Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IJGLxMMTaK.exe

Overview

General Information

Sample name:IJGLxMMTaK.exe
renamed because original name is a hash value
Original sample name:8d907f49144e6fb96d6adc306c614f1e.exe
Analysis ID:1571216
MD5:8d907f49144e6fb96d6adc306c614f1e
SHA1:5dff700ca5e08b00e946a978378626ec450675a7
SHA256:2b619b8f8925b47fc0b735533332ba33267063cca7082d1306b06bc91295b817
Tags:exeuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Abnormal high CPU Usage
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • IJGLxMMTaK.exe (PID: 7296 cmdline: "C:\Users\user\Desktop\IJGLxMMTaK.exe" MD5: 8D907F49144E6FB96D6ADC306C614F1E)
    • conhost.exe (PID: 7304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7364 cmdline: C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • mode.com (PID: 7380 cmdline: MODE CON COLS=80 LINES=20 MD5: BEA7464830980BF7C0490307DB4FC875)
    • cmd.exe (PID: 7448 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7476 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: IJGLxMMTaK.exeReversingLabs: Detection: 65%
Source: IJGLxMMTaK.exeJoe Sandbox ML: detected
Source: IJGLxMMTaK.exe, 00000000.00000000.1680788422.00007FF71BC5B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a8fc8f5d-b
Source: IJGLxMMTaK.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: IJGLxMMTaK.exe
Source: Binary string: crypto\stack\stack.ccompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMcrypto\ex_data.c source: IJGLxMMTaK.exe
Source: global trafficHTTP traffic detected: POST /api/1.0/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 336Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.0/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 336Content-Type: application/x-www-form-urlencoded
Source: IJGLxMMTaK.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: IJGLxMMTaK.exeString found in binary or memory: https://keyauth.2222222222222222
Source: IJGLxMMTaK.exe, 00000000.00000003.1706125525.000001D07B0F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.0/
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess Stats: CPU usage > 49%
Source: classification engineClassification label: mal60.evad.winEXE@10/1@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7304:120:WilError_03
Source: IJGLxMMTaK.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: IJGLxMMTaK.exeReversingLabs: Detection: 65%
Source: IJGLxMMTaK.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectoryC:\Users\risku\Downloads\vcpkg-master\buildtrees\curl\src\url-7_68_0-cd669cc759\lib\system_win32.cLIMIT %s:%d %s reached memlimit
Source: IJGLxMMTaK.exeString found in binary or memory: id-cmc-addExtensions
Source: IJGLxMMTaK.exeString found in binary or memory: set-addPolicy
Source: unknownProcess created: C:\Users\user\Desktop\IJGLxMMTaK.exe "C:\Users\user\Desktop\IJGLxMMTaK.exe"
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com MODE CON COLS=80 LINES=20
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com MODE CON COLS=80 LINES=20Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: ureg.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: fsutilext.dllJump to behavior
Source: IJGLxMMTaK.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: IJGLxMMTaK.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: IJGLxMMTaK.exeStatic file information: File size 3439616 > 1048576
Source: IJGLxMMTaK.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x25a000
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: IJGLxMMTaK.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: IJGLxMMTaK.exe
Source: Binary string: crypto\stack\stack.ccompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMcrypto\ex_data.c source: IJGLxMMTaK.exe
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Malware Analysis System Evasion

barindex
Source: IJGLxMMTaK.exeBinary or memory string: INFOLICENSEFILECONTENTSNULLUSERNAMESUBSCRIPTIONSEXPIRYSUBSCRIPTIONSHY PRODUCT+DONT CRACK MY PROGRAMUD.EXEKSDUMPERCLIENT.EXEHTTPDEBUGGERUI.EXEHTTPDEBUGGERSVC.EXEX64DBG.EXEX.EXEX64DBG-UNSIGNED.EXEKSDUMPER.EXECHEATENGINE - X86_64 - SSE4 - AVX2.EXEHTTP DEBUGGER WINDOWS SERVICE(32 BIT).EXECHEAT ENGINE.EXEXENOS64.EXEFIDDLER.EXEWIRESHARK.EXEIDAQ64.EXEIDAQ.EXENEWX.EXENEW.EXEOLLYDBG.EXEGIDAPLUS.EXEAUTO.EXEHXD.EXEFIDDLER.EXE1X.EXEPROCMON.EXEGETWINDOWTEXT_X64.EXEFOLDERCHANGESVIEW.EXE\\.\KSDUMPER#
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeWindow / User API: threadDelayed 3635Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeWindow / User API: threadDelayed 6112Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeOpen window title or class name: procmon.exe
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeOpen window title or class name: wireshark.exe
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com MODE CON COLS=80 LINES=20Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping2
