Windows
Analysis Report
'Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 'Setup.exe (PID: 6448 cmdline:
"C:\Users\ user\Deskt op\'Setup. exe" MD5: 3FEE44FE264F180EC2287D5C9D2808AC) - cmd.exe (PID: 2536 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Ch airman Cha irman.cmd && Chairma n.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 5796 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5460 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 1260 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5816 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 2640 cmdline:
cmd /c md 346609 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 5600 cmdline:
findstr /V "OBLIGATI ONS" Vitam in MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 2836 cmdline:
cmd /c cop y /b ..\Na sa + ..\Ge neva + ..\ Trained + ..\Scroll + ..\Wr + ..\Ass + . .\Dentists X MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Aviation.com (PID: 736 cmdline:
Aviation.c om X MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 5776 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T18:29:00.478255+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:05.648844+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:12.402250+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:18.242783+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49755 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:23.667786+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49768 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:29.667270+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49784 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:36.299115+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49798 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:41.844772+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49811 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:47.438712+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49822 | 172.67.191.144 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T18:29:04.418541+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:11.035223+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:45.844145+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49811 | 172.67.179.225 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T18:29:04.418541+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 172.67.179.225 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T18:29:11.035223+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.179.225 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T18:29:16.943671+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 172.67.179.225 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T18:29:48.081671+0100 | 2832502 | 1 | A Network Trojan was detected | 172.67.191.144 | 443 | 192.168.2.4 | 49822 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Process Stats: |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 111 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | 11 Input Capture | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | ReversingLabs | Win32.Ransomware.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
hookylucnh.click | 172.67.179.225 | true | true | unknown | |
kliptizq.shop | 172.67.191.144 | true | true | unknown | |
FfMygghOat.FfMygghOat | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.191.144 | kliptizq.shop | United States | 13335 | CLOUDFLARENETUS | true | |
172.67.179.225 | hookylucnh.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577779 |
Start date and time: | 2024-12-18 18:27:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 'Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@22/22@3/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: 'Setup.exe
Time | Type | Description |
---|---|---|
12:28:22 | API Interceptor | |
