Windows
Analysis Report
random.exe.10.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- random.exe.10.exe (PID: 7764 cmdline:
"C:\Users\ user\Deskt op\random. exe.10.exe " MD5: AFD936E441BF5CBDB858E96833CC6ED3) - conhost.exe (PID: 7772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - random.exe.10.exe (PID: 7908 cmdline:
"C:\Users\ user\Deskt op\random. exe.10.exe " MD5: AFD936E441BF5CBDB858E96833CC6ED3)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["aspecteirs.lat", "discokeyus.lat", "sustainskelet.lat", "crosshuaht.lat", "rapeflowwj.lat", "necklacebudi.lat", "grannyejh.lat", "pancakedipyps.click", "energyaffai.lat"], "Build id": "FATE99--test"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 1 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T13:49:47.532709+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49712 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:49.654760+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49713 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:52.808637+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49714 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:55.191760+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49715 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:57.766463+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49716 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:00.723890+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49719 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:03.335163+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49721 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:09.275190+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.9 | 49723 | 104.21.23.76 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T13:49:48.399248+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.9 | 49712 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:50.616047+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.9 | 49713 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:11.969055+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.9 | 49723 | 104.21.23.76 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T13:49:48.399248+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.9 | 49712 | 104.21.23.76 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T13:49:50.616047+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.9 | 49713 | 104.21.23.76 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T13:50:01.494584+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.9 | 49719 | 104.21.23.76 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Directory queried: |
Source: | Code function: | 0_2_00EA36A9 | |
Source: | Code function: | 0_2_00EA375A |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00E91000 | |
Source: | Code function: | 0_2_00E94C8C | |
Source: | Code function: | 0_2_00EA6F3A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A | |
Source: | Code function: | 3_3_00E1368A |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Command line argument: | 0_2_00E9E280 |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00E9535D | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0DCFA | |
Source: | Code function: | 3_3_00E0DCFA | |
Source: | Code function: | 3_3_00E0DCFA | |
Source: | Code function: | 3_3_00E05FD9 | |
Source: | Code function: | 3_3_00E08DB1 | |
Source: | Code function: | 3_3_00E08DB1 | |
Source: | Code function: | 3_3_00E0B631 | |
Source: | Code function: | 3_3_00E0B631 | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0CB19 | |
Source: | Code function: | 3_3_00E0CB19 | |
Source: | Code function: | 3_3_00E0CB19 | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0DCFA | |
Source: | Code function: | 3_3_00E0DCFA | |
Source: | Code function: | 3_3_00E0DCFA | |
Source: | Code function: | 3_3_00E05FD9 | |
Source: | Code function: | 3_3_00E08DB1 | |
Source: | Code function: | 3_3_00E08DB1 | |
Source: | Code function: | 3_3_00E0B631 | |
Source: | Code function: | 3_3_00E0B631 | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0A459 | |
Source: | Code function: | 3_3_00E0CB19 | |
Source: | Code function: | 3_3_00E0CB19 | |
Source: | Code function: | 3_3_00E0CB19 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_00EA36A9 | |
Source: | Code function: | 0_2_00EA375A |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-14489 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00E95020 |
Source: | Code function: | 0_2_00EB519E | |
Source: | Code function: | 0_2_00E91614 |
Source: | Code function: | 0_2_00E9FE2C |
Source: | Code function: | 0_2_00E95020 | |
Source: | Code function: | 0_2_00E95014 | |
Source: | Code function: | 0_2_00E9B4B9 | |
Source: | Code function: | 0_2_00E94C64 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00EB519E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00EA30D1 | |
Source: | Code function: | 0_2_00EA3086 | |
Source: | Code function: | 0_2_00EA3178 | |
Source: | Code function: | 0_2_00EA327E | |
Source: | Code function: | 0_2_00E9F21C | |
Source: | Code function: | 0_2_00EA2A13 | |
Source: | Code function: | 0_2_00EA2CFF | |
Source: | Code function: | 0_2_00EA2C64 | |
Source: | Code function: | 0_2_00EA2FB1 | |
Source: | Code function: | 0_2_00EA2F52 | |
Source: | Code function: | 0_2_00E9F717 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00E959A7 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | Directory queried: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 11 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 31 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 141 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | 11 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 21 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 33 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
74% | ReversingLabs | Win32.Trojan.LummaStealer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
pancakedipyps.click | 104.21.23.76 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.23.76 | pancakedipyps.click | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577461 |
Start date and time: | 2024-12-18 13:48:40 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 1s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | random.exe.10.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.245.163.56
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target random.exe.10.exe, PID 7908 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryDirectoryFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: random.exe.10.exe
Time | Type | Description |
---|---|---|
