Windows
Analysis Report
ODjwCjQBAP.exe
Overview
General Information
Sample name: | ODjwCjQBAP.exerenamed because original name is a hash value |
Original sample name: | c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a.exe |
Analysis ID: | 1569269 |
MD5: | 2b78431a8969c829339ed0da29004757 |
SHA1: | c09051c5f433348c6cf5b5c0781af877f44212d2 |
SHA256: | c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a |
Tags: | exeuser-adrian__luca |
Infos: | |
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- ODjwCjQBAP.exe (PID: 5028 cmdline:
"C:\Users\ user\Deskt op\ODjwCjQ BAP.exe" MD5: 2B78431A8969C829339ED0DA29004757) - ODjwCjQBAP.exe (PID: 6180 cmdline:
"C:\Users\ user\Deskt op\ODjwCjQ BAP.exe" MD5: 2B78431A8969C829339ED0DA29004757)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T17:08:16.529468+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49949 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:09:18.678508+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49747 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:09:40.804027+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49799 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:10:02.944950+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49848 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:10:25.104715+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49898 | 84.38.129.16 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0040270B | |
Source: | Code function: | 0_2_004061FB | |
Source: | Code function: | 0_2_00405799 | |
Source: | Code function: | 3_2_0040270B | |
Source: | Code function: | 3_2_004061FB | |
Source: | Code function: | 3_2_00405799 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_0040524E |
Source: | Code function: | 0_2_004032BF | |
Source: | Code function: | 3_2_004032BF |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_00406542 | |
Source: | Code function: | 0_2_00404A8D | |
Source: | Code function: | 3_2_00406542 | |
Source: | Code function: | 3_2_00404A8D |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004032BF | |
Source: | Code function: | 3_2_004032BF |
Source: | Code function: | 0_2_0040451A |
Source: | Code function: | 0_2_004020CD |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_10001A5D |
Source: | Code function: | 0_2_10002D4E |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Code function: | 0_2_0040270B | |
Source: | Code function: | 0_2_004061FB | |
Source: | Code function: | 0_2_00405799 | |
Source: | Code function: | 3_2_0040270B | |
Source: | Code function: | 3_2_004061FB | |
Source: | Code function: | 3_2_00405799 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-4891 | ||
Source: | API call chain: | graph_0-4898 |
Source: | Code function: | 0_2_10001A5D |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00405F19 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Access Token Manipulation | 11 Masquerading | OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 11 Process Injection | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Clipboard Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Access Token Manipulation | Security Account Manager | 4 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 23 System Information Discovery | Distributed Component Object Model | Input Capture | 11 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
53% | ReversingLabs | Win32.Spyware.Snakekeylogger |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
84.38.129.16 | unknown | Latvia | 203557 | DATACLUB-NL | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1569269 |
Start date and time: | 2024-12-05 17:07:30 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 43s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | ODjwCjQBAP.exerenamed because original name is a hash value |
Original Sample Name: | c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a.exe |
Detection: | MAL |
Classification: | mal68.troj.evad.winEXE@3/18@0/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target ODjwCjQBAP.exe, PID 6180 because there are no executed function
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: ODjwCjQBAP.exe
Time | Type | Description |
---|---|---|
11:09:18 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
84.38.129.16 | Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DATACLUB-NL | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsv6CC6.tmp\System.dll | Get hash | malicious | FormBook, GuLoader | Browse | ||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 42 |
Entropy (8bit): | 3.9726590202682766 |
Encrypted: | false |
