Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IJGLxMMTaK.exe

Overview

General Information

Sample name:IJGLxMMTaK.exe
renamed because original name is a hash value
Original sample name:8d907f49144e6fb96d6adc306c614f1e.exe
Analysis ID:1571216
MD5:8d907f49144e6fb96d6adc306c614f1e
SHA1:5dff700ca5e08b00e946a978378626ec450675a7
SHA256:2b619b8f8925b47fc0b735533332ba33267063cca7082d1306b06bc91295b817
Tags:exeuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Abnormal high CPU Usage
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • IJGLxMMTaK.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\IJGLxMMTaK.exe" MD5: 8D907F49144E6FB96D6ADC306C614F1E)
    • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7644 cmdline: C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • mode.com (PID: 7660 cmdline: MODE CON COLS=80 LINES=20 MD5: BEA7464830980BF7C0490307DB4FC875)
    • cmd.exe (PID: 7820 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7868 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: IJGLxMMTaK.exeReversingLabs: Detection: 65%
Source: IJGLxMMTaK.exeVirustotal: Detection: 46%Perma Link
Source: IJGLxMMTaK.exeJoe Sandbox ML: detected
Source: IJGLxMMTaK.exe, 00000001.00000000.1303901837.00007FF68041B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_622b6792-9
Source: IJGLxMMTaK.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: IJGLxMMTaK.exe
Source: Binary string: crypto\stack\stack.ccompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMcrypto\ex_data.c source: IJGLxMMTaK.exe
Source: global trafficHTTP traffic detected: POST /api/1.0/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 336Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.0/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 336Content-Type: application/x-www-form-urlencoded
Source: IJGLxMMTaK.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: IJGLxMMTaK.exeString found in binary or memory: https://keyauth.2222222222222222
Source: IJGLxMMTaK.exe, 00000001.00000003.1332372298.0000026D806B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.0/
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess Stats: CPU usage > 49%
Source: classification engineClassification label: mal60.evad.winEXE@10/1@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7460:120:WilError_03
Source: IJGLxMMTaK.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: IJGLxMMTaK.exeReversingLabs: Detection: 65%
Source: IJGLxMMTaK.exeVirustotal: Detection: 46%
Source: IJGLxMMTaK.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectoryC:\Users\risku\Downloads\vcpkg-master\buildtrees\curl\src\url-7_68_0-cd669cc759\lib\system_win32.cLIMIT %s:%d %s reached memlimit
Source: IJGLxMMTaK.exeString found in binary or memory: id-cmc-addExtensions
Source: IJGLxMMTaK.exeString found in binary or memory: set-addPolicy
Source: unknownProcess created: C:\Users\user\Desktop\IJGLxMMTaK.exe "C:\Users\user\Desktop\IJGLxMMTaK.exe"
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com MODE CON COLS=80 LINES=20
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com MODE CON COLS=80 LINES=20Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: ureg.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: fsutilext.dllJump to behavior
Source: IJGLxMMTaK.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: IJGLxMMTaK.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: IJGLxMMTaK.exeStatic file information: File size 3439616 > 1048576
Source: IJGLxMMTaK.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x25a000
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: IJGLxMMTaK.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: IJGLxMMTaK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: IJGLxMMTaK.exe
Source: Binary string: crypto\stack\stack.ccompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -utf-8 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMcrypto\ex_data.c source: IJGLxMMTaK.exe
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: IJGLxMMTaK.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Malware Analysis System Evasion