07:49:47 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.23.76 | Get hash | malicious | LummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, Vidar | Browse | ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS | Browse | |||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Phisher | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
pancakedipyps.click | Get hash | malicious | LummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, Vidar | Browse |
| |
Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Poverty Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
|
File type: | |
Entropy (8bit): | 7.859727158445845 |
TrID: |
|
File name: | random.exe.10.exe |
File size: | 776'832 bytes |
MD5: | afd936e441bf5cbdb858e96833cc6ed3 |
SHA1: | 3491edd8c7caf9ae169e21fb58bccd29d95aefef |
SHA256: | c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf |
SHA512: | 928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325 |
SSDEEP: | 12288:smOcxtujRwuweJH9RKC6cmulcfJbBiv0W6NLtXcgAuuweJH9RKC6cmulcfJbBivj:pG+XeJH9Rp6RtfNLtMmXeJH9Rp6RtfN8 |
TLSH: | 75F4120237C085B2D92324B5A8F8DF765B3EF8204B226AE75788073B8FB15D6477664D |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....`g..........".................RY............@.......................................@..................................7..<.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x405952 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67601EA3 [Mon Dec 16 12:35:47 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 2ab4b10182ffafd3eedee95a25f64213 |
Signature Valid: | false |
Signature Issuer: | CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | AD1BCBF19AE2F91BB114D33B85359E56 |
Thumbprint SHA-1: | 141D90A1BA8F61863FBEDDF7DD1D66C1D1E0B128 |
Thumbprint SHA-256: | A08EA2A7A257AD690B988446951E9DEF2986A2F3F546B6F0902805330F3B6B48 |
Serial: | 00D0461B529F67189D43744E9CEFE172AE |
Instruction |
---|
call 00007F25ECB544DAh |
jmp 00007F25ECB54349h |
mov ecx, dword ptr [004257C0h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007F25ECB544D6h |
test esi, ecx |
jne 00007F25ECB544F8h |
call 00007F25ECB54501h |
mov ecx, eax |
cmp ecx, edi |
jne 00007F25ECB544D9h |
mov ecx, BB40E64Fh |
jmp 00007F25ECB544E0h |
test esi, ecx |
jne 00007F25ECB544DCh |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [004257C0h], ecx |
not ecx |
pop edi |
mov dword ptr [00425800h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [004239D8h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [00423990h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [0042398Ch] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [00423A20h] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00426AA8h |
call dword ptr [004239F8h] |
ret |
push 00030000h |
push 00010000h |
push 00000000h |
call 00007F25ECB5948Ah |
add esp, 0Ch |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x23798 | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2a000 | 0xe8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xbac00 | 0x2e80 | .bss |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x2b000 | 0x1940 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x1fe58 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x1cde8 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x23928 | 0x154 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1a89c | 0x1aa00 | 2c90bf01d6a75cfa91195eab195cb511 | False | 0.5897795627934272 | data | 6.625714555730625 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x1c000 | 0x8b24 | 0x8c00 | d082dcd702b8cfd5c38fc05ef266a1f7 | False | 0.3864955357142857 | xBase (0xa) DBF * 0, update-date 170-1-3, with index file .MDX, with memo .FPT | 4.662128172849137 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x25000 | 0x226c | 0x1600 | 982bdad040c9e55617b82cb91da6c951 | False | 0.39417613636363635 | data | 4.554102284484849 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bsS | 0x28000 | 0x53 | 0x200 | f5c8cf64c90793e21e616701e55b6530 | False | 0.17578125 | data | 1.411880155989052 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.tls | 0x29000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x2a000 | 0xe8 | 0x200 | 267fca3a548bff3d326d56604fef4ee6 | False | 0.306640625 | data | 2.344915704357875 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x2b000 | 0x1940 | 0x1a00 | ad27a2fd39c0f74f88141246becd5b06 | False | 0.7587139423076923 | data | 6.513010283131139 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0x2d000 | 0x49c00 | 0x49c00 | aebd7a874ba7ff23b618cc323867e6a3 | False | 1.0003343485169491 | data | 7.9994076425326295 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x77000 | 0x49c00 | 0x49c00 | aebd7a874ba7ff23b618cc323867e6a3 | False | 1.0003343485169491 | data | 7.9994076425326295 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x2a060 | 0x87 | XML 1.0 document, ASCII text | English | United States | 0.8222222222222222 |
DLL | Import |
---|---|
ADVAPI32.dll | CryptContextAddRef |
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T13:49:47.532709+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49712 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:48.399248+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.9 | 49712 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:48.399248+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.9 | 49712 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:49.654760+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49713 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:50.616047+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.9 | 49713 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:50.616047+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.9 | 49713 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:52.808637+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49714 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:55.191760+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49715 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:49:57.766463+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49716 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:00.723890+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49719 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:01.494584+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.9 | 49719 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:03.335163+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49721 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:09.275190+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.9 | 49723 | 104.21.23.76 | 443 | TCP |