SSDEEP: | 3:guTWyXRAK4vn:TzRAKi |
MD5: | 276D6E1D94791E4BC828A3B5F04A73EA |
SHA1: | 4665FD1D7598D3D751B5232BBB0859123D79A3BE |
SHA-256: | 812A9FCAACC7A28EBA4FA5EDB16AE49DD9BBFECFC112E5957C984BC4A50F7304 |
SHA-512: | F8A6F577DE29F60997EAB5F032C6CAF6C2565C8E018EDDD88900DFF17062CCA7D2B6BA30844F8A7A0DB4759056481F6C1D290C99378E8C540031B3C3E008E8DE |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme\saddleback.jer
Download File
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 241857 |
Entropy (8bit): | 1.2492742831199217 |
Encrypted: | false |
SSDEEP: | 768:kn4C0nabowYKKucVjMHtvH3Eq1Zg5c+0o4u1uLlOxRuYP9aVsVL/e3ec6Axhe7rO:zAzhHNuZla85OxXCm |
MD5: | FB3375E7CB0698DF507062161A26885F |
SHA1: | 5E98C5E6F50A1B57B1E72B412D9632603FF954EF |
SHA-256: | EB781B87F06CBBB43E36413F70A97528DFF827A3DA9575E56142324F9CF43477 |
SHA-512: | 949FB9F863EB2EC85B84C4DB3E4EA023F1C3FC09CB79FE52B58569C616FC28F2E0D095DB535C3B80EF44CE4F75EA4752313F4F20A3E3A61E49163FCE8078B79B |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Forsvarsministrene\Overhates.txt
Download File
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 513 |
Entropy (8bit): | 4.312755423928167 |
Encrypted: | false |
SSDEEP: | 12:iN2DyKkMNtYdKYK90GbzE1gcaAy6AGb0CY3EoAAV:iYDZBGILeGzAy6jbts |
MD5: | 3A44600B8B24F5CC7EF13B014C5FC8E6 |
SHA1: | DABC64C2788C61476C159BF60E27A0385B761223 |
SHA-256: | 037EE7216549B3D566F3D53E5801D45ADACF332F937FB43BD5A5E3F0DF9662A6 |
SHA-512: | 02985E9F575B10700A6C8FE167DB6EBD81E1B8DE758DFAB47BB01AB7FE568525C17E933AA2DB98673E1A43EB3EF63CAB6E97D59FE1B1D52E3484737E0D9B4CBE |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Forsvarsministrene\Protaspis.sol
Download File
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 305301 |
Entropy (8bit): | 1.2617727746454932 |
Encrypted: | false |
SSDEEP: | 768:OFl7dydtg1PEAqjKsB0peIl0LVJmpGgJQZwWmkYvYTDjBlqndyzkEV5ndnGVa76E:hdKCZmTCLm4TyycJrcYKLdL59NBGa |
MD5: | EADA66A6285325455F7E0780C000CB65 |
SHA1: | 125A71ABF2ADCCFE6E4BB3D7BF80CAC064F71690 |
SHA-256: | D1E27B338C60688975AE1BB239D860E30490A7FEB5AEB1DF1DAD87244DD073AC |
SHA-512: | 669BA190147018B4CBA35D6CDE23D00683E73DE0C70B60C1AA03EDEC2C7CC629DA73A7495DB05CF4151E100C339C76AFD87A3D179FE98045ED38B02A7A478FB1 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Forsvarsministrene\barbecue.ste
Download File
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 302102 |
Entropy (8bit): | 1.2507376038892632 |
Encrypted: | false |
SSDEEP: | 768:+0WlDZ0cyMp2n0GbzqUGvbn/eHiEmNAXxM4cCQHkR1WuFkHnvVG26UZRR15NykM4:b0/vvkPqdcKMyJAnrZpdZ |
MD5: | 43EB990B1BE1B4570969A310174D319F |
SHA1: | BEAE29DB714C0576F1BA9256E64F1A0A015B3E84 |
SHA-256: | 6884CDA80715F73C9D9AA9AD45B9BDE3D9965D2009270BA685B30DD21421C04D |
SHA-512: | C0FBE88619A7BC3BB8F6CBC8B77B4C1E21A2AFB8A92B1DF4324C20980C5CF6362CB75B7D065391437147BA746A933EBBD51167E4DF2B94477298A87331E15C75 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Forsvarsministrene\paradiset.cho
Download File
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 398964 |
Entropy (8bit): | 1.2601730304396117 |
Encrypted: | false |
SSDEEP: | 1536:qIRuZM0E+SCsypSaDWDKQreAN/Ge8+QM8+cj4WHOlXtZ:pRuPs3DKYc5+QM1KW |
MD5: | 34495288F83EB902AC00567354E11253 |
SHA1: | F421E0A307361C05A9534639D2B3A446F4673BAF |
SHA-256: | F917E97748DEE607ABCC405FA70D7614B2F96675914B64AE7FD6AC299BCF220B |
SHA-512: | E2DE646C75526DDA1B22AEBFF7B7991DEC89D351012FA21D925046EF5DD78ABD2D999ACAAE7C8BA33747480D3C921CDAB05D98839AF3A552063070A3B4C48496 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 421931 |
Entropy (8bit): | 7.01357660979347 |
Encrypted: | false |
SSDEEP: | 6144:GwXhFBgBHfn9LmvuRhFnvx1z4GvhBdI1/QKrulObwrH8rii28xe90oaQ6BYiFJ:O10GJ4tulOeYpBkaoa9PJ |
MD5: | 274FB510C29F8D4455002BE77288131E |
SHA1: | B32B89FEA5CD3527E0EED372E8E39A86531C865B |
SHA-256: | 6ABCB47AEE8A2120422C246DE8C03B6A01A04B431BEC3E906A5BC1297B7D74BC |
SHA-512: | 347C665D7E99F536ED6E5CF1CFEF00AF8FD40EDA43042E09A28C1780517347AB066B17C7533FD1DCA279813277C97DFEC9C2116E51DB9F4E3E1C73B0C24DDD2D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 438667 |
Entropy (8bit): | 1.2554285943940462 |
Encrypted: | false |
SSDEEP: | 1536:WQqatwb3BquFonZ0MZGDfw/Ams7/cTCDEhqR9:prwTBq1ZPGD4/xsDEh8 |
MD5: | 1EF716DEB3AD336E09ABC68798EEFB78 |
SHA1: | 15E56DD29E83D44626E46F219AA1EFC8FEC6FB73 |
SHA-256: | 6401066B34D5FD3C9103C01112200E109A78A3DC584B7E55392B7A45020A76B0 |
SHA-512: | 6BD0842FE87E9C7467249673485392D1A718B84A757BE8AB94F4323F5BE358C0975A7E5BC4F74AF2EF69F5DB46AD00DCE3DDA9BBD20C2A6CE9D364883A40E7F9 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Kavalerens188.equ
Download File
