55E22 | |
Source: | Code function: | 0_2_00B39B80 | |
Source: | Code function: | 0_2_00B33F80 | |
Source: | Code function: | 0_2_00B36330 | |
Source: | Code function: | 0_2_00B47330 | |
Source: | Code function: | 0_2_00B35F60 | |
Source: | Code function: | 0_2_00B41367 | |
Source: | Code function: | 0_2_00B2A36B | |
Source: | Code function: | 0_2_00B37F54 | |
Source: | Code function: | 0_2_00B3F340 | |
Source: | Code function: | 3_2_00B3C0A0 | |
Source: | Code function: | 3_2_00B21000 | |
Source: | Code function: | 3_2_00B46800 | |
Source: | Code function: | 3_2_00B47840 | |
Source: | Code function: | 3_2_00B30190 | |
Source: | Code function: | 3_2_00B2A180 | |
Source: | Code function: | 3_2_00B25930 | |
Source: | Code function: | 3_2_00B34910 | |
Source: | Code function: | 3_2_00B44170 | |
Source: | Code function: | 3_2_00B32AA0 | |
Source: | Code function: | 3_2_00B39B80 | |
Source: | Code function: | 3_2_00B37BD0 | |
Source: | Code function: | 3_2_00B36330 | |
Source: | Code function: | 3_2_00B47330 | |
Source: | Code function: | 3_2_00B3F340 | |
Source: | Code function: | 3_2_00B3D4A0 | |
Source: | Code function: | 3_2_00B44CD0 | |
Source: | Code function: | 3_2_00B46CD0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B34CC0 | |
Source: | Code function: | 3_2_00B33440 | |
Source: | Code function: | 3_2_00B355F0 | |
Source: | Code function: | 3_2_00B25540 | |
Source: | Code function: | 3_2_00B55E22 | |
Source: | Code function: | 3_2_00B3DE70 | |
Source: | Code function: | 3_2_00B23E60 | |
Source: | Code function: | 3_2_00B33F80 | |
Source: | Code function: | 3_2_00B35F60 | |
Source: | Code function: | 4_2_00423920 | |
Source: | Code function: | 4_2_00439130 | |
Source: | Code function: | 4_2_00421400 | |
Source: | Code function: | 4_2_0041941E | |
Source: | Code function: | 4_2_004394C0 | |
Source: | Code function: | 4_2_0042E573 | |
Source: | Code function: | 4_2_0043BD00 | |
Source: | Code function: | 4_2_00408D80 | |
Source: | Code function: | 4_2_00425655 | |
Source: | Code function: | 4_2_00441620 | |
Source: | Code function: | 4_2_0040CE25 | |
Source: | Code function: | 4_2_0040DE2F | |
Source: | Code function: | 4_2_0042EED9 | |
Source: | Code function: | 4_2_00428690 | |
Source: | Code function: | 4_2_00441EA0 | |
Source: | Code function: | 4_2_0041B87A | |
Source: | Code function: | 4_2_00402820 | |
Source: | Code function: | 4_2_0042A820 | |
Source: | Code function: | 4_2_00429828 | |
Source: | Code function: | 4_2_0041C03D | |
Source: | Code function: | 4_2_0041F0CA | |
Source: | Code function: | 4_2_004418D0 | |
Source: | Code function: | 4_2_00405095 | |
Source: | Code function: | 4_2_004388A0 | |
Source: | Code function: | 4_2_0043A170 | |
Source: | Code function: | 4_2_0041D1D0 | |
Source: | Code function: | 4_2_0042E986 | |
Source: | Code function: | 4_2_00432990 | |
Source: | Code function: | 4_2_004269B1 | |
Source: | Code function: | 4_2_0042A24C | |
Source: | Code function: | 4_2_00407A50 | |
Source: | Code function: | 4_2_00424A6F | |
Source: | Code function: | 4_2_00429230 | |
Source: | Code function: | 4_2_004272DE | |
Source: | Code function: | 4_2_0042DAF9 | |
Source: | Code function: | 4_2_0042A299 | |
Source: | Code function: | 4_2_0042B2A1 | |
Source: | Code function: | 4_2_00406AB0 | |
Source: | Code function: | 4_2_00437B53 | |
Source: | Code function: | 4_2_00438B00 | |
Source: | Code function: | 4_2_0041AB13 | |
Source: | Code function: | 4_2_00428B20 | |
Source: | Code function: | 4_2_0041E330 | |
Source: | Code function: | 4_2_00402BD0 | |
Source: | Code function: | 4_2_004063E0 | |
Source: | Code function: | 4_2_00409B90 | |
Source: | Code function: | 4_2_00441BB0 | |
Source: | Code function: | 4_2_0041A45E | |
Source: | Code function: | 4_2_00439C60 | |
Source: | Code function: | 4_2_0043C460 | |
Source: | Code function: | 4_2_0043CC70 | |
Source: | Code function: | 4_2_00420400 | |
Source: | Code function: | 4_2_00434420 | |
Source: | Code function: | 4_2_00440420 | |
Source: | Code function: | 4_2_00424430 | |
Source: | Code function: | 4_2_0042A4D0 | |
Source: | Code function: | 4_2_0042F54D | |
Source: | Code function: | 4_2_004272DE | |
Source: | Code function: | 4_2_004035E0 | |
Source: | Code function: | 4_2_004295E4 | |
Source: | Code function: | 4_2_0042B5F0 | |
Source: | Code function: | 4_2_00404D85 | |
Source: | Code function: | 4_2_0040B5BC | |
Source: | Code function: | 4_2_0042A643 | |
Source: | Code function: | 4_2_00427E47 | |
Source: | Code function: | 4_2_0041FE60 | |
Source: | Code function: | 4_2_0042DE02 | |
Source: | Code function: | 4_2_004096C0 | |
Source: | Code function: | 4_2_00421ECE | |
Source: | Code function: | 4_2_00430ED9 | |
Source: | Code function: | 4_2_00405E90 | |
Source: | Code function: | 4_2_0042DE92 | |
Source: | Code function: | 4_2_00418EB0 | |
Source: | Code function: | 4_2_00406F40 | |
Source: | Code function: | 4_2_0040AF50 | |
Source: | Code function: | 4_2_00403FD0 | |
Source: | Code function: | 4_2_0041F7B0 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 4_2_004394C0 |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00B5010D | |
Source: | Code function: | 3_2_00B5010D | |
Source: | Code function: | 4_3_00541650 | |
Source: | Code function: | 4_3_00541650 | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_0052F5BF | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_0052F5BF | |
Source: | Code function: | 4_3_00546868 | |
Source: | Code function: | 4_3_00546868 | |
Source: | Code function: | 4_3_00546868 | |
Source: | Code function: | 4_3_00541650 | |
Source: | Code function: | 4_3_00541650 | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00535C1A | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_00537402 | |
Source: | Code function: | 4_3_0052F5BF | |
Source: | Code function: | 4_3_00546868 |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_00B4F680 | |
Source: | Code function: | 0_2_00B4F731 | |
Source: | Code function: | 3_2_00B4F680 | |
Source: | Code function: | 3_2_00B4F731 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 4_2_0043E480 |
Source: | Code function: | 0_2_00B496AF |
Source: | Code function: | 0_2_00B5D18D | |