2024-12-18T13:50:11.969055+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.9 | 49723 | 104.21.23.76 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 13:49:46.214553118 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:46.214577913 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:46.214641094 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:46.217725992 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:46.217734098 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:47.531558990 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:47.532708883 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:47.534358025 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:47.534363031 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:47.534604073 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:47.580930948 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:47.603797913 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:47.603827000 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:47.603936911 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:48.399286985 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:48.399380922 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:48.399439096 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:48.410841942 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:48.410841942 CET | 49712 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:48.410860062 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:48.410870075 CET | 443 | 49712 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:48.441617012 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:48.441677094 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:48.441765070 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:48.442090988 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:48.442111969 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:49.654694080 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:49.654759884 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:49.656315088 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:49.656325102 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:49.656604052 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:49.658006907 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:49.658035040 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:49.658087015 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.616048098 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.616777897 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.616848946 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:50.616889000 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.618204117 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.618247986 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.618258953 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:50.618268967 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.618956089 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:50.623804092 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.630660057 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.631480932 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:50.631511927 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.690218925 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:50.690253973 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.736021042 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.737104893 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:50.737131119 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.738528967 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:50.807897091 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.812021017 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.812129974 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:50.812216997 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:51.008712053 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:51.008712053 CET | 49713 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:51.008760929 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:51.008775949 CET | 443 | 49713 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:51.498528004 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:51.498573065 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:51.498646975 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:51.499134064 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:51.499146938 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:52.808445930 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:52.808636904 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:52.810141087 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:52.810158968 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:52.810415983 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:52.812040091 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:52.812189102 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:52.812216043 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:53.791563988 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:53.791663885 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:53.791722059 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:53.791802883 CET | 49714 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:53.791822910 CET | 443 | 49714 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:53.976594925 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:53.976650000 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:53.976727009 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:53.976986885 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:53.977003098 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:55.191628933 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:55.191760063 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:55.193073988 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:55.193085909 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:55.193324089 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:55.194474936 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:55.194603920 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:55.194639921 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:55.194709063 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:55.194715977 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:56.127691031 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:56.127780914 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:56.127840042 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:56.128249884 CET | 49715 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:56.128268003 CET | 443 | 49715 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:56.553641081 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:56.553745031 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:56.553854942 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:56.554155111 