12:29:03 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.191.144 | Get hash | malicious | IcedID | Browse | ||
172.67.179.225 | Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, Stealc | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, Stealc | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, Stealc | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | Cobalt Strike, Remcos, DBatLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\346609\Aviation.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 465963 |
Entropy (8bit): | 7.999643920991928 |
Encrypted: | true |
SSDEEP: | 12288:TSV981C7p4l1Nhhr+AFDahADRouEuq4j628H1n:WV981C7p4tfrfJtbEd4j6221n |
MD5: | 1A471C3A56742766BB5722AD4741212D |
SHA1: | F358DF4FB64A669EB12710C43A2F53F9A6065DA3 |
SHA-256: | C6EC388F9A29300659D97AFC9407D693AFA2E3F79BF07739986F9BBBAB6A7F56 |
SHA-512: | 95B9A31814F4B88640050EED5E77700173C0753E435602D1B90E7D5D149220D18ED4946EF2FA7D52F83F4050CC38F338D07AE29E7F58BAB7B94E6B5AF1F7EA85 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 7.998002508517942 |
Encrypted: | true |
SSDEEP: | 1536:EBYScWzy4vrsJhmTEQ6OFdBWHjdIUsDNfxdI/SkG:EBYS24j6hLQ6OFfWHjdIV |
MD5: | 0128E5FF6EA00F7B768FE646E4FDC20A |
SHA1: | F1B9AAB8B12CCD4B8EB39C0F11D16D234D6E5177 |
SHA-256: | 71A4D156517D3728276947038E959A98A84E5DBD65D5BF0A8E88DDFA97D4A4B7 |
SHA-512: | 21C7FBD4CDEADC58B6867FF2677F4CD453EED0882A213F17A92F2A1A63FED11E9A228F0ED922EA4378F53D2E6A4565B4E95058770732E37CE9B9302A604C0F6A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114688 |
Entropy (8bit): | 6.6319422477049965 |
Encrypted: | false |
SSDEEP: | 3072:880PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtn:hSCOMVIPPL/sZ7HS3zcn |
MD5: | ECD6553C07630AC968A6A458C67249A1 |
SHA1: | 28E1B8D531AEA2C48CB041DD0163C67019605956 |
SHA-256: | 9EBB50FF00650A82BBD160478FD8CC75A3F02405775598E4C35D2710056400F9 |
SHA-512: | FD4885119C4681B953FCFFCFA58175A64D926B22A52C54BEF87B622F60D18F4CADBF504138BA0D6E2A1D5557B6137E7D43BD1FD4D32F4E0DF49F6AB66633C7CF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9314 |
Entropy (8bit): | 5.187809039872963 |
Encrypted: | false |
SSDEEP: | 192:tE7vxY7rKYP/b6IGhYMLLd8X6U8/g08aHwqcS/rUE9W4qLU3i+DM/O:ti5errPuIoXLdxlYWHpcS/4Uyp/O |
MD5: | 20A29C681BC67342ECBE8B2E946E7608 |
SHA1: | 0A98C94C891DAAA459F310E3B0B80321F176D854 |
SHA-256: | 8C06AE212A6310411FD66584682FBBD159EE4887436AC7E7B61C85D8FF1E6388 |
SHA-512: | 8593D68B9A526932463DAA24EF3D9355528C26221C0CA979CB37533CB377E086C325B2D7A8118F44D0C8A48BE373D2611D9DA5730258EB910873FDFAB511F243 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9314 |
Entropy (8bit): | 5.187809039872963 |
Encrypted: | false |
SSDEEP: | 192:tE7vxY7rKYP/b6IGhYMLLd8X6U8/g08aHwqcS/rUE9W4qLU3i+DM/O:ti5errPuIoXLdxlYWHpcS/4Uyp/O |
MD5: | 20A29C681BC67342ECBE8B2E946E7608 |
SHA1: | 0A98C94C891DAAA459F310E3B0B80321F176D854 |
SHA-256: | 8C06AE212A6310411FD66584682FBBD159EE4887436AC7E7B61C85D8FF1E6388 |
SHA-512: | 8593D68B9A526932463DAA24EF3D9355528C26221C0CA979CB37533CB377E086C325B2D7A8118F44D0C8A48BE373D2611D9DA5730258EB910873FDFAB511F243 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68651 |
Entropy (8bit): | 7.99759500835108 |
Encrypted: | true |
SSDEEP: | 1536:DGSq7cqqCrSCPh+3cmJG9oECvl2jL0gnhstz6FKXZIv:DGSq7gEvh+3cCGOvlelhs59+v |
MD5: | FE296327D8D89EC91199F64BB5D58AF6 |
SHA1: | 952EA260A35142AACD533F02DB1E62FC87C43C5C |
SHA-256: | 29D48807C011433C1650692A0E901EDD268234192DF0F2A13BF321CAE9D3944E |
SHA-512: | 0187E69EA715E033D2221486E8B00D3E318EEC0EB93E15012F059BB860C63CCC260673087D4BA91AA155C7661BEDF4C062E5A0B59D268342C861D80A658D1DAD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 125952 |
Entropy (8bit): | 6.688782411125848 |
Encrypted: | false |
SSDEEP: | 3072:1ccBiqXvpgF4qv+32eOyKODOSpQSAU4CE0ImbJ:1ccB3gBmmLsiS+SAhClbJ |
MD5: | 8C5D04A7BAFC12D1C212D9E942741E23 |
SHA1: | 543AB1366BE07C35CE8EE05416C761169A035C15 |
SHA-256: | 87EF34E5D08ED0BE11FC8B3E64987496068B570726F3FD51FA7A143E4715BAA8 |