Source: | Code function: | 0_2_00B2D475 | |
Source: | Code function: | 0_2_00B2D07E | |
Source: | Code function: | 0_2_00B32C40 | |
Source: | Code function: | 0_2_00B32C40 | |
Source: | Code function: | 0_2_00B2CD0A | |
Source: | Code function: | 0_2_00B2E93A | |
Source: | Code function: | 0_2_00B2CD0A | |
Source: | Code function: | 0_2_00B2D6B8 | |
Source: | Code function: | 0_2_00B2D6B8 | |
Source: | Code function: | 0_2_00B2DA6C | |
Source: | Code function: | 0_2_00B32B9B | |
Source: | Code function: | 0_2_00B32B9B | |
Source: | Code function: | 0_2_00B2E350 | |
Source: | Code function: | 3_2_00B32AA0 | |
Source: | Code function: | 3_2_00B32AA0 | |
Source: | Code function: | 3_2_00B32AA0 | |
Source: | Code function: | 3_2_00B32AA0 | |
Source: | Code function: | 3_2_00B32AA0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B2CCC0 | |
Source: | Code function: | 3_2_00B2CCC0 |
Source: | Code function: | 0_2_00B4CB10 |
Source: | Code function: | 0_2_00B4902F | |
Source: | Code function: | 0_2_00B496A3 | |
Source: | Code function: | 0_2_00B496AF | |
Source: | Code function: | 0_2_00B4B79A | |
Source: | Code function: | 3_2_00B4902F | |
Source: | Code function: | 3_2_00B496A3 | |
Source: | Code function: | 3_2_00B496AF | |
Source: | Code function: | 3_2_00B4B79A |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00B5D18D |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00B498D5 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00B49566 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 11 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 141 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 4 Obfuscated Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 2 Software Packing | LSA Secrets | 11 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 33 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Win32.Trojan.Stealerc | ||
100% | Avira | HEUR/AGEN.1361736 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fumblingactor.cyou | 172.67.219.199 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.219.199 | fumblingactor.cyou | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1560307 |
Start date and time: | 2024-11-21 16:51:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 40s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | injector V2.4.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@6/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target injector V2.4.exe, PID 3720 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: injector V2.4.exe
Time | Type | Description |
---|---|---|
10:52:00 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.219.199 | Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fumblingactor.cyou | Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 7.6938188325289145 |
TrID: |
|
File name: | injector V2.4.exe |
File size: | 587'904 bytes |
MD5: | 837840f37e344f8e7bc187f88f93c4a8 |
SHA1: | 782edf606d07812ec71254cc9cf2260da2e3fd51 |
SHA256: | 02ec8860240f90b920bb2692f651d0ec712e511e0bd17a3b1048382fdfdcb4d8 |
SHA512: | 025068c49129a0d40235a9c80b6473e86b4d1209fabe953ac425628ad98e3b64106777014b5c20d24324991618d901c662feb69dc76cd7f68f39e415887c8480 |
SSDEEP: | 12288:SRgyqSwAN2kLkjnP13tGIGef4cDDKeCxeAn3tCk9Rj71Mlr7v:ig2N2kLkTd3AIGFcDtSVvCr7v |
TLSH: | 6EC4D0165241E893F88728FF39A2A31334E63372B7B1CDD3C075796897801C195EAD6E |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....2?g.................V........................@.......................................@.................................T...(.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4292c0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x673F321B [Thu Nov 21 13:14:03 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 3a33a82bcd5969a5b19ce5fba049e5b4 |
Signature Valid: | false |
Signature Issuer: | CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | AD1BCBF19AE2F91BB114D33B85359E56 |
Thumbprint SHA-1: | 141D90A1BA8F61863FBEDDF7DD1D66C1D1E0B128 |
Thumbprint SHA-256: | A08EA2A7A257AD690B988446951E9DEF2986A2F3F546B6F0902805330F3B6B48 |
Serial: | 00D0461B529F67189D43744E9CEFE172AE |
Instruction |
---|
call 00007FE994DE584Bh |
jmp 00007FE994DE545Dh |
push ebp |
mov ebp, esp |
push dword ptr [ebp+08h] |
call 00007FE994DE55FFh |
neg eax |
pop ecx |
sbb eax, eax |
neg eax |
dec eax |
pop ebp |
ret |
push ebp |
mov ebp, esp |
cmp dword ptr [0043E488h], FFFFFFFFh |
push dword ptr [ebp+08h] |
jne 00007FE994DE55F9h |
call 00007FE994DE747Bh |
jmp 00007FE994DE55FDh |
push 0043E488h |
call 00007FE994DE73FEh |
pop ecx |
neg eax |
pop ecx |
sbb eax, eax |
not eax |
and eax, dword ptr [ebp+08h] |
pop ebp |
ret |
push 00000008h |
push 0043C8E0h |
call 00007FE994DE5B6Dh |
and dword ptr [ebp-04h], 00000000h |
mov eax, 00005A4Dh |
cmp word ptr [00400000h], ax |
jne 00007FE994DE564Fh |
mov eax, dword ptr [0040003Ch] |
cmp dword ptr [eax+00400000h], 00004550h |
jne 00007FE994DE563Eh |
mov ecx, 0000010Bh |
cmp word ptr [eax+00400018h], cx |
jne 00007FE994DE5630h |
mov eax, dword ptr [ebp+08h] |
mov ecx, 00400000h |
sub eax, ecx |
push eax |
push ecx |
call 00007FE994DE5772h |
pop ecx |
pop ecx |
test eax, eax |
je 00007FE994DE5619h |
cmp dword ptr [eax+24h], 00000000h |
jl 00007FE994DE5613h |
mov dword ptr [ebp-04h], FFFFFFFEh |
mov al, 01h |
jmp 00007FE994DE5611h |
mov eax, dword ptr [ebp-14h] |
mov eax, dword ptr [eax] |
xor ecx, ecx |
cmp dword ptr [eax], C0000005h |
sete cl |
mov eax, ecx |
ret |
mov esp, dword ptr [ebp-18h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3c054 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x8ca00 | 0x2e80 | .coS |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x40000 | 0x2608 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x37160 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3c198 | 0x11c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x3544c | 0x35600 | 479743414830a5568bcada3f710e0c1a | False | 0.49541221457845436 | data | 6.9570693373870895 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x37000 | 0x5e44 | 0x6000 | fa3c2f19487ee30f8cd241552465a803 | False | 0.4083251953125 | data | 4.760675312198424 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x3d000 | 0x1ba4 | 0x1000 | ff4f8fd6963b4f7d1c08f13031fa0788 | False | 0.470703125 | OpenPGP Secret Key | 4.849894766585126 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.00cfg | 0x3f000 | 0x8 | 0x200 | 056d58e83a0a9dfd46d11d226dee9030 | False | 0.03125 | data | 0.06116285224115448 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x40000 | 0x2608 | 0x2800 | 01d8884685c61e5615f1d070b294bafc | False | 0.7767578125 | data | 6.602867365262165 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.coS | 0x43000 | 0x4d400 | 0x4d400 | a33d850a0dd95b64501f12ccaf3b91d4 | False | 1.0003350020226538 | data | 7.999392363076688 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