barindex
Source: IJGLxMMTaK.exeBinary or memory string: INFOLICENSEFILECONTENTSNULLUSERNAMESUBSCRIPTIONSEXPIRYSUBSCRIPTIONSHY PRODUCT+DONT CRACK MY PROGRAMUD.EXEKSDUMPERCLIENT.EXEHTTPDEBUGGERUI.EXEHTTPDEBUGGERSVC.EXEX64DBG.EXEX.EXEX64DBG-UNSIGNED.EXEKSDUMPER.EXECHEATENGINE - X86_64 - SSE4 - AVX2.EXEHTTP DEBUGGER WINDOWS SERVICE(32 BIT).EXECHEAT ENGINE.EXEXENOS64.EXEFIDDLER.EXEWIRESHARK.EXEIDAQ64.EXEIDAQ.EXENEWX.EXENEW.EXEOLLYDBG.EXEGIDAPLUS.EXEAUTO.EXEHXD.EXEFIDDLER.EXE1X.EXEPROCMON.EXEGETWINDOWTEXT_X64.EXEFOLDERCHANGESVIEW.EXE\\.\KSDUMPER#
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeWindow / User API: threadDelayed 6390Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeWindow / User API: threadDelayed 3287Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeOpen window title or class name: procmon.exe
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeOpen window title or class name: wireshark.exe
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20Jump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\IJGLxMMTaK.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com MODE CON COLS=80 LINES=20Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping2
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1571216 Sample: IJGLxMMTaK.exe Startdate: 09/12/2024 Architecture: WINDOWS Score: 60 22 keyauth.win 2->22 28 Multi AV Scanner detection for submitted file 2->28 30 Machine Learning detection for sample 2->30 32 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->32 8 IJGLxMMTaK.exe 1 2->8         started        signatures3 process4 dnsIp5 24 keyauth.win 104.26.0.5, 443, 49709 CLOUDFLARENETUS United States 8->24 26 127.0.0.1 unknown unknown 8->26 34 Tries to detect sandboxes and other dynamic analysis tools (window names) 8->34 12 cmd.exe 1 8->12         started        14 conhost.exe 8->14         started        16 cmd.exe 1 8->16         started        18 cmd.exe 8->18         started        signatures6 process7 process8 20 mode.com 1 12->20         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IJGLxMMTaK.exe66%ReversingLabsWin64.Infostealer.Tinba
IJGLxMMTaK.exe47%VirustotalBrowse
IJGLxMMTaK.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://keyauth.22222222222222220%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.0/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://keyauth.2222222222222222IJGLxMMTaK.exefalse
      • Avira URL Cloud: safe
      unknown
      https://curl.haxx.se/docs/http-cookies.htmlIJGLxMMTaK.exefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.26.0.5
        keyauth.winUnited States
        13335CLOUDFLARENETUSfalse
        IP
        127.0.0.1
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1571216
        Start date and time:2024-12-09 07:16:09 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 11s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:14
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:IJGLxMMTaK.exe
        renamed because original name is a hash value
        Original Sample Name:8d907f49144e6fb96d6adc306c614f1e.exe
        Detection:MAL
        Classification:mal60.evad.winEXE@10/1@1/2
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        104.26.0.5dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
          file.exeGet hashmaliciousUnknownBrowse
            IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
              SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          keyauth.windMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                          • 104.26.0.5
                          CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                          • 104.26.1.5
                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                          • 104.26.1.5
                          file.exeGet hashmaliciousUnknownBrowse
                          • 104.26.0.5
                          exe004.exeGet hashmaliciousUnknownBrowse
                          • 104.26.0.5
