Windows
Analysis Report
Lu4421.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64native
- Lu4421.exe (PID: 7452 cmdline:
"C:\Users\ user\Deskt op\Lu4421. exe" MD5: E5358FCA58C0E1B1E29EB195FB0F4675) - cmd.exe (PID: 6052 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\a42 235a3-5c0c -493b-8363 -b541a166b 8b0.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5636 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - chcp.com (PID: 7992 cmdline:
chcp 65001 MD5: CA9A549C17932F9CAA154B5528EBD8D4) - taskkill.exe (PID: 3660 cmdline:
taskkill / F /PID 745 2 MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - timeout.exe (PID: 5372 cmdline:
timeout /T 2 /NOBREA K MD5: 100065E21CFBBDE57CBA2838921F84D6)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Stealerium | According to SecurityScorecard, Stealerium is an open-source stealer available on GitHub. The malware steals information from browsers, cryptocurrency wallets, and applications such as Discord, Pidgin, Outlook, Telegram, Skype, Element, Signal, Tox, Steam, Minecraft, and VPN clients. The binary also gathers data about the infected host, such as the running processes, Desktop and webcam screenshots, Wi-Fi networks, the Windows product key, and the public and private IP address. The stealer employs multiple anti-analysis techniques, such as detecting virtual machines, sandboxes, and malware analysis tools and checking if the process is being debugged. The malware also embedded a keylogger module and a clipper module that replaces cryptocurrency wallet addresses with the threat actors addresses if the victim makes a transaction. The stolen information is sent to a Discord channel using a Discord Webhook. | No Attribution |
{"C2 url": "https://szurubooru.zulipchat.com/api/v1/messages", "User": "szurubooru@gmail.com", "API key": "fgwT5umbrQdW6Y1buIWZJK6S2FVQZAeS"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Stealerium | Yara detected Stealerium | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_AntiVM_5 | Yara detected AntiVM_5 | Joe Security | ||
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AntiVM_5 | Yara detected AntiVM_5 | Joe Security | ||
JoeSecurity_AntiVM_5 | Yara detected AntiVM_5 | Joe Security | ||
JoeSecurity_AntiVM_5 | Yara detected AntiVM_5 | Joe Security | ||
JoeSecurity_Stealerium | Yara detected Stealerium | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Stealerium | Yara detected Stealerium | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_AntiVM_5 | Yara detected AntiVM_5 | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen |
|
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | URLs: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFAD6408B52 | |
Source: | Code function: | 0_2_00007FFAD640AB55 | |
Source: | Code function: | 0_2_00007FFAD6407DA6 | |
Source: | Code function: | 0_2_00007FFAD640DD5A |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static file information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFAD64024A1 | |
Source: | Code function: | 0_2_00007FFAD640BCB7 |
Boot Survival |
---|
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Language, Device and Operating System Detection |
---|
Source: | File source: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_0115F200 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 111 Windows Management Instrumentation | 1 Scripting | 11 Process Injection | 1 Masquerading | OS Credential Dumping | 331 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Abuse Elevation Control Mechanism | 11 Disable or Modify Tools | LSASS Memory | 261 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 261 Virtualization/Sandbox Evasion | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Abuse Elevation Control Mechanism | LSA Secrets | 15 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Timestomp | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
68% | ReversingLabs | Win64.Trojan.Amadey | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
raw.githubusercontent.com | 185.199.111.133 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.199.111.133 | raw.githubusercontent.com | Netherlands | 54113 | FASTLYUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577337 |
Start date and time: | 2024-12-18 12:13:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 12s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Suspected VM Detection |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Lu4421.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@10/3@1/1 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: Lu4421.exe
Time | Type | Description |
---|---|---|
06:15:22 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.199.111.133 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
raw.githubusercontent.com | Get hash | malicious | Can Stealer | Browse |
| |
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
FASTLYUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Abobus Obfuscator, Braodo | Browse |
| ||
Get hash | malicious | Abobus Obfuscator, Braodo | Browse |
|
Process: | C:\Users\user\Desktop\Lu4421.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 956 |
Entropy (8bit): | 5.177550727578771 |
Encrypted: | false |
SSDEEP: | 24:oV0F4q6vwnVymWybbyou0A0ynCPySZyWHQyoYnyegyr9M:oO6vwnfK0sCV7M |
MD5: | 3BFF8DE21606A9FE7D891542D1E6CC30 |
SHA1: | D0D9419BE3C3B4A04A0257B2492C17AAB6209077 |
SHA-256: | 5BEF547E08E4ACDE46B23468C3C9CDC8EED97AE25C65A29AC28B3F64B447B2D6 |
SHA-512: | FB6213E4038303931708EB38F6F5708E9B3993694554509F65D8F5F7744A351F464E0D4C7AF38B2797AEE5666D7251A67956197752498275910B89F0C5405629 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Lu4421.exe |
File Type: | |
Category: | modified |
Size (bytes): | 153 |
Entropy (8bit): | 5.381525183032284 |
Encrypted: | false |
SSDEEP: | 3:HFTulK1shFzXCOL2STtv/K025PONtkE2J5xAIsHP9A+VdghTvn:sgyL2SZX2PCN23fwP9H0pn |
MD5: | 77AAA6FAF79476225D80881E8DC5103D |
SHA1: | FF823400433BB5B1DBDB85D5363262DF91F5410F |
SHA-256: | B5B8EF4AB646E09839E3FEC1BF4C5265765E3797C8C456AB5A74BBFA4D206F53 |
SHA-512: | 295B86175ADC2B9766A54D39E5D702B2EE84D7B28182B49E9439AAE0B6C6262AB20E7C71AD34015AE8EBCCEF3660E137CB30DBDEE58836BC3BE60B148F3217AE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\timeout.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55 |