DLL | Import |
---|---|
KERNEL32.dll | CloseHandle, CompareStringW, CreateFileA, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WideCharToMultiByte, WriteConsoleW, WriteFile |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T16:51:59.946351+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49710 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:00.661859+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49710 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:00.661859+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49710 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:02.044217+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49711 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:02.776657+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49711 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:02.776657+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49711 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:04.519436+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49712 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:06.697059+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49713 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:09.534774+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49714 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:12.576375+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49715 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:13.294353+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49715 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:14.933335+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49716 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:14.962103+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.5 | 49716 | 172.67.219.199 | 443 | TCP |
2024-11-21T16:52:18.362746+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49726 | 172.67.219.199 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 21, 2024 16:51:58.620428085 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:51:58.620517969 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:51:58.620623112 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:51:58.621697903 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:51:58.621732950 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:51:59.946183920 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:51:59.946351051 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:51:59.955280066 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:51:59.955375910 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:51:59.955753088 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:00.000746965 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.011095047 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.011096001 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.011274099 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:00.661765099 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:00.661861897 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:00.661930084 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.663952112 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.663953066 CET | 49710 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.664019108 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:00.664057016 CET | 443 | 49710 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:00.730468035 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.730580091 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:00.730658054 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.731067896 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:00.731118917 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.043999910 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.044217110 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.045319080 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.045351028 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.045696974 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.046920061 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.046962976 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.047024965 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.776659966 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.776709080 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.776846886 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.776889086 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.776904106 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.776935101 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.776983976 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.777036905 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.777038097 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.777115107 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.785844088 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.785917997 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.785936117 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.794466019 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.794557095 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.794572115 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.844377995 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.896539927 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.938222885 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.938292980 