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1571216 Sample: IJGLxMMTaK.exe Startdate: 09/12/2024 Architecture: WINDOWS Score: 60 22 keyauth.win 2->22 28 Multi AV Scanner detection for submitted file 2->28 30 Machine Learning detection for sample 2->30 32 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->32 8 IJGLxMMTaK.exe 1 2->8         started        signatures3 process4 dnsIp5 24 keyauth.win 104.26.0.5, 443, 49734 CLOUDFLARENETUS United States 8->24 26 127.0.0.1 unknown unknown 8->26 34 Tries to detect sandboxes and other dynamic analysis tools (window names) 8->34 12 cmd.exe 1 8->12         started        14 conhost.exe 8->14         started        16 cmd.exe 1 8->16         started        18 cmd.exe 8->18         started        signatures6 process7 process8 20 mode.com 1 12->20         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IJGLxMMTaK.exe66%ReversingLabsWin64.Infostealer.Tinba
IJGLxMMTaK.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://keyauth.22222222222222220%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.0/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://keyauth.2222222222222222IJGLxMMTaK.exefalse
      • Avira URL Cloud: safe
      unknown
      https://curl.haxx.se/docs/http-cookies.htmlIJGLxMMTaK.exefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.26.0.5
        keyauth.winUnited States
        13335CLOUDFLARENETUSfalse
        IP
        127.0.0.1
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1571216
        Start date and time:2024-12-09 07:08:13 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 20s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:IJGLxMMTaK.exe
        renamed because original name is a hash value
        Original Sample Name:8d907f49144e6fb96d6adc306c614f1e.exe
        Detection:MAL
        Classification:mal60.evad.winEXE@10/1@1/2
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        • VT rate limit hit for: IJGLxMMTaK.exe
        TimeTypeDescription
        01:09:51API Interceptor11128x Sleep call for process: IJGLxMMTaK.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        104.26.0.5dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
          file.exeGet hashmaliciousUnknownBrowse
            IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
              SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                          lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            keyauth.windMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                            • 104.26.1.5
                            dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                            • 104.26.1.5
                            file.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            exe004.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                            • 172.67.72.57
                            SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSAmNdY4tRXD.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.16.9
                            NEW.RFQ00876.pdf.exeGet hashmaliciousFormBookBrowse
                            • 172.67.145.234
                            SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                            • 172.67.177.137
                            Hesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 104.21.67.152
                            BUNKER INVOICE MV SUN OCEAN.pdf.vbsGet hashmaliciousGuLoaderBrowse
                            • 104.21.65.104
                            Bunker_STS_pdf.vbsGet hashmaliciousGuLoaderBrowse
                            • 104.21.71.195
                            Payment_Advice.vbsGet hashmaliciousGuLoaderBrowse
                            • 172.67.148.42
                            file.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.16.9
                            file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                            • 104.21.35.43
                            file.exeGet hashmaliciousLummaC StealerBrowse
                            • 172.67.165.166
                            No context
                            No context
                            Process:C:\Users\user\Desktop\IJGLxMMTaK.exe
                            File Type:ASCII text, with CRLF line terminators, with escape sequences
                            Category:dropped
                            Size (bytes):1944
                            Entropy (8bit):4.122087188518395
                            Encrypted:false
                            SSDEEP:12:2iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiieXE9xaNWZvMXl:bps9MV
                            MD5:D94074F09CCD187BD79715D8EBD8D460
                            SHA1:464468508BC52BFF1ED15F0EED129A5D09B1ACCE
                            SHA-256:010D384DA2BD21579FDAB3CACFE2A2F47CF4EEE0164C6D6DE0CDA702AED07DB8
                            SHA-512:D17359C51040EB811DE827BA95A1A0CAE8F6FB93D7AEC50C7B3AB38EDA096B1EAE68E7DB333F20A95950C36C89D545C4070678FDBF43096242F48059DBD03170
                            Malicious:false
                            Reputation:low
                            Preview:...... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment.......