Entropy (8bit): | 4.5991860770036785 |
Encrypted: | false |
SSDEEP: | 3:hYF8AgARcWmFsFJQZaVy:hYF/mFSQZas |
MD5: | 471500D11DAF370CB75C597A4B1A7654 |
SHA1: | 1AC2D4BDA1A30E09287F680C2AD75C577B096898 |
SHA-256: | C751BAFF37E4DC361F2C77BCC6B356159CC6178D1642244CBCD764A8DDE409B9 |
SHA-512: | DB81C5CE33D78E5618F41738129B5E623300CEFF188D99E7173E4E524107EEDED4C3BE2F15AC4715D3D10EAC23E39841978BBD42326E5C4E016A2B938C37A855 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 7.973829401437202 |
TrID: |
|
File name: | Lu4421.exe |
File size: | 5'865'472 bytes |
MD5: | e5358fca58c0e1b1e29eb195fb0f4675 |
SHA1: | a114c059fed08a501c344f40d9f702f03cdebbab |
SHA256: | 220c04c30a7dbd084fdebe00102f6340194845d8664dfd669a5549f23a1031c4 |
SHA512: | f072704ad3ffe2ad975972453f1a58fe3ccd4061ef275e833e60b593e79e65e9955fe841e7248002046e4c35472bbc9c946457f9608fe10c92fa07a9747ea8f3 |
SSDEEP: | 98304:xkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13r7INfWdpe:xkSIlLtzWAXAkuujCPX9YG9he5GnQCAe |
TLSH: | 3146331473F5069AF1FB6BB4E97141119E36BA07C077EA4C1958109C0EB3789AD22FBB |
File Content Preview: | MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..*9..........`... ....@...... ...............................=Z...`...@......@............... ..... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0xd26000 |
Entrypoint Section: | .taggant |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE |
Time Stamp: | 0xFFBE84BF [Sat Dec 19 14:25:03 2105 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | dc12932426806b6b47a373d7ae42c21d |
Instruction |
---|
jmp 00007FC6345E3A2Ah |
divps xmm3, dqword ptr [ecx+00h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
jmp 00007FC6345E5A25h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [edx], bh |
add al, byte ptr [eax] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add byte ptr [eax], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
jnle 00007FC6345E39A2h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
iretd |
add dword ptr [eax], eax |
add byte ptr [eax], cl |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add byte ptr [eax], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add dword ptr [eax+00000000h], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x398085 | 0xad | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x396000 | 0x53c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x2000 | 0x394000 | 0x394000 | ceec5083f285b2c1be8d061a39f91e2c | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.rsrc | 0x396000 | 0x53c | 0x400 | fb14019a6944b144187ed32a35b67085 | False | 0.6904296875 | data | 5.659166984958865 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x398000 | 0x2000 | 0x200 | f556b29b2c3bed37b6a24754dd07217a | False | 0.166015625 | data | 1.1919459888330979 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
0x39a000 | 0x38a000 | 0x200 | 7c37b2d3bde84d00b50b7fc7d29ad5fd | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
iubcysyr | 0x724000 | 0x200000 | 0x1ff400 | 5307be4cfcf1ab435746dd4c576b558c | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
tpxtcrvz | 0x924000 | 0x2000 | 0x200 | ff4192a5c1ad550f8e65ea3f3799fbc4 | False | 0.587890625 | data | 4.534819229507492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.taggant | 0x926000 | 0x4000 | 0x2200 | 96c9148d88dec28e0da1788ac9c5c22a | False | 0.07192095588235294 | DOS executable (COM) | 0.9116417289365074 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x922dd8 | 0x348 | data | 0.43214285714285716 | ||
RT_MANIFEST | 0x923120 | 0x152 | ASCII text, with CRLF line terminators | 0.6479289940828402 |
DLL | Import |
---|---|
kernel32.dll | lstrcpy |
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 12:15:23.801805973 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.801863909 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.801913023 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.801968098 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.802103043 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.802124977 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.802171946 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.802231073 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.802395105 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.804006100 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.804029942 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.804735899 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.805412054 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.805438042 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.805874109 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.810781956 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.810806990 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.810946941 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.817464113 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.817478895 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.817488909 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.817488909 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.817498922 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.817511082 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.817521095 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.817526102 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.825700998 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.825720072 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:23.825896978 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:23.825911999 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.097132921 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.097389936 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.097809076 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.098095894 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.100600004 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.100788116 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.101458073 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.101465940 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.101632118 