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 419878 |
Entropy (8bit): | 1.2587845148762749 |
Encrypted: | false |
SSDEEP: | 1536:iKHVhskoaFMrwPuNqw8hbEZ1EvgaKCiIklf3:JHcP9+w8hb8IQ |
MD5: | 93C85B7E4C86F442491FF2D5F5B3FE0B |
SHA1: | 893EE5DC579DA377DCE95F9DECAF57438F967112 |
SHA-256: | 7D60978D18793A119BB47B0D702E2D1EFAE28514EB46E9F96D75BB6FDA4ECF99 |
SHA-512: | A0D6B52554F688E47986FFA6B3885393F47A5D51895DC40219BDB1C838609755B1A801E446B926B44AB6C2F4B8A05A183D3C6BBF0D16CA84802CB5DBCA1581C9 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 125626 |
Entropy (8bit): | 4.599921276453497 |
Encrypted: | false |
SSDEEP: | 1536:FdxtDxEepm0mgEeyIhPnO0BACj/73YG9OmZA/sI53ieUSF7c54uce:F4L0xhPnLyhrmZfIjUSAce |
MD5: | B7832AD2AB09886CD2EF522834F98D9C |
SHA1: | 8065F02B75FB64B473F4D2639A7979E259CD2174 |
SHA-256: | 5D03DDF30ABA8BBF73CDCA6306FB9A3147C4862C514C1EE8C7D1B680C782DD39 |
SHA-512: | 257CCC8A6541EBAE7FA47B2BB3B7723EB90BED8B68CB3FB6BFC8528DAF1E736CCFAD8C8D6A98C6F580A2845BEA31E823E5011134D67FACFFA1C5B4FD087BBA7A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.522964554947562 |
Encrypted: | false |
SSDEEP: | 3:sEMBQEJkJVEjyQRg8UxQoXUn:78ixvUn |
MD5: | 96583A1C65FA65B73DA55976CF33BD46 |
SHA1: | 1419DD1AF5EEA789F27B794B8B00B58FBD4436EC |
SHA-256: | 47E7B2386AD56F9DD02D07945CD2CD17241F850D16BBF81F204A0ADCAA344619 |
SHA-512: | 6328BE4F2F4E35B6CCE2C8F822EDFAAB3B63F61FC6F6845B7505D6C2E8F2F693EE2D19E8BF671BA64D9F72A34F9B834B2A301D2363F45E71267A9B7DE98A2AF3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 4.256564762130954 |
Encrypted: | false |
SSDEEP: | 3:DyWgLQIfLBJXmgU:mkIP25 |
MD5: | F15BFDEBB2DF02D02C8491BDE1B4E9BD |
SHA1: | 93BD46F57C3316C27CAD2605DDF81D6C0BDE9301 |
SHA-256: | C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043 |
SHA-512: | 1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56 |
Entropy (8bit): | 4.250903860294566 |
Encrypted: | false |
SSDEEP: | 3:sAAEVvjskqMj84n:fLd3t |
MD5: | A251227F7BA8BD5EF8A5B99D81D44222 |
SHA1: | 27CBF4978A9082A801672164A389B96119BE8271 |
SHA-256: | 164EA3B0C3B4B7D9275271180CF650175DC675686D5557EF713831B124688F5F |
SHA-512: | EBB510350495107D5BD8E696D2DFADCFA4B775811246EA11E29B882D63C055DAA8D352C057F0C8D5156A3848964EE62C6B39883B3150F0D4BA7EE27F2091A158 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2682753 |
Entropy (8bit): | 2.7848088611908874 |
Encrypted: | false |
SSDEEP: | 12288:/10GJ4tulOeYpBkaoa9PuCvwqeJ6gvBse+tJ:/10qM0UBkratxehBse+7 |
MD5: | 2C8A73338F777DE95B016F5B6B0C5FDC |
SHA1: | 61D7202F7EA11E8F77A8F2196109389593F88F95 |
SHA-256: | 4F705E202B3704AFE971846F09B9968CBECBBBD90C4E84C7D903F5C798166A1D |
SHA-512: | 74E42B5EE48AB51BE6E37C771A7712B9110F6BF50DE89AEFE422A61561087B270792A38CF02F6155F5A29655EB34D524C8C82242E2797437F121A2BA4EE796DC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11264 |
Entropy (8bit): | 5.7711167426271945 |
Encrypted: | false |
SSDEEP: | 192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn |
MD5: | 3F176D1EE13B0D7D6BD92E1C7A0B9BAE |
SHA1: | FE582246792774C2C9DD15639FFA0ACA90D6FD0B |
SHA-256: | FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E |
SHA-512: | 0A69124819B7568D0DEA4E9E85CE8FE61C7BA697C934E3A95E2DCFB9F252B1D9DA7FAF8774B6E8EFD614885507ACC94987733EBA09A2F5E7098B774DFC8524B6 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74 |
Entropy (8bit): | 3.9637832956585757 |
Encrypted: | false |
SSDEEP: | 3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D |
MD5: | 16D513397F3C1F8334E8F3E4FC49828F |
SHA1: | 4EE15AFCA81CA6A13AF4E38240099B730D6931F0 |
SHA-256: | D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36 |
SHA-512: | 4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 52 |
Entropy (8bit): | 4.0914493934217315 |
Encrypted: | false |
SSDEEP: | 3:sBa99k1NoCFOn:KankVg |
MD5: | 5D04A35D3950677049C7A0CF17E37125 |
SHA1: | CAFDD49A953864F83D387774B39B2657A253470F |
SHA-256: | A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266 |
SHA-512: | C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1322 |
Entropy (8bit): | 3.1414415570302276 |
Encrypted: | false |
SSDEEP: | 24:8JvaRkD4/BPefDbDLqizZYpbDVPizZeiQ45HALqy:8oRkDsxy/DLqiNwDVPiNlQeAOy |
MD5: | 15BE100E4D1CD820CBC2EC77393024F4 |
SHA1: | 33082DB8320A42F887FB892D0FEC27AE62AF9B6C |
SHA-256: | D3BCE25CA227FB80FAD3D419B127D150DB1ECC99C5A5D0811263ACB1B6EBF054 |
SHA-512: | 5A783F0B728BC36143EB9BC4EBDCB96E5ED20E548E0C8EE78F47BB6F49D2B27A84992F8E2F8C6B6E76551A37B082C7580CF386875854A35B16E078824218459A |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.310486265921839 |
TrID: |
|
File name: | ODjwCjQBAP.exe |
File size: | 1'040'520 bytes |
MD5: | 2b78431a8969c829339ed0da29004757 |