                          IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                          • 104.26.0.5
                          SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                          • 104.26.0.5
                          SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                          • 172.67.72.57
                          SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                          • 104.26.0.5
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUScd94pB4Z9p.exeGet hashmaliciousLummaC StealerBrowse
                          • 172.67.165.166
                          AmNdY4tRXD.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.16.9
                          NEW.RFQ00876.pdf.exeGet hashmaliciousFormBookBrowse
                          • 172.67.145.234
                          SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                          • 172.67.177.137
                          Hesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 104.21.67.152
                          BUNKER INVOICE MV SUN OCEAN.pdf.vbsGet hashmaliciousGuLoaderBrowse
                          • 104.21.65.104
                          Bunker_STS_pdf.vbsGet hashmaliciousGuLoaderBrowse
                          • 104.21.71.195
                          Payment_Advice.vbsGet hashmaliciousGuLoaderBrowse
                          • 172.67.148.42
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.16.9
                          No context
                          No context
                          Process:C:\Users\user\Desktop\IJGLxMMTaK.exe
                          File Type:ASCII text, with CRLF line terminators, with escape sequences
                          Category:dropped
                          Size (bytes):1944
                          Entropy (8bit):4.122087188518395
                          Encrypted:false
                          SSDEEP:12:2iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiieXE9xaNWZvMXl:bps9MV
                          MD5:D94074F09CCD187BD79715D8EBD8D460
                          SHA1:464468508BC52BFF1ED15F0EED129A5D09B1ACCE
                          SHA-256:010D384DA2BD21579FDAB3CACFE2A2F47CF4EEE0164C6D6DE0CDA702AED07DB8
                          SHA-512:D17359C51040EB811DE827BA95A1A0CAE8F6FB93D7AEC50C7B3AB38EDA096B1EAE68E7DB333F20A95950C36C89D545C4070678FDBF43096242F48059DBD03170
                          Malicious:false
                          Reputation:low
                          Preview:...... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment....... Connecting server, please just a moment.......
                          File type:PE32+ executable (console) x86-64, for MS Windows
                          Entropy (8bit):6.656348286171827
                          TrID:
                          • Win64 Executable Console (202006/5) 92.65%
                          • Win64 Executable (generic) (12005/4) 5.51%
                          • Generic Win/DOS Executable (2004/3) 0.92%
                          • DOS Executable Generic (2002/1) 0.92%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:IJGLxMMTaK.exe
                          File size:3'439'616 bytes
                          MD5:8d907f49144e6fb96d6adc306c614f1e
                          SHA1:5dff700ca5e08b00e946a978378626ec450675a7
                          SHA256:2b619b8f8925b47fc0b735533332ba33267063cca7082d1306b06bc91295b817
                          SHA512:be9125e864782b113458e5c1fca897616319385296e3cdf27f438ff57eb34b4f51dd6d6ae6ed8db3b9baa86c473ffc5b9c315e2bc4d336704bdfb0430178014c
                          SSDEEP:49152:8GtlqtwIU6iNs5Fwr9aQcmEDZKM96aLSwNLpruGBclX7u1su2HgysenXffM4eiP0:4+NsQhuZKM9ZDveSxeXMBftp4
                          TLSH:DFF5AE52A7A401E8D9B7C13CC9564623E7F2B42513B09BDB06B4C67A0F23BE16E3E751
                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........;...h...h...h...i...h...iX..h...i...h.,Yh...h.,.i...h.,.i...h.,.i...h...h...h...i...h...h...hL..i...hL..i...hL..i...h.-.i...