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.985074997 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:02.987059116 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.987397909 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:02.987476110 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:03.158643961 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:03.158643961 CET | 49711 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:03.158723116 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:03.158818960 CET | 443 | 49711 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:03.295933008 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:03.296041012 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:03.296202898 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:03.296493053 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:03.296531916 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:04.519198895 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:04.519435883 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:04.521171093 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:04.521203995 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:04.521569014 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:04.523251057 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:04.523464918 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:04.523515940 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:05.283188105 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:05.283348083 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:05.283422947 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:05.283521891 CET | 49712 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:05.283570051 CET | 443 | 49712 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:05.403599977 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:05.403635979 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:05.403702021 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:05.404222012 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:05.404238939 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:06.696842909 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:06.697058916 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:06.698844910 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:06.698862076 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:06.699385881 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:06.701153994 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:06.701319933 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:06.701354980 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:06.701481104 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:06.743338108 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:07.503098011 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:07.503238916 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:07.503298044 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:07.517209053 CET | 49713 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:07.517230034 CET | 443 | 49713 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:08.314604998 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:08.314661980 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:08.314739943 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:08.315109015 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:08.315121889 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:09.534620047 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:09.534774065 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:09.536379099 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:09.536427021 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:09.536756039 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:09.538294077 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:09.538496971 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:09.538533926 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:09.538614988 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:09.538647890 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:10.458415985 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:10.458538055 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:10.458617926 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:10.458929062 CET | 49714 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:10.458971977 CET | 443 | 49714 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:11.288222075 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:11.288259029 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:11.288332939 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:11.288868904 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:11.288882017 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:12.576210022 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:12.576375008 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:12.577816963 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:12.577830076 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:12.578159094 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:12.579883099 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:12.579883099 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:12.579924107 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:13.294265032 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:13.294389963 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:13.294456005 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:13.294581890 CET | 49715 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:13.294603109 CET | 443 | 49715 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:13.711402893 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:13.711509943 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:13.711635113 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:13.711946964 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:13.711978912 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.933218002 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.933335066 