                            File type:PE32+ executable (console) x86-64, for MS Windows
                            Entropy (8bit):6.656348286171827
                            TrID:
                            • Win64 Executable Console (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:IJGLxMMTaK.exe
                            File size:3'439'616 bytes
                            MD5:8d907f49144e6fb96d6adc306c614f1e
                            SHA1:5dff700ca5e08b00e946a978378626ec450675a7
                            SHA256:2b619b8f8925b47fc0b735533332ba33267063cca7082d1306b06bc91295b817
                            SHA512:be9125e864782b113458e5c1fca897616319385296e3cdf27f438ff57eb34b4f51dd6d6ae6ed8db3b9baa86c473ffc5b9c315e2bc4d336704bdfb0430178014c
                            SSDEEP:49152:8GtlqtwIU6iNs5Fwr9aQcmEDZKM96aLSwNLpruGBclX7u1su2HgysenXffM4eiP0:4+NsQhuZKM9ZDveSxeXMBftp4
                            TLSH:DFF5AE52A7A401E8D9B7C13CC9564623E7F2B42513B09BDB06B4C67A0F23BE16E3E751
                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........;...h...h...h...i...h...iX..h...i...h.,Yh...h.,.i...h.,.i...h.,.i...h...h...h...i...h...h...hL..i...hL..i...hL..i...h.-.i...
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x140218d44
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x140000000
                            Subsystem:windows cui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66C9E0E8 [Sat Aug 24 13:32:24 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:95f5bd73e86642cf70d3e34a666486d8
                            Instruction
                            dec eax
                            sub esp, 28h
                            call 00007F0B74EF2EECh
                            dec eax
                            add esp, 28h
                            jmp 00007F0B74EF2447h
                            int3
                            int3
                            dec eax
                            mov eax, esp
                            dec eax
                            mov dword ptr [eax+08h], ebx
                            dec eax
                            mov dword ptr [eax+10h], ebp
                            dec eax
                            mov dword ptr [eax+18h], esi
                            dec eax
                            mov dword ptr [eax+20h], edi
                            inc ecx
                            push esi
                            dec eax
                            sub esp, 20h
                            dec ecx
                            mov ebx, dword ptr [ecx+38h]
                            dec eax
                            mov esi, edx
                            dec ebp
                            mov esi, eax
                            dec eax
                            mov ebp, ecx
                            dec ecx
                            mov edx, ecx
                            dec eax
                            mov ecx, esi
                            dec ecx
                            mov edi, ecx
                            dec esp
                            lea eax, dword ptr [ebx+04h]
                            call 00007F0B74EF2909h
                            mov eax, dword ptr [ebp+04h]
                            and al, 66h
                            neg al
                            mov eax, 00000001h
                            inc ebp
                            sbb eax, eax
                            inc ecx
                            neg eax
                            inc esp
                            add eax, eax
                            inc esp
                            test dword ptr [ebx+04h], eax
                            je 00007F0B74EF25E3h
                            dec esp
                            mov ecx, edi
                            dec ebp
                            mov eax, esi
                            dec eax
                            mov edx, esi
                            dec eax
                            mov ecx, ebp
                            call 00007F0B74EF3BEDh
                            dec eax
                            mov ebx, dword ptr [esp+30h]
                            dec eax
                            mov ebp, dword ptr [esp+38h]
                            dec eax
                            mov esi, dword ptr [esp+40h]
                            dec eax
                            mov edi, dword ptr [esp+48h]
                            dec eax
                            add esp, 20h
                            inc ecx
                            pop esi
                            ret
                            int3
                            dec eax
                            mov dword ptr [esp+10h], ebx
                            dec eax
                            mov dword ptr [esp+18h], esi
                            push ebp
                            push edi
                            inc ecx
                            push esi
                            dec eax