SHA1: | c09051c5f433348c6cf5b5c0781af877f44212d2 |
SHA256: | c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a |
SHA512: | 3530aaad10469254279ffd782e61d4254cb73f5b9c2527f1a4a38f0424d5acb3a860d29b7ed9b4b619a98ab3b20742f0c3705321afb026b4b6e8c57dc052fabf |
SSDEEP: | 24576:+o8RUr/5+1g8UJT4l8at7kEeTg/ITSZOG+1Mjb2WsQbd38TRAn9:+h+/0S8S0OeXITSI1Mjvsa4i9 |
TLSH: | 5225F1E1B380466AF4790D36848BC2E152F1FD969E021A5723BCF36D2D73290564BDFA |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...5.MX.................`......... |
Icon Hash: | 2f6b71f16d4c71b3 |
Entrypoint: | 0x4032bf |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x584DCA35 [Sun Dec 11 21:50:45 2016 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 4f67aeda01a0484282e8c59006b0b352 |
Signature Valid: | false |
Signature Issuer: | CN=Bordroom, O=Bordroom, L=Harwick, C=US |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | EA52BE382F8398DA30FBEF403C134581 |
Thumbprint SHA-1: | 630A44123CE84C2B91C3A1C3D058D5EFC79FCD93 |
Thumbprint SHA-256: | D6AF5D9F936528206E9F16636C16E7286901048F173665CACA233214CBFAFE32 |
Serial: | 2D659AA4E05CD2D4CEAFB2673653B38DCBC537F4 |
Instruction |
---|
sub esp, 00000184h |
push ebx |
push esi |
push edi |
xor ebx, ebx |
push 00008001h |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 00409130h |
mov dword ptr [esp+20h], ebx |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [00407120h] |
call dword ptr [004070ACh] |
cmp ax, 00000006h |
je 00007FA6C06DBAD3h |
push ebx |
call 00007FA6C06DEA59h |
cmp eax, ebx |
je 00007FA6C06DBAC9h |
push 00000C00h |
call eax |
mov esi, 00407298h |
push esi |
call 00007FA6C06DE9D5h |
push esi |
call dword ptr [004070A8h] |
lea esi, dword ptr [esi+eax+01h] |
cmp byte ptr [esi], bl |
jne 00007FA6C06DBAADh |
push ebp |
push 00000009h |
call 00007FA6C06DEA2Ch |
push 00000007h |
call 00007FA6C06DEA25h |
mov dword ptr [00423724h], eax |
call dword ptr [00407044h] |
push ebx |
call dword ptr [00407288h] |
mov dword ptr [004237D8h], eax |
push ebx |
lea eax, dword ptr [esp+38h] |
push 00000160h |
push eax |
push ebx |
push 0041ECF0h |
call dword ptr [00407174h] |
push 004091ECh |
push 00422F20h |
call 00007FA6C06DE64Fh |
call dword ptr [004070A4h] |
mov ebp, 00429000h |
push eax |
push ebp |
call 00007FA6C06DE63Dh |
push ebx |
call dword ptr [00407154h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x7428 | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x47000 | 0x42ba0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xfcea8 | 0x11e0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x298 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5e59 | 0x6000 | 1892c55874b94ef60ac62cf77f0ecd0e | False | 0.6585693359375 | data | 6.424194540104456 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x1246 | 0x1400 | 6389f916226544852e494114faf192ad | False | 0.4271484375 | data | 5.0003960999706765 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x9000 | 0x1a818 | 0x400 | f02c8b5709d3fb8c6cc1ab777c138d8f | False | 0.6455078125 | data | 5.211928615453691 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x24000 | 0x23000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x47000 | 0x42ba0 | 0x42c00 | cb7fd179fd9ca3f4757b01d96679c1b0 | False | 0.21076559573970038 | data | 3.8403807556058642 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x47208 | 0x42028 | Device independent bitmap graphic, 256 x 512 x 32, image size 270336 | English | United States | 0.20773293487587655 |
RT_DIALOG | 0x89230 | 0x144 | data | English | United States | 0.5216049382716049 |
RT_DIALOG | 0x89378 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x89478 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x89598 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x895f8 | 0x14 | data | English | United States | 1.1 |
RT_VERSION | 0x89610 | 0x24c | data | English | United States | 0.5357142857142857 |
RT_MANIFEST | 0x89860 | 0x33e | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators | English | United States | 0.5542168674698795 |
DLL | Import |
---|---|
KERNEL32.dll | CopyFileA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetFileAttributesA, SetFileAttributesA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, GetCurrentProcess, GetFullPathNameA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, lstrcpynA, SetErrorMode, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc |
USER32.dll | ScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA |
GDI32.dll | SelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA |
ADVAPI32.dll | RegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T17:08:16.529468+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.5 | 49949 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:09:18.678508+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.5 | 49747 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:09:40.804027+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.5 | 49799 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:10:02.944950+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.5 | 49848 | 84.38.129.16 | 80 | TCP |
2024-12-05T17:10:25.104715+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.5 | 49898 | 84.38.129.16 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 5, 2024 17:08:56.661978960 CET | 49747 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:08:56.781816959 CET | 80 | 49747 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:08:56.782110929 CET | 49747 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:08:56.782413006 CET | 49747 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:08:56.903213978 CET | 80 | 49747 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:18.678373098 CET | 80 | 49747 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:18.678508043 CET | 49747 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:18.678658009 CET | 49747 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:18.798391104 CET | 80 | 49747 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:18.802228928 CET | 49799 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:18.922301054 CET | 80 | 49799 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:18.922394991 CET | 49799 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:18.922633886 CET | 49799 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:19.043062925 CET | 80 | 49799 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:40.803905964 CET | 80 | 49799 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:40.804027081 CET | 49799 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:40.804259062 CET | 49799 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:40.925664902 CET | 80 | 49799 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:40.931718111 CET | 49848 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:41.052402973 CET | 80 | 49848 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:09:41.052509069 CET | 49848 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:41.052726984 CET | 49848 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:09:41.172389030 CET | 80 | 49848 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:02.944827080 CET | 80 | 49848 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:02.944950104 CET | 49848 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:02.945092916 CET | 49848 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:03.064706087 CET | 49898 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:03.064959049 CET | 80 | 49848 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:03.184514999 CET | 80 | 49898 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:03.184644938 CET | 49898 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:03.184823036 CET | 49898 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:03.306377888 CET | 80 | 49898 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:25.102098942 CET | 80 | 49898 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:25.104715109 CET | 49898 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:25.104888916 CET | 49898 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:25.218841076 CET | 49949 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:25.225172043 CET | 80 | 49898 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:25.338901997 CET | 80 | 49949 | 84.38.129.16 | 192.168.2.5 |
Dec 5, 2024 17:10:25.338996887 CET | 49949 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:25.360743999 CET | 49949 | 80 | 192.168.2.5 | 84.38.129.16 |
Dec 5, 2024 17:10:25.480530977 CET | 80 | 49949 | 84.38.129.16 | 192.168.2.5 |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49747 | 84.38.129.16 | 80 | 6180 | C:\Users\user\Desktop\ODjwCjQBAP.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 5, 2024 17:08:56.782413006 CET | 175 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49799 | 84.38.129.16 | 80 | 6180 | C:\Users\user\Desktop\ODjwCjQBAP.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 5, 2024 17:09:18.922633886 CET | 175 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49848 | 84.38.129.16 | 80 | 6180 | C:\Users\user\Desktop\ODjwCjQBAP.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 5, 2024 17:09:41.052726984 CET | 175 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49898 | 84.38.129.16 | 80 | 6180 | C:\Users\user\Desktop\ODjwCjQBAP.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 5, 2024 17:10:03.184823036 CET | 175 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49949 | 84.38.129.16 | 80 | 6180 | C:\Users\user\Desktop\ODjwCjQBAP.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 5, 2024 17:10:25.360743999 CET | 175 | OUT |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:08:20 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'040'520 bytes |