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.935029030 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.935060024 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.935349941 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.960532904 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.961343050 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.961396933 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.961494923 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.961544037 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.961657047 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.961694002 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.961848021 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.961895943 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.962064981 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.962101936 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.962275028 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.962313890 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.962347031 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.962450027 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.962496996 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.962861061 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:14.963057995 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.963123083 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:14.963155985 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:15.007335901 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:15.007530928 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:15.007607937 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:15.007657051 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:15.055335045 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:15.055497885 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:15.103348970 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:15.297795057 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:17.144680977 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:17.144798040 CET | 443 | 49716 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:17.144957066 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:17.144994020 CET | 49716 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:17.165384054 CET | 49726 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:17.165419102 CET | 443 | 49726 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:17.165520906 CET | 49726 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:17.165857077 CET | 49726 | 443 | 192.168.2.5 | 172.67.219.199 |
Nov 21, 2024 16:52:17.165884018 CET | 443 | 49726 | 172.67.219.199 | 192.168.2.5 |
Nov 21, 2024 16:52:18.362746000 CET | 49726 | 443 | 192.168.2.5 | 172.67.219.199 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 21, 2024 16:51:58.383491039 CET | 63597 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 21, 2024 16:51:58.614809036 CET | 53 | 63597 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 21, 2024 16:51:58.383491039 CET | 192.168.2.5 | 1.1.1.1 | 0x21ba | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 21, 2024 16:51:58.614809036 CET | 1.1.1.1 | 192.168.2.5 | 0x21ba | No error (0) | 172.67.219.199 | A (IP address) | IN (0x0001) | false | ||
Nov 21, 2024 16:51:58.614809036 CET | 1.1.1.1 | 192.168.2.5 | 0x21ba | No error (0) | 104.21.24.174 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49710 | 172.67.219.199 | 443 | 1492 | C:\Users\user\Desktop\injector V2.4.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-21 15:52:00 UTC | 265 | OUT | |
2024-11-21 15:52:00 UTC | 8 | OUT | |
2024-11-21 15:52:00 UTC | 990 | IN | |
2024-11-21 15:52:00 UTC | 7 | IN | |
2024-11-21 15:52:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49711 | 172.67.219.199 | 443 | 1492 | C:\Users\user\Desktop\injector V2.4.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-21 15:52:02 UTC | 266 | OUT | |
2024-11-21 15:52:02 UTC | 54 | OUT | |
2024-11-21 15:52:02 UTC | 996 | IN | |
2024-11-21 15:52:02 UTC | 373 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN | |
2024-11-21 15:52:02 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49712 | 172.67.219.199 | 443 | 1492 | C:\Users\user\Desktop\injector V2.4.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-21 15:52:04 UTC | 285 | OUT | |
2024-11-21 15:52:04 UTC | 12848 | OUT | |
2024-11-21 15:52:05 UTC | 991 | IN | |
2024-11-21 15:52:05 UTC | 19 | IN | |
2024-11-21 15:52:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49713 | 172.67.219.199 | 443 | 1492 | C:\Users\user\Desktop\injector V2.4.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-21 15:52:06 UTC | 280 | OUT | |
2024-11-21 15:52:06 UTC | 15060 | OUT | |
2024-11-21 15:52:07 UTC | 994 | IN | |
2024-11-21 15:52:07 UTC | 19 | IN | |
2024-11-21 15:52:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49714 | 172.67.219.199 | 443 | 1492 | C:\Users\user\Desktop\injector V2.4.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-21 15:52:09 UTC | 276 | OUT | |
2024-11-21 15:52:09 UTC | 15331 | OUT | |
2024-11-21 15:52:09 UTC | 5195 | OUT | |
2024-11-21 15:52:10 UTC | 1002 | IN | |
2024-11-21 15:52:10 UTC | 19 | IN | |
2024-11-21 15:52:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49715 | 172.67.219.199 | 443 | 1492 | C:\Users\user\Desktop\injector V2.4.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-21 15:52:12 UTC | 282 | OUT | |
2024-11-21 15:52:12 UTC | 1266 | OUT | |
2024-11-21 15:52:13 UTC | 987 | IN | |
2024-11-21 15:52:13 UTC | 19 | IN | |
2024-11-21 15:52:13 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49716 | 172.67.219.199 | 443 | 1492 | C:\Users\user\Desktop\injector V2.4.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-21 15:52:14 UTC | 277 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:14 UTC | 15331 | OUT | |
2024-11-21 15:52:17 UTC | 994 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:51:55 |
Start date: | 21/11/2024 |
Path: | C:\Users\user\Desktop\injector V2.4.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb20000 |
File size: | 587'904 bytes |