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x140218d44
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x140000000
                          Subsystem:windows cui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x66C9E0E8 [Sat Aug 24 13:32:24 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:95f5bd73e86642cf70d3e34a666486d8
                          Instruction
                          dec eax
                          sub esp, 28h
                          call 00007FB7408ADB7Ch
                          dec eax
                          add esp, 28h
                          jmp 00007FB7408AD0D7h
                          int3
                          int3
                          dec eax
                          mov eax, esp
                          dec eax
                          mov dword ptr [eax+08h], ebx
                          dec eax
                          mov dword ptr [eax+10h], ebp
                          dec eax
                          mov dword ptr [eax+18h], esi
                          dec eax
                          mov dword ptr [eax+20h], edi
                          inc ecx
                          push esi
                          dec eax
                          sub esp, 20h
                          dec ecx
                          mov ebx, dword ptr [ecx+38h]
                          dec eax
                          mov esi, edx
                          dec ebp
                          mov esi, eax
                          dec eax
                          mov ebp, ecx
                          dec ecx
                          mov edx, ecx
                          dec eax
                          mov ecx, esi
                          dec ecx
                          mov edi, ecx
                          dec esp
                          lea eax, dword ptr [ebx+04h]
                          call 00007FB7408AD599h
                          mov eax, dword ptr [ebp+04h]
                          and al, 66h
                          neg al
                          mov eax, 00000001h
                          inc ebp
                          sbb eax, eax
                          inc ecx
                          neg eax
                          inc esp
                          add eax, eax
                          inc esp
                          test dword ptr [ebx+04h], eax
                          je 00007FB7408AD273h
                          dec esp
                          mov ecx, edi
                          dec ebp
                          mov eax, esi
                          dec eax
                          mov edx, esi
                          dec eax
                          mov ecx, ebp
                          call 00007FB7408AE87Dh
                          dec eax
                          mov ebx, dword ptr [esp+30h]
                          dec eax
                          mov ebp, dword ptr [esp+38h]
                          dec eax
                          mov esi, dword ptr [esp+40h]
                          dec eax
                          mov edi, dword ptr [esp+48h]
                          dec eax
                          add esp, 20h
                          inc ecx
                          pop esi
                          ret
                          int3
                          dec eax
                          mov dword ptr [esp+10h], ebx
                          dec eax
                          mov dword ptr [esp+18h], esi
                          push ebp
                          push edi
                          inc ecx
                          push esi
                          dec eax
                          mov ebp, esp
                          dec eax
                          sub esp, 10h
                          xor eax, eax
                          xor ecx, ecx
                          cpuid
                          inc esp
                          mov eax, ecx
                          inc esp
                          mov edx, edx
                          inc ecx
                          xor edx, 49656E69h
                          inc ecx
                          xor eax, 6C65746Eh
                          inc esp
                          mov ecx, ebx
                          inc esp