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.103218079 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.103231907 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.103487968 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.103513002 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.103632927 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.103646040 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.103739977 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.103943110 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.104397058 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.104609966 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.104748011 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.104753017 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.104995012 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.105776072 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.105782032 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.105969906 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.110214949 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.110444069 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.111598969 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.111604929 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.111788034 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.136852980 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.136864901 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.136868000 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.136868954 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.136884928 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.136884928 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.178299904 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.178299904 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.178302050 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.182235956 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.182252884 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.182260036 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.456563950 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.456624985 CET | 443 | 49746 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.456845045 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.460977077 CET | 49746 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.466691017 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.466893911 CET | 443 | 49750 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.467073917 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.467348099 CET | 49750 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.506823063 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.506900072 CET | 443 | 49748 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.507036924 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.507365942 CET | 49748 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.533078909 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.533468008 CET | 443 | 49751 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.533638000 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.533849001 CET | 49751 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.556726933 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.556997061 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.557049990 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.557111025 CET | 443 | 49747 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.557234049 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.557312012 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.567467928 CET | 49747 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.632401943 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.632560015 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.632612944 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.632673979 CET | 443 | 49749 | 185.199.111.133 | 192.168.11.20 |
Dec 18, 2024 12:15:24.632742882 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.632836103 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Dec 18, 2024 12:15:24.633203983 CET | 49749 | 443 | 192.168.11.20 | 185.199.111.133 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 12:15:23.657195091 CET | 51983 | 53 | 192.168.11.20 | 1.1.1.1 |
Dec 18, 2024 12:15:23.792727947 CET | 53 | 51983 | 1.1.1.1 | 192.168.11.20 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 12:15:23.657195091 CET | 192.168.11.20 | 1.1.1.1 | 0x545 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 12:15:23.792727947 CET | 1.1.1.1 | 192.168.11.20 | 0x545 | No error (0) | 185.199.111.133 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:15:23.792727947 CET | 1.1.1.1 | 192.168.11.20 | 0x545 | No error (0) | 185.199.108.133 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:15:23.792727947 CET | 1.1.1.1 | 192.168.11.20 | 0x545 | No error (0) | 185.199.109.133 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:15:23.792727947 CET | 1.1.1.1 | 192.168.11.20 | 0x545 | No error (0) | 185.199.110.133 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.11.20 | 49751 | 185.199.111.133 | 443 | 7452 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:15:24 UTC | 128 | OUT | |
2024-12-18 11:15:24 UTC | 896 | IN | |
2024-12-18 11:15:24 UTC | 1275 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.11.20 | 49747 | 185.199.111.133 | 443 | 7452 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:15:24 UTC | 124 | OUT | |
2024-12-18 11:15:24 UTC | 895 | IN | |
2024-12-18 11:15:24 UTC | 1378 | IN | |
2024-12-18 11:15:24 UTC | 1378 | IN | |
2024-12-18 11:15:24 UTC | 389 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.11.20 | 49746 | 185.199.111.133 | 443 | 7452 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:15:24 UTC | 123 | OUT | |
2024-12-18 11:15:24 UTC | 898 | IN | |
2024-12-18 11:15:24 UTC | 1110 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.11.20 | 49748 | 185.199.111.133 | 443 | 7452 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:15:24 UTC | 126 | OUT | |
2024-12-18 11:15:24 UTC | 899 | IN | |