                            mov ebp, esp
                            dec eax
                            sub esp, 10h
                            xor eax, eax
                            xor ecx, ecx
                            cpuid
                            inc esp
                            mov eax, ecx
                            inc esp
                            mov edx, edx
                            inc ecx
                            xor edx, 49656E69h
                            inc ecx
                            xor eax, 6C65746Eh
                            inc esp
                            mov ecx, ebx
                            inc esp
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x31d2400xdc.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3490000x1e8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3300000x18db0.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x34a0000x79a4.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x2fb8200x38.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x2fba000x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2fb6e00x140.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x25b0000x8a0.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x259f480x25a0006edfb6bdca8d58ddb886acb59cfa35e7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x25b0000xc3d8a0xc3e00bd7d9d2094bb1ad9ad3ad8de67a4d72dFalse0.404440212188896OpenPGP Public Key5.695559921548302IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x31f0000x1027c0x90003cdf2dd7dfe9279a63d38c05fb8a4e1dFalse0.18565538194444445data3.7561787695806075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x3300000x18db00x18e004245ae4e11f4e0ad03c506dd7268438fFalse0.4868483040201005data6.222487084373812IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x3490000x1e80x2006a814b04e2ba8bbd21b53ea2878ea335False0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x34a0000x79a40x7a002baab8366a9902b833cbbd6a5800f6a9False0.2538422131147541data5.45723319552951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_MANIFEST0x3490600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                            DLLImport
                            WS2_32.dllselect, __WSAFDIsSet, inet_pton, shutdown, WSASetLastError, bind, getnameinfo, gethostname, sendto, recvfrom, ntohl, freeaddrinfo, getaddrinfo, ioctlsocket, listen, htonl, socket, send, recv, closesocket, accept, WSACleanup, WSAStartup, WSAIoctl, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, WSAGetLastError
                            WLDAP32.dll
                            CRYPT32.dllCryptQueryObject, CertGetCertificateContextProperty, CertDuplicateCertificateContext, CertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CertGetNameStringA, CertAddCertificateContextToStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore
                            ADVAPI32.dllCryptEnumProvidersW, CryptSignHashW, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, CryptAcquireContextW, ReportEventW, RegisterEventSourceW, DeregisterEventSource, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGenRandom, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextA, CopySid, IsValidSid, OpenProcessToken, ConvertSidToStringSidW, GetLengthSid, GetTokenInformation
                            KERNEL32.dllExitProcess, VirtualQuery, VirtualProtect, VirtualAlloc, ExitThread, LoadLibraryExW, RtlPcToFileHeader, InterlockedPushEntrySList, FreeLibraryAndExitThread, GetDriveTypeW, GetFileInformationByHandle, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, SetFilePointerEx, SetConsoleCtrlHandler, GetCommandLineA, GetCommandLineW, GetConsoleOutputCP, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetFileAttributesExW, GetCurrentDirectoryW, GetFullPathNameW, SetStdHandle, FlushFileBuffers, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetEndOfFile, WriteConsoleW, GetSystemInfo, WaitForSingleObjectEx, WriteProcessMemory, GetConsoleScreenBufferInfo, HeapFree, SetConsoleTextAttribute, SetConsoleTitleA, GetCurrentProcess, GetStdHandle, SetCurrentConsoleFontEx, TerminateProcess, GetModuleFileNameW, K32GetModuleFileNameExW, InitializeCriticalSectionEx, WaitForSingleObject, CreateFileW, ResumeThread, OpenProcess, HeapSize, CreateToolhelp32Snapshot, Sleep, GetLastError, Process32NextW, FillConsoleOutputCharacterW, LoadLibraryA, Process32FirstW, HeapReAlloc, CloseHandle, CreateThread, HeapAlloc, Module32FirstW, GetCurrentConsoleFontEx, DecodePointer, HeapDestroy, GetThreadContext, VirtualAllocEx, LocalFree, DeleteCriticalSection, GetProcessHeap, CreateProcessW, WideCharToMultiByte, GetConsoleWindow, Module32NextW, K32EnumProcessModules, DebugBreak, SetConsoleCursorPosition, SetThreadContext, IsDebuggerPresent, GetExitCodeProcess, SetLastError, QueryPerformanceCounter, QueryPerformanceFrequency, FormatMessageA, GetTickCount, EnterCriticalSection, LeaveCriticalSection, SleepEx, VerSetConditionMask, GetSystemDirectoryA, FreeLibrary, GetModuleHandleA, GetProcAddress, VerifyVersionInfoA, RtlUnwind, ExpandEnvironmentStringsA, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, GetEnvironmentVariableW, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleExW, MultiByteToWideChar, FormatMessageW, WriteFile, GetModuleHandleW, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlVirtualUnwind, SwitchToFiber, DeleteFiber, CreateFiber, LoadLibraryW, ConvertFiberToThread, ConvertThreadToFiber, FindClose, FindFirstFileW, FindNextFileW, GetSystemTime, SystemTimeToFileTime, RtlUnwindEx, GetStartupInfoW, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlLookupFunctionEntry, RtlCaptureContext, InitializeSListHead, RaiseException, OutputDebugStringW, GetCPInfo, GetStringTypeW, WakeAllConditionVariable, LCMapStringEx, EncodePointer, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, SleepConditionVariableSRW
                            USER32.dllSetWindowLongW, SetLayeredWindowAttributes, MessageBoxA, FindWindowA, GetProcessWindowStation, MessageBoxW, GetUserObjectInformationW, GetWindowLongW
                            SHELL32.dllShellExecuteA
                            USERENV.dllUnloadUserProfile
                            RPCRT4.dllRpcStringFreeA, UuidToStringA, UuidCreate
                            bcrypt.dllBCryptGenRandom
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 9, 2024 07:09:06.888215065 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:06.888254881 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:06.888320923 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:06.906383038 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:06.906434059 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.122690916 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.130753040 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.130809069 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.132189989 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.132273912 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.162353992 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.162453890 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.162468910 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.162493944 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.202258110 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.202286959 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.249171019 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.613298893 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.613423109 CET44349734104.26.0.5192.168.2.4
                            Dec 9, 2024 07:09:08.613485098 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.665747881 CET49734443192.168.2.4104.26.0.5
                            Dec 9, 2024 07:09:08.665761948 CET44349734104.26.0.5192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 9, 2024 07:09:06.641890049 CET5210353192.168.2.41.1.1.1
                            Dec 9, 2024 07:09:06.877677917 CET53521031.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 9, 2024 07:09:06.641890049 CET192.168.2.41.1.1.10x343fStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 9, 2024 07:09:06.877677917 CET1.1.1.1192.168.2.40x343fNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                            Dec 9, 2024 07:09:06.877677917 CET1.1.1.1192.168.2.40x343fNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                            Dec 9, 2024 07:09:06.877677917 CET1.1.1.1192.168.2.40x343fNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                            • keyauth.win
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449734104.26.0.54437296C:\Users\user\Desktop\IJGLxMMTaK.exe
                            TimestampBytes transferredDirectionData
                            2024-12-09 06:09:08 UTC129OUTPOST /api/1.0/ HTTP/1.1
                            Host: keyauth.win
                            Accept: */*
                            Content-Length: 336
                            Content-Type: application/x-www-form-urlencoded
                            2024-12-09 06:09:08 UTC336OUTData Raw: 74 79 70 65 3d 36 39 36 65 36 39 37 34 26 76 65 72 3d 61 34 33 32 63 30 62 37 64 62 32 32 36 36 39 63 66 36 61 65 35 34 34 37 61 38 30 32 64 63 64 62 26 65 6e 63 6b 65 79 3d 66 34 39 33 61 61 38 63 62 36 33 61 65 61 31 62 65 35 64 65 61 30 38 38 36 34 34 63 35 34 38 66 36 66 34 65 61 66 61 37 62 37 31 32 66 36 37 38 31 31 61 62 62 37 62 32 64 63 37 62 39 31 63 63 63 38 35 38 64 65 39 36 36 34 34 33 63 33 34 38 36 31 35 30 35 38 30 64 61 33 35 62 38 38 65 65 64 65 37 37 38 66 34 65 30 65 37 64 64 61 65 31 62 65 33 30 39 30 32 34 37 64 63 62 32 63 65 62 61 31 37 31 39 39 34 61 62 62 33 66 35 36 35 36 66 61 61 33 36 38 39 30 32 35 63 65 32 34 63 64 26 6e 61 6d 65 3d 34 31 34 35 36 64 36 66 35 31 26 6f 77 6e 65 72 69 64 3d 36 37 37 39 35 36 33 30 36 31 34 66
                            Data Ascii: type=696e6974&ver=a432c0b7db22669cf6ae5447a802dcdb&enckey=f493aa8cb63aea1be5dea088644c548f6f4eafa7b712f67811abb7b2dc7b91ccc858de966443c3486150580da35b88eede778f4e0e7ddae1be3090247dcb2ceba171994abb3f5656faa3689025ce24cd&name=41456d6f51&ownerid=67795630614f