MD5 hash: | 2B78431A8969C829339ED0DA29004757 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 11:08:47 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\Desktop\ODjwCjQBAP.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'040'520 bytes |
MD5 hash: | 2B78431A8969C829339ED0DA29004757 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 24.1% |
Dynamic/Decrypted Code Coverage: | 13.9% |
Signature Coverage: | 21.3% |
Total number of Nodes: | 1520 |
Total number of Limit Nodes: | 52 |
Graph
Function 004032BF Relevance: 91.4, APIs: 33, Strings: 19, Instructions: 357stringcomfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040524E Relevance: 65.0, APIs: 36, Strings: 1, Instructions: 282windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405F19 Relevance: 22.9, APIs: 8, Strings: 5, Instructions: 199stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405799 Relevance: 17.7, APIs: 7, Strings: 3, Instructions: 159filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406542 Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040270B Relevance: 1.5, APIs: 1, Instructions: 29fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403C09 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403877 Relevance: 47.5, APIs: 13, Strings: 14, Instructions: 215stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402D4A Relevance: 28.2, APIs: 5, Strings: 11, Instructions: 203memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401759 Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 147stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405110 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 73stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406222 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023D3 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 73registrystringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C04 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405A57 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405688 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406977 Relevance: 5.2, APIs: 4, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406B78 Relevance: 5.2, APIs: 4, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040688E Relevance: 5.2, APIs: 4, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406393 Relevance: 5.2, APIs: 4, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004067E1 Relevance: 5.2, APIs: 4, Instructions: 180COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004068FF Relevance: 5.2, APIs: 4, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040684B Relevance: 5.2, APIs: 4, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402241 Relevance: 4.6, APIs: 3, Instructions: 51stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405751 Relevance: 4.5, APIs: 3, Instructions: 28fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100027E8 Relevance: 3.2, APIs: 2, Instructions: 156COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402590 Relevance: 3.0, APIs: 1, Strings: 1, Instructions: 34stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401E25 Relevance: 3.0, APIs: 2, Instructions: 25COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040156F Relevance: 3.0, APIs: 2, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B6A Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B45 Relevance: 3.0, APIs: 2, Instructions: 13COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405653 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004025D7 Relevance: 1.6, APIs: 1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040166A Relevance: 1.5, APIs: 1, Instructions: 38fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022F2 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C11 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BE2 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000270B Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402336 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040159D Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404128 Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403277 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404111 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040FE Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004014D6 Relevance: 1.3, APIs: 1, Instructions: 19sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10001215 Relevance: 1.3, APIs: 1, Instructions: 4memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404A8D Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 481windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040451A Relevance: 26.5, APIs: 10, Strings: 5, Instructions: 274stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404225 Relevance: 42.2, APIs: 20, Strings: 4, Instructions: 205windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C40 Relevance: 24.6, APIs: 11, Strings: 3, Instructions: 131stringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404143 Relevance: 12.1, APIs: 8, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100023DA Relevance: 10.6, APIs: 7, Instructions: 111COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049DB Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402C13 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 36timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048D1 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 84stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000180D Relevance: 7.7, APIs: 5, Instructions: 189COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D3B Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405969 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405084 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004059B0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100010E0 Relevance: 5.1, APIs: 4, Instructions: 102memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405ACF Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032BF Relevance: 79.1, APIs: 33, Strings: 12, Instructions: 357stringcomfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404A8D Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 481windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405799 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 159filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406542 Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040524E Relevance: 54.3, APIs: 36, Instructions: 282windowclipboardmemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404229 Relevance: 38.7, APIs: 20, Strings: 2, Instructions: 209windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403877 Relevance: 37.0, APIs: 13, Strings: 8, Instructions: 215stringregistryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C40 Relevance: 24.6, APIs: 11, Strings: 3, Instructions: 131stringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040451A Relevance: 19.5, APIs: 10, Strings: 1, Instructions: 274stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402D4A Relevance: 19.5, APIs: 5, Strings: 6, Instructions: 203memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405F19 Relevance: 17.7, APIs: 8, Strings: 2, Instructions: 199stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404143 Relevance: 12.1, APIs: 8, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049DB Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402C13 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 36timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406222 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D95 Relevance: 7.5, APIs: 5, Instructions: 43COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D3B Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C04 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048D1 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405084 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405688 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406977 Relevance: 5.2, APIs: 4, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406B78 Relevance: 5.2, APIs: 4, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040688E Relevance: 5.2, APIs: 4, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406393 Relevance: 5.2, APIs: 4, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004067E1 Relevance: 5.2, APIs: 4, Instructions: 180COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004068FF Relevance: 5.2, APIs: 4, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040684B Relevance: 5.2, APIs: 4, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405ACF Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|