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x31d2400xdc.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3490000x1e8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3300000x18db0.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x34a0000x79a4.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x2fb8200x38.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x2fba000x28.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2fb6e00x140.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x25b0000x8a0.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x259f480x25a0006edfb6bdca8d58ddb886acb59cfa35e7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x25b0000xc3d8a0xc3e00bd7d9d2094bb1ad9ad3ad8de67a4d72dFalse0.404440212188896OpenPGP Public Key5.695559921548302IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x31f0000x1027c0x90003cdf2dd7dfe9279a63d38c05fb8a4e1dFalse0.18565538194444445data3.7561787695806075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .pdata0x3300000x18db00x18e004245ae4e11f4e0ad03c506dd7268438fFalse0.4868483040201005data6.222487084373812IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0x3490000x1e80x2006a814b04e2ba8bbd21b53ea2878ea335False0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x34a0000x79a40x7a002baab8366a9902b833cbbd6a5800f6a9False0.2538422131147541data5.45723319552951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_MANIFEST0x3490600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                          DLLImport
                          WS2_32.dllselect, __WSAFDIsSet, inet_pton, shutdown, WSASetLastError, bind, getnameinfo, gethostname, sendto, recvfrom, ntohl, freeaddrinfo, getaddrinfo, ioctlsocket, listen, htonl, socket, send, recv, closesocket, accept, WSACleanup, WSAStartup, WSAIoctl, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, WSAGetLastError
                          WLDAP32.dll
                          CRYPT32.dllCryptQueryObject, CertGetCertificateContextProperty, CertDuplicateCertificateContext, CertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CertGetNameStringA, CertAddCertificateContextToStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore
                          ADVAPI32.dllCryptEnumProvidersW, CryptSignHashW, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, CryptAcquireContextW, ReportEventW, RegisterEventSourceW, DeregisterEventSource, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGenRandom, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextA, CopySid, IsValidSid, OpenProcessToken, ConvertSidToStringSidW, GetLengthSid, GetTokenInformation
                          KERNEL32.dllExitProcess, VirtualQuery, VirtualProtect, VirtualAlloc, ExitThread, LoadLibraryExW, RtlPcToFileHeader, InterlockedPushEntrySList, FreeLibraryAndExitThread, GetDriveTypeW, GetFileInformationByHandle, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, SetFilePointerEx, SetConsoleCtrlHandler, GetCommandLineA, GetCommandLineW, GetConsoleOutputCP, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetFileAttributesExW, GetCurrentDirectoryW, GetFullPathNameW, SetStdHandle, FlushFileBuffers, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetEndOfFile, WriteConsoleW, GetSystemInfo, WaitForSingleObjectEx, WriteProcessMemory, GetConsoleScreenBufferInfo, HeapFree, SetConsoleTextAttribute, SetConsoleTitleA, GetCurrentProcess, GetStdHandle, SetCurrentConsoleFontEx, TerminateProcess, GetModuleFileNameW, K32GetModuleFileNameExW, InitializeCriticalSectionEx, WaitForSingleObject, CreateFileW, ResumeThread, OpenProcess, HeapSize, CreateToolhelp32Snapshot, Sleep, GetLastError, Process32NextW, FillConsoleOutputCharacterW, LoadLibraryA, Process32FirstW, HeapReAlloc, CloseHandle, CreateThread, HeapAlloc, Module32FirstW, GetCurrentConsoleFontEx, DecodePointer, HeapDestroy, GetThreadContext, VirtualAllocEx, LocalFree, DeleteCriticalSection, GetProcessHeap, CreateProcessW, WideCharToMultiByte, GetConsoleWindow, Module32NextW, K32EnumProcessModules, DebugBreak, SetConsoleCursorPosition, SetThreadContext, IsDebuggerPresent, GetExitCodeProcess, SetLastError, QueryPerformanceCounter, QueryPerformanceFrequency, FormatMessageA, GetTickCount, EnterCriticalSection, LeaveCriticalSection, SleepEx, VerSetConditionMask, GetSystemDirectoryA, FreeLibrary, GetModuleHandleA, GetProcAddress, VerifyVersionInfoA, RtlUnwind, ExpandEnvironmentStringsA, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, GetEnvironmentVariableW, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleExW, MultiByteToWideChar, FormatMessageW, WriteFile, GetModuleHandleW, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlVirtualUnwind, SwitchToFiber, DeleteFiber, CreateFiber, LoadLibraryW, ConvertFiberToThread, ConvertThreadToFiber, FindClose, FindFirstFileW, FindNextFileW, GetSystemTime, SystemTimeToFileTime, RtlUnwindEx, GetStartupInfoW, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlLookupFunctionEntry, RtlCaptureContext, InitializeSListHead, RaiseException, OutputDebugStringW, GetCPInfo, GetStringTypeW, WakeAllConditionVariable, LCMapStringEx, EncodePointer, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, SleepConditionVariableSRW