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:56.554198027 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:57.766297102 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:57.766463041 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:57.767750025 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:57.767766953 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:57.768062115 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:57.769494057 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:57.769646883 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:57.769680977 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:57.769895077 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:57.769908905 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:58.655837059 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:58.655932903 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:58.656097889 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:58.675328016 CET | 49716 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:58.675379992 CET | 443 | 49716 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:59.501483917 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:59.501533031 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:49:59.501617908 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:59.501935005 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:49:59.501944065 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:00.723746061 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:00.723890066 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:00.725153923 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:00.725171089 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:00.725460052 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:00.737047911 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:00.737461090 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:00.737467051 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:01.494590998 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:01.494674921 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:01.494772911 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:01.526451111 CET | 49719 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:01.526465893 CET | 443 | 49719 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:02.116883039 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:02.116910934 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:02.117016077 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:02.117382050 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:02.117399931 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.335074902 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.335163116 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.336707115 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.336713076 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.336996078 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.348099947 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.348859072 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.348896027 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.349704027 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.349740028 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.349849939 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.349886894 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.350032091 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.350045919 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.350194931 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.350208998 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.350358963 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.350383997 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.350394011 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.350538969 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.350568056 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.395342112 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.395560980 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.395598888 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.395606995 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.443336964 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.443536043 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.443582058 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.443605900 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.491333961 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.491540909 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:03.535327911 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:03.591237068 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:07.924148083 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:07.924276114 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:07.924334049 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:07.924829006 CET | 49721 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:07.924851894 CET | 443 | 49721 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:07.956264019 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:07.956327915 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:07.956413031 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:07.956738949 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:07.956759930 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:09.274971008 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:09.275190115 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:09.280826092 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:09.280857086 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:09.281178951 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:09.292860031 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:09.292884111 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:09.292944908 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:11.969053984 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:11.969150066 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:11.969242096 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:11.969518900 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:11.969537973 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Dec 18, 2024 13:50:11.969548941 CET | 49723 | 443 | 192.168.2.9 | 104.21.23.76 |
Dec 18, 2024 13:50:11.969553947 CET | 443 | 49723 | 104.21.23.76 | 192.168.2.9 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 13:49:45.866281033 CET | 57005 | 53 | 192.168.2.9 | 1.1.1.1 |