2024-12-18 11:15:24 UTC | 31 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.11.20 | 49750 | 185.199.111.133 | 443 | 7452 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:15:24 UTC | 120 | OUT | |
2024-12-18 11:15:24 UTC | 900 | IN | |
2024-12-18 11:15:24 UTC | 1246 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.11.20 | 49749 | 185.199.111.133 | 443 | 7452 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:15:24 UTC | 119 | OUT | |
2024-12-18 11:15:24 UTC | 896 | IN | |
2024-12-18 11:15:24 UTC | 1378 | IN | |
2024-12-18 11:15:24 UTC | 1378 | IN | |
2024-12-18 11:15:24 UTC | 97 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 06:15:19 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\Lu4421.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb00000 |
File size: | 5'865'472 bytes |
MD5 hash: | E5358FCA58C0E1B1E29EB195FB0F4675 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 06:15:24 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff74c050000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 06:15:24 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff662720000 |
File size: | 875'008 bytes |
MD5 hash: | 81CA40085FC75BABD2C91D18AA9FFA68 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 06:15:24 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\chcp.com |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6288d0000 |
File size: | 14'848 bytes |
MD5 hash: | CA9A549C17932F9CAA154B5528EBD8D4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 06:15:24 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\taskkill.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff60d4c0000 |
File size: | 101'376 bytes |
MD5 hash: | A599D3B2FAFBDE4C1A6D7D0F839451C7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 06:15:24 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\timeout.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff72fd70000 |
File size: | 32'768 bytes |
MD5 hash: | 100065E21CFBBDE57CBA2838921F84D6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Execution Graph
Execution Coverage: | 11.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 7.7% |
Total number of Nodes: | 39 |
Total number of Limit Nodes: | 3 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6407DA6 Relevance: .5, Instructions: 476COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6408B52 Relevance: .5, Instructions: 461COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011F3571 Relevance: 21.1, APIs: 8, Strings: 4, Instructions: 131sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0115736A Relevance: 3.1, APIs: 2, Instructions: 128timeCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0115740C Relevance: 3.1, APIs: 2, Instructions: 102timeCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6400F69 Relevance: .4, Instructions: 449COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6408766 Relevance: .3, Instructions: 335COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6400955 Relevance: .3, Instructions: 334COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6409AD2 Relevance: .3, Instructions: 301COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640266D Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640B9B1 Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6409EB5 Relevance: .2, Instructions: 250COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6409ED0 Relevance: .2, Instructions: 236COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640C528 Relevance: .2, Instructions: 213COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640B6B9 Relevance: .2, Instructions: 208COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640528C Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640AFCD Relevance: .2, Instructions: 191COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640E5F4 Relevance: .2, Instructions: 181COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640C0A8 Relevance: .2, Instructions: 171COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640D22D Relevance: .2, Instructions: 161COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640AC05 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640AB70 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403C59 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403F3A Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640E51C Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640AB90 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640E98A Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640A3B1 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403F7E Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640A181 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640BDE3 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640C326 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640BA35 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD64092B0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6402949 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640A3D0 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640A23D Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640AC90 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640ABE8 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640A250 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403BD9 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD64028E9 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640BE4A Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6400860 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403A2E Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640EA8B Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640E15D Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403F15 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403BB1 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403D5B Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6403E00 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640E0B7 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD6400FB6 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640BA13 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAD640DD5A Relevance: .2, Instructions: 161COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|