                            2024-12-09 06:09:08 UTC1314INHTTP/1.1 200 OK
                            Date: Mon, 09 Dec 2024 06:09:08 GMT
                            Content-Type: text/plain;charset=UTF-8
                            Content-Length: 928
                            Connection: close
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l%2Fa2LunNRZHgzjRDjLr1S28997xKDndhbFfuvGxtjZ9WQlB9ZquaGj%2BDIOzZbIGQ6PH6LWevq0PB9dw2XCCQWDaopUHYPrZ4uZBfA0yX5tv28ebqczQky1LpXOKm"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Acknowledge: Credit to VaultCord.com
                            X-Powered-By: VaultCord.com
                            content-security-policy: upgrade-insecure-requests
                            permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                            referrer-policy: strict-origin-when-cross-origin
                            strict-transport-security: max-age=31536000; includeSubDomains
                            x-content-security-policy: img-src *; media-src * data:;
                            x-content-type-options: nosniff
                            x-frame-options: DENY
                            x-xss-protection: 1; mode=block
                            Access-Control-Allow-Headers: *
                            Access-Control-Allow-Methods: *
                            Access-Control-Allow-Origin: *
                            Server: cloudflare
                            CF-RAY: 8ef2d31b7d3342c3-EWR
                            server-timing: cfL4;desc="?proto=TCP&rtt=1784&min_rtt=1772&rtt_var=689&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2344&recv_bytes=1125&delivery_rate=1559829&cwnd=203&unsent_bytes=0&cid=bbac153e8c6e80cc&ts=500&x=0"
                            2024-12-09 06:09:08 UTC55INData Raw: 36 32 39 34 33 35 64 35 61 33 65 35 35 35 62 36 65 36 35 63 36 61 34 35 30 31 63 62 64 39 62 37 66 32 64 63 31 30 30 38 38 30 63 62 66 39 61 31 32 30 37 36 61 30 35
                            Data Ascii: 629435d5a3e555b6e65c6a4501cbd9b7f2dc100880cbf9a12076a05
                            2024-12-09 06:09:08 UTC873INData Raw: 31 66 34 65 38 65 34 37 64 34 30 37 63 61 64 66 66 35 36 39 33 64 32 33 36 36 37 64 39 64 66 62 36 35 30 37 63 32 36 31 39 63 65 31 61 35 62 33 37 64 35 64 34 34 30 39 63 34 61 64 61 35 31 34 38 38 36 63 31 33 63 31 66 36 39 65 37 61 64 32 61 34 35 62 35 33 39 64 65 35 31 33 34 31 36 35 63 38 64 34 39 39 62 63 31 65 62 36 63 34 32 35 63 62 38 63 65 63 36 38 61 37 61 35 64 38 33 31 63 37 66 61 32 38 61 63 66 61 66 34 62 66 37 37 61 64 36 34 64 39 64 36 33 37 37 30 34 37 37 35 38 65 34 34 31 63 64 32 39 62 36 32 62 39 39 61 30 30 61 37 35 66 63 64 63 32 66 63 32 39 39 30 34 65 61 34 39 39 37 37 62 63 66 31 36 30 38 37 31 33 31 30 31 38 36 35 30 36 30 37 65 33 39 61 65 65 35 34 61 35 32 33 39 61 37 38 62 37 31 39 34 38 30 34 62 62 62 34 36 31 35 39 35 32 31
                            Data Ascii: 1f4e8e47d407cadff5693d23667d9dfb6507c2619ce1a5b37d5d4409c4ada514886c13c1f69e7ad2a45b539de5134165c8d499bc1eb6c425cb8cec68a7a5d831c7fa28acfaf4bf77ad64d9d6377047758e441cd29b62b99a00a75fcdc2fc29904ea49977bcf16087131018650607e39aee54a5239a78b7194804bbb46159521


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:01:09:05
                            Start date:09/12/2024
                            Path:C:\Users\user\Desktop\IJGLxMMTaK.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\IJGLxMMTaK.exe"
                            Imagebase:0x7ff71ba00000
                            File size:3'439'616 bytes
                            MD5 hash:8D907F49144E6FB96D6ADC306C614F1E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Target ID:1
                            Start time:01:09:05
                            Start date:09/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:2
                            Start time:01:09:05
                            Start date:09/12/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20
                            Imagebase:0x7ff7c8500000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:01:09:05
                            Start date:09/12/2024
                            Path:C:\Windows\System32\mode.com
                            Wow64 process (32bit):false
                            Commandline:MODE CON COLS=80 LINES=20
                            Imagebase:0x7ff610c00000
                            File size:33'280 bytes
                            MD5 hash:BEA7464830980BF7C0490307DB4FC875
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:4
                            Start time:01:09:07
                            Start date:09/12/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c cls
                            Imagebase:0x7ff7c8500000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:01:09:11
                            Start date:09/12/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c cls
                            Imagebase:0x7ff7c8500000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            No disassembly