Dec 18, 2024 13:49:46.208689928 CET | 53 | 57005 | 1.1.1.1 | 192.168.2.9 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 13:49:45.866281033 CET | 192.168.2.9 | 1.1.1.1 | 0x59b | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 13:49:46.208689928 CET | 1.1.1.1 | 192.168.2.9 | 0x59b | No error (0) | 104.21.23.76 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 13:49:46.208689928 CET | 1.1.1.1 | 192.168.2.9 | 0x59b | No error (0) | 172.67.209.202 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.9 | 49712 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:49:47 UTC | 266 | OUT | |
2024-12-18 12:49:47 UTC | 8 | OUT | |
2024-12-18 12:49:48 UTC | 1036 | IN | |
2024-12-18 12:49:48 UTC | 7 | IN | |
2024-12-18 12:49:48 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.9 | 49713 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:49:49 UTC | 267 | OUT | |
2024-12-18 12:49:49 UTC | 46 | OUT | |
2024-12-18 12:49:50 UTC | 1034 | IN | |
2024-12-18 12:49:50 UTC | 335 | IN | |
2024-12-18 12:49:50 UTC | 916 | IN | |
2024-12-18 12:49:50 UTC | 1369 | IN | |
2024-12-18 12:49:50 UTC | 1369 | IN | |
2024-12-18 12:49:50 UTC | 1369 | IN | |
2024-12-18 12:49:50 UTC | 1369 | IN | |
2024-12-18 12:49:50 UTC | 1369 | IN | |
2024-12-18 12:49:50 UTC | 1369 | IN | |
2024-12-18 12:49:50 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.9 | 49714 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:49:52 UTC | 275 | OUT | |
2024-12-18 12:49:52 UTC | 12784 | OUT | |
2024-12-18 12:49:53 UTC | 1044 | IN | |
2024-12-18 12:49:53 UTC | 20 | IN | |
2024-12-18 12:49:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.9 | 49715 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:49:55 UTC | 284 | OUT | |
2024-12-18 12:49:55 UTC | 15056 | OUT | |
2024-12-18 12:49:56 UTC | 1043 | IN | |
2024-12-18 12:49:56 UTC | 20 | IN | |
2024-12-18 12:49:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.9 | 49716 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:49:57 UTC | 278 | OUT | |
2024-12-18 12:49:57 UTC | 15331 | OUT | |
2024-12-18 12:49:57 UTC | 5205 | OUT | |
2024-12-18 12:49:58 UTC | 1050 | IN | |
2024-12-18 12:49:58 UTC | 20 | IN | |
2024-12-18 12:49:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.9 | 49719 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:50:00 UTC | 282 | OUT | |
2024-12-18 12:50:00 UTC | 1207 | OUT | |
2024-12-18 12:50:01 UTC | 1045 | IN | |
2024-12-18 12:50:01 UTC | 20 | IN | |
2024-12-18 12:50:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.9 | 49721 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:50:03 UTC | 280 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:03 UTC | 15331 | OUT | |
2024-12-18 12:50:07 UTC | 1043 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.9 | 49723 | 104.21.23.76 | 443 | 7908 | C:\Users\user\Desktop\random.exe.10.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 12:50:09 UTC | 267 | OUT | |
2024-12-18 12:50:09 UTC | 81 | OUT | |
2024-12-18 12:50:11 UTC | 1037 | IN | |
2024-12-18 12:50:11 UTC | 54 | IN | |
2024-12-18 12:50:11 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 07:49:41 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\random.exe.10.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe90000 |
File size: | 776'832 bytes |
MD5 hash: | AFD936E441BF5CBDB858E96833CC6ED3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 1 |
Start time: | 07:49:41 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70f010000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 07:49:44 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\random.exe.10.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe90000 |
File size: | 776'832 bytes |
MD5 hash: | AFD936E441BF5CBDB858E96833CC6ED3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | true |
Execution Graph
Execution Coverage: | 4.3% |
Dynamic/Decrypted Code Coverage: | 0.6% |
Signature Coverage: | 1.8% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 22 |
Graph
Function 00EB519E Relevance: 42.3, APIs: 10, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E91614 Relevance: 9.2, APIs: 6, Instructions: 171fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9155C Relevance: 4.6, APIs: 3, Instructions: 64memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9FF89 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9136E Relevance: 1.7, APIs: 1, Instructions: 157COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E93C29 Relevance: 1.6, APIs: 1, Instructions: 111COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E93C1B Relevance: 1.5, APIs: 1, Instructions: 41COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9E531 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA3178 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA375A Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E95020 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E959A7 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA2CFF Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E94C8C Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA36A9 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA2FB1 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA30D1 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA327E Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E95014 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9FE2C Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E91000 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E954C5 Relevance: 12.2, APIs: 8, Instructions: 177COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9F469 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9DB88 Relevance: 9.1, APIs: 2, Strings: 3, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E98C55 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9FC3D Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA7E92 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA3537 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E98042 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA484F Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9457B Relevance: 6.0, APIs: 4, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA2117 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9DFAC Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 126COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E9D818 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E929C6 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 60COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E94A8C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 45COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E929D4 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 27COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0372C65F Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0372C65F Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|