                          USER32.dllSetWindowLongW, SetLayeredWindowAttributes, MessageBoxA, FindWindowA, GetProcessWindowStation, MessageBoxW, GetUserObjectInformationW, GetWindowLongW
                          SHELL32.dllShellExecuteA
                          USERENV.dllUnloadUserProfile
                          RPCRT4.dllRpcStringFreeA, UuidToStringA, UuidCreate
                          bcrypt.dllBCryptGenRandom
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 9, 2024 07:17:06.775238037 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:06.775278091 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:06.775351048 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:06.777704000 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:06.777717113 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:07.994806051 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:07.995306015 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:07.995327950 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:07.996788025 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:07.996855974 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:07.997535944 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:07.997596025 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:07.997632027 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:08.043330908 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:08.044769049 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:08.044790983 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:08.091665983 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:08.476572037 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:08.476677895 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:08.476758003 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:08.489780903 CET49709443192.168.2.11104.26.0.5
                          Dec 9, 2024 07:17:08.489805937 CET44349709104.26.0.5192.168.2.11
                          Dec 9, 2024 07:17:08.489869118 CET49709443192.168.2.11104.26.0.5
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 9, 2024 07:17:06.588907003 CET6350353192.168.2.111.1.1.1
                          Dec 9, 2024 07:17:06.734913111 CET53635031.1.1.1192.168.2.11
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Dec 9, 2024 07:17:06.588907003 CET192.168.2.111.1.1.10xe7daStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 9, 2024 07:17:06.734913111 CET1.1.1.1192.168.2.110xe7daNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                          Dec 9, 2024 07:17:06.734913111 CET1.1.1.1192.168.2.110xe7daNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                          Dec 9, 2024 07:17:06.734913111 CET1.1.1.1192.168.2.110xe7daNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                          • keyauth.win
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.1149709104.26.0.54437416C:\Users\user\Desktop\IJGLxMMTaK.exe
                          TimestampBytes transferredDirectionData
                          2024-12-09 06:17:07 UTC129OUTPOST /api/1.0/ HTTP/1.1
                          Host: keyauth.win
                          Accept: */*
                          Content-Length: 336
                          Content-Type: application/x-www-form-urlencoded
                          2024-12-09 06:17:07 UTC336OUTData Raw: 74 79 70 65 3d 36 39 36 65 36 39 37 34 26 76 65 72 3d 33 36 34 32 39 64 61 65 65 37 66 39 65 63 39 65 62 35 32 37 31 30 64 31 31 63 38 62 39 62 61 62 26 65 6e 63 6b 65 79 3d 30 63 33 33 37 38 38 33 35 63 30 36 66 35 61 37 39 63 62 61 61 64 32 62 33 35 30 33 30 32 34 65 35 30 36 66 30 38 32 35 31 31 63 39 61 35 65 66 39 35 65 65 35 65 62 37 62 38 31 65 36 65 34 32 61 38 61 36 34 64 62 37 37 64 35 65 30 61 32 34 38 36 64 37 31 39 36 38 35 32 31 31 35 33 61 65 65 34 34 37 36 66 61 63 30 35 38 30 30 39 63 65 62 62 31 63 31 39 65 61 65 37 31 66 38 63 38 32 66 64 39 34 64 33 33 32 30 65 64 34 31 66 39 33 38 30 34 39 31 31 33 61 36 35 66 66 65 32 34 33 26 6e 61 6d 65 3d 34 31 34 35 36 64 36 66 35 31 26 6f 77 6e 65 72 69 64 3d 36 37 37 39 35 36 33 30 36 31 34 66
                          Data Ascii: type=696e6974&ver=36429daee7f9ec9eb52710d11c8b9bab&enckey=0c3378835c06f5a79cbaad2b3503024e506f082511c9a5ef95ee5eb7b81e6e42a8a64db77d5e0a2486d71968521153aee4476fac058009cebb1c19eae71f8c82fd94d3320ed41f938049113a65ffe243&name=41456d6f51&ownerid=67795630614f
                          2024-12-09 06:17:08 UTC1322INHTTP/1.1 200 OK
                          Date: Mon, 09 Dec 2024 06:17:08 GMT
                          Content-Type: text/plain;charset=UTF-8
                          Content-Length: 928
                          Connection: close