MD5 hash: | 837840F37E344F8E7BC187F88F93C4A8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:51:55 |
Start date: | 21/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:51:57 |
Start date: | 21/11/2024 |
Path: | C:\Users\user\Desktop\injector V2.4.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb20000 |
File size: | 587'904 bytes |
MD5 hash: | 837840F37E344F8E7BC187F88F93C4A8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 10:51:57 |
Start date: | 21/11/2024 |
Path: | C:\Users\user\Desktop\injector V2.4.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb20000 |
File size: | 587'904 bytes |
MD5 hash: | 837840F37E344F8E7BC187F88F93C4A8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 2.1% |
Dynamic/Decrypted Code Coverage: | 0.8% |
Signature Coverage: | 4.3% |
Total number of Nodes: | 1165 |
Total number of Limit Nodes: | 20 |
Graph
Function 00B5D18D Relevance: 44.0, APIs: 11, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2D475 Relevance: 1.5, Strings: 1, Instructions: 206COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B50E88 Relevance: 7.7, APIs: 5, Instructions: 197COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4D4CA Relevance: 3.2, APIs: 2, Instructions: 177COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4D2B2 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2A0B0 Relevance: 3.1, APIs: 2, Instructions: 64COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4C7CC Relevance: 3.0, APIs: 2, Instructions: 34COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4DC4B Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4DA59 Relevance: 1.6, APIs: 1, Instructions: 142COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2B0E4 Relevance: 1.6, APIs: 1, Instructions: 55fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4EB9B Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B36330 Relevance: 77.7, Strings: 61, Instructions: 1445COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B39B80 Relevance: 45.8, Strings: 35, Instructions: 2072COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B41D30 Relevance: 32.0, Strings: 24, Instructions: 1978COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B3F340 Relevance: 19.6, Strings: 14, Instructions: 2099COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B47840 Relevance: 17.1, Strings: 13, Instructions: 886COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B35F60 Relevance: 9.0, Strings: 7, Instructions: 233COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2A36B Relevance: 9.0, Strings: 7, Instructions: 230COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B3D4A0 Relevance: 8.1, Strings: 6, Instructions: 552COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B33440 Relevance: 6.9, Strings: 5, Instructions: 687COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B33F80 Relevance: 6.8, Strings: 5, Instructions: 572COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B47330 Relevance: 6.6, Strings: 5, Instructions: 310COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2B964 Relevance: 6.5, Strings: 5, Instructions: 235COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4F731 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B496AF Relevance: 6.1, APIs: 4, Instructions: 73COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B44CD0 Relevance: 4.8, APIs: 3, Instructions: 287COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B41367 Relevance: 4.2, Strings: 3, Instructions: 413COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B34CC0 Relevance: 4.2, Strings: 3, Instructions: 404COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B37F54 Relevance: 4.0, Strings: 3, Instructions: 243COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2D07E Relevance: 4.0, Strings: 3, Instructions: 203COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B38129 Relevance: 2.7, Strings: 2, Instructions: 235COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2DA6C Relevance: 2.6, Strings: 2, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4F680 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B498D5 Relevance: 1.6, APIs: 1, Instructions: 147COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B496A3 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B32AE7 Relevance: 1.5, Strings: 1, Instructions: 219COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B32B9B Relevance: 1.4, Strings: 1, Instructions: 156COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B32C40 Relevance: 1.4, Strings: 1, Instructions: 146COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2D6B8 Relevance: 1.4, Strings: 1, Instructions: 131COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2CD0A Relevance: 1.3, Strings: 1, Instructions: 99COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2E350 Relevance: 1.3, Strings: 1, Instructions: 87COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2E93A Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4CB10 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B355F0 Relevance: .6, Instructions: 552COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B44170 Relevance: .5, Instructions: 459COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B46CD0 Relevance: .4, Instructions: 395COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B25930 Relevance: .4, Instructions: 361COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B46800 Relevance: .3, Instructions: 282COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B34910 Relevance: .2, Instructions: 232COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B2A2F2 Relevance: 15.9, APIs: 1, Strings: 8, Instructions: 163fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B525C3 Relevance: 14.3, APIs: 5, Strings: 3, Instructions: 303COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B448F0 Relevance: 10.7, APIs: 3, Strings: 3, Instructions: 243COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4C89A Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4A925 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B529E8 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 114COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B50C22 