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c%2BQbCyJcQh%2BKoQKNNrjBDI%2FvqssaO4v08CbPpl3oW3bzfmQtuLXASICGmCzi%2B4ICbDgZhRSaVJ88AI6qECkrKDr%2BY3urGc%2FqcRKk1yXvTJIrCFEMlGCZc3MaylLw"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Acknowledge: Credit to VaultCord.com
                          X-Powered-By: VaultCord.com
                          content-security-policy: upgrade-insecure-requests
                          permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                          referrer-policy: strict-origin-when-cross-origin
                          strict-transport-security: max-age=31536000; includeSubDomains
                          x-content-security-policy: img-src *; media-src * data:;
                          x-content-type-options: nosniff
                          x-frame-options: DENY
                          x-xss-protection: 1; mode=block
                          Access-Control-Allow-Headers: *
                          Access-Control-Allow-Methods: *
                          Access-Control-Allow-Origin: *
                          Server: cloudflare
                          CF-RAY: 8ef2ded2afe68c41-EWR
                          server-timing: cfL4;desc="?proto=TCP&rtt=1820&min_rtt=1819&rtt_var=684&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2345&recv_bytes=1125&delivery_rate=1598248&cwnd=225&unsent_bytes=0&cid=cbe19b0ef1c8bc93&ts=493&x=0"
                          2024-12-09 06:17:08 UTC47INData Raw: 61 39 38 39 35 64 61 36 33 62 36 30 36 30 64 32 61 32 36 38 39 34 65 33 36 39 33 36 31 61 34 33 33 62 34 61 31 32 39 61 32 30 35 63 61 35 31
                          Data Ascii: a9895da63b6060d2a26894e369361a433b4a129a205ca51
                          2024-12-09 06:17:08 UTC881INData Raw: 63 38 63 65 30 39 65 34 62 65 32 33 62 34 37 32 65 65 36 62 37 36 63 39 62 32 36 64 65 30 62 35 31 63 33 65 33 61 35 63 31 39 32 35 37 34 33 36 30 32 37 62 65 37 34 30 36 38 65 61 36 39 63 64 65 63 38 34 36 32 64 32 64 36 31 39 32 37 36 63 34 65 39 63 34 64 34 62 34 33 63 32 65 30 63 37 30 31 32 65 63 30 34 31 35 30 61 64 65 38 63 33 66 61 32 38 30 36 34 65 32 64 62 33 66 38 35 36 31 63 66 39 34 38 32 38 31 61 33 39 61 64 65 30 62 61 39 34 30 65 63 30 62 33 37 30 31 34 33 39 34 65 32 65 65 36 64 61 33 31 62 61 39 62 64 63 37 33 30 32 30 37 65 66 66 33 35 37 32 64 39 39 36 64 33 61 64 39 31 63 38 38 64 32 38 62 39 38 36 36 61 38 32 65 35 63 32 37 64 33 37 36 34 61 65 63 63 38 66 39 35 61 39 64 63 64 61 30 37 32 34 35 33 36 35 32 35 32 31 63 33 34 65 31 30
                          Data Ascii: c8ce09e4be23b472ee6b76c9b26de0b51c3e3a5c19257436027be74068ea69cdec8462d2d619276c4e9c4d4b43c2e0c7012ec04150ade8c3fa28064e2db3f8561cf948281a39ade0ba940ec0b37014394e2ee6da31ba9bdc730207eff3572d996d3ad91c88d28b9866a82e5c27d3764aecc8f95a9dcda072453652521c34e10


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:1
                          Start time:01:17:04
                          Start date:09/12/2024
                          Path:C:\Users\user\Desktop\IJGLxMMTaK.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\IJGLxMMTaK.exe"
                          Imagebase:0x7ff6801c0000
                          File size:3'439'616 bytes
                          MD5 hash:8D907F49144E6FB96D6ADC306C614F1E
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Target ID:2
                          Start time:01:17:04
                          Start date:09/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff68cce0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:4
                          Start time:01:17:05
                          Start date:09/12/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\cmd.exe /c MODE CON COLS=80 LINES=20
                          Imagebase:0x7ff746740000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:01:17:05
                          Start date:09/12/2024
                          Path:C:\Windows\System32\mode.com
                          Wow64 process (32bit):false
                          Commandline:MODE CON COLS=80 LINES=20
                          Imagebase:0x7ff675270000
                          File size:33'280 bytes
                          MD5 hash:BEA7464830980BF7C0490307DB4FC875
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:6
                          Start time:01:17:07
                          Start date:09/12/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\cmd.exe /c cls
                          Imagebase:0x7ff746740000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:7
                          Start time:01:17:11
                          Start date:09/12/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\cmd.exe /c cls
                          Imagebase:0x7ff746740000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          No disassembly