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4F50E Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B5020A Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B5225C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 93COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4F731 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B496AF Relevance: 6.1, APIs: 4, Instructions: 73COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B53F46 Relevance: 12.2, APIs: 8, Instructions: 248COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4C13E Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4A925 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B50E88 Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B50C22 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B5157F Relevance: 6.3, APIs: 4, Instructions: 333fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B523EC Relevance: 6.2, APIs: 4, Instructions: 168COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4F50E Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B4FAB4 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B5020A Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B54400 Relevance: 6.0, APIs: 4, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 40.8% |
Total number of Nodes: | 245 |
Total number of Limit Nodes: | 18 |
Graph
Function 004394C0 Relevance: 32.1, APIs: 11, Strings: 7, Instructions: 599memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CE25 Relevance: 16.6, Strings: 13, Instructions: 318COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408D80 Relevance: 7.7, APIs: 5, Instructions: 159threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042EED9 Relevance: 1.9, APIs: 1, Instructions: 417COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E480 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DBCA Relevance: 1.4, Strings: 1, Instructions: 190COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E3D0 Relevance: 1.6, APIs: 1, Instructions: 65memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BC40 Relevance: 1.6, APIs: 1, Instructions: 59memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BBC0 Relevance: 1.5, APIs: 1, Instructions: 46memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004333D4 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431F13 Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CDC0 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CDF3 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434830 Relevance: 31.6, APIs: 6, Strings: 12, Instructions: 138clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004096C0 Relevance: 19.2, Strings: 15, Instructions: 428COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F54D Relevance: 14.4, APIs: 2, Strings: 6, Instructions: 400libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427E47 Relevance: 14.2, Strings: 11, Instructions: 446COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C03D Relevance: 8.0, Strings: 6, Instructions: 462COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004272DE Relevance: 7.9, Strings: 6, Instructions: 393COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424A6F Relevance: 5.9, Strings: 4, Instructions: 884COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AF50 Relevance: 5.4, Strings: 4, Instructions: 398COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409430 Relevance: 5.3, Strings: 4, Instructions: 253COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A45E Relevance: 4.2, Strings: 3, Instructions: 457COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B87A Relevance: 4.0, Strings: 3, Instructions: 201COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D3F0 Relevance: 2.7, Strings: 2, Instructions: 172COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CA0C Relevance: 2.6, Strings: 2, Instructions: 66COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439C60 Relevance: 1.9, Strings: 1, Instructions: 607COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A170 Relevance: 1.8, Strings: 1, Instructions: 577COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004241D0 Relevance: 1.7, APIs: 1, Instructions: 241comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041EC60 Relevance: 1.7, Strings: 1, Instructions: 413COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C9A0 Relevance: 1.6, Strings: 1, Instructions: 396COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CA5F Relevance: 1.4, Strings: 1, Instructions: 189COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B09F Relevance: 1.4, Strings: 1, Instructions: 181COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D46E Relevance: 1.4, Strings: 1, Instructions: 164COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BBA5 Relevance: 1.4, Strings: 1, Instructions: 102COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C951 Relevance: 1.3, Strings: 1, Instructions: 64COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407A50 Relevance: .8, Instructions: 828COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E90 Relevance: .5, Instructions: 459COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00423050 Relevance: .4, Instructions: 433COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429055 Relevance: .3, Instructions: 311COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BDC6 Relevance: .2, Instructions: 224COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A299 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A24C Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439F60 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F39A Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E8A1 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DB1F Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004367A0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C410 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A35B Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D9F4 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A130 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D834 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A643 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|