SHA-512: | 772DE13984C1340CE85B622C47BF83C2FF233B098D6EFE9FC18D253373D6505354D593DC37862CA28764799BD45FE48E5472BD654762F2B65189771699D7CEF6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68608 |
Entropy (8bit): | 6.322735101731697 |
Encrypted: | false |
SSDEEP: | 1536:7ouK+r5bLmbZzW9FfTubb1/Dde6YF640L6wy4Za9IN3YRYfv2j62SfuVGHj1vtKa:7oO5bLezW9FfTut/Dde6u640ewy4Za9i |
MD5: | 16347FF4ECB8F0D613C3BE6F6D587021 |
SHA1: | AD3A8498A7D472A87EBF11B524F38B0BC801BE8F |
SHA-256: | 08254905357E397E308E02CF49D1582E9BF4040C63C8BBA76E560837F1E205F5 |
SHA-512: | 342D029667E44DF030A4B5E578E2DDFAE2B6306774E699378B4468AC1DEC2B5C59996954BB3944D56748916A3CF992912DE9FD7EF3AD9240FE2CC5EB240DC7C5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 137216 |
Entropy (8bit): | 5.751916210835661 |
Encrypted: | false |
SSDEEP: | 1536:eh6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwusPr:2q8QLeAg0Fuz08XvBNbjaAtsPr |
MD5: | 46AD431D40DE7D37AF094EC09EFF5B36 |
SHA1: | 6EDEBF5E1E7BEF39A5B8DF4A13086C9C83F20875 |
SHA-256: | 7E66122CBD7A0C8CE0333A4647606F89D2ABB2549B5FB96F4FD54B7DAF0C80CF |
SHA-512: | D9E8E139F7BC899A571A104C26B136BE9B36ABA372042454E4CB6514BED10D5B8B6BF5FBFDBAF7B975CD950C92FD9054FD7A4E8C36BA63E1AF694BB237C5E188 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 57344 |
Entropy (8bit): | 7.996735726289522 |
Encrypted: | true |
SSDEEP: | 768:HGCukyLtNX9BHELACNVptMxrnZ/78plg178j6YrQAYp1lY6xB7Hsku61TT0rdLAu:HVsNX/MVpy7Z/oW7vAYp1l5B7cqtOSE |
MD5: | 2BBE2D6BCC007ED7BBF3CB9061C609AB |
SHA1: | 05E5734C98CF59C452FD54168F3A5DA58E3D7C03 |
SHA-256: | 806C839E153CEC798D0F4196FD295A63AA797117D6A9D48F6A38239D13CFB66E |
SHA-512: | 0DE4FFD707EE32269661AE240DD49C169D98D8CD7D6A7DD42005CB963E28415EED07F3A45D08CAC935D19078BEFEBEE552E5608B1B608E1D55C757E9AA670BA5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58368 |
Entropy (8bit): | 6.598566742697715 |
Encrypted: | false |
SSDEEP: | 1536:bHRu+OoQjz7nts/M26N7oKzYkBvRmLORuCYm9PrpmESt:zVOoQ7t8T6pUkBJR8CThpmESt |
MD5: | 1B76F61C3EDDE404C506081E619971A5 |
SHA1: | D7A646AA36E857F5F2191977A5FD7E200E63F301 |
SHA-256: | 5049F622B3BCA5F623DF36EDB9267CEC473F0D7FA15F81D3E86FB93DEF5AD716 |
SHA-512: | 5CCF6B0C756B4ADC9C1C835A22A8CE08DE76ABB1A7802D61F082CDAA412554374DBF4B25C3FF32189D216FBDECC342A3B96C9F5D173CCCD18FB6B19AC6A52A3D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61440 |
Entropy (8bit): | 7.9968157601066725 |
Encrypted: | true |
SSDEEP: | 1536:Ox6zvPoawxIDdhxl49MOrz5u/kzSLGBxb2Gu83JinXEvfqoXl:OxQP6ML29/+kWLYbjuJnXCCa |
MD5: | E4F6F9ECA2C89679A8F31D59E2A9CFF3 |
SHA1: | 4B481C3035E119ED165D6EB8436046F9B0742629 |
SHA-256: | F4E9E21F02744322B5C46E7E4AF2C76D24AA259D47420BC583E1406E32216465 |
SHA-512: | 0A8E453D0FD108419D918B12CF14418924AC3D1CD5235519F7A9CAD47242EA62E68303A239637E939C5B1FEE31A1B7AA3B910B05ED94390326B0B8C86741745E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 6.647457069478153 |
Encrypted: | false |
SSDEEP: | 1536:C1rKoUn9r5C03Eq30BcrTrhCX4aVmoJiKwtk2ukCp:NPnj0nEoXnmowS2u5p |
MD5: | E1FA21820945983ED93784DA0A317515 |
SHA1: | C07D4800CE315D3037807C956614CEAF0B0530DA |
SHA-256: | 47D24CE391DD5388CFBD3A5700C1B7A32C08DD919704E4566311051225066849 |
SHA-512: | 4B2873BE63AC12D549C39ED0272B5EE8B101B3C025C361C2FBA3E2E99CFBB8BDC4F3A9CCE383696BC92ECD48163DCC22B5562805B2E5EECFB718C3CD62F159AC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 6.571834255744705 |
Encrypted: | false |
SSDEEP: | 1536:Nn+pqFqaynB6GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrHL/uDoK:N+AqVnBypIbv18mLthfhnueoMmOqDoK |
MD5: | 611F4191956021C190AD35BE2908EA88 |
SHA1: | 4A860E7EDFD5B3294F75C83DAF7B9D20B883DACD |
SHA-256: | 83D320242CCC855529C2D4F84466038844C31993EAAAD52E45FF0F0176A8E22E |
SHA-512: | 5A621C687CC14DA6770AA72E4EE355BDAC3B5B0012A5E83E6850E2E39116F8C83DA1835876A80F2BF1B475ADF26BA25CDB216609BCC504A541CB16938F4602B6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32563 |
Entropy (8bit): | 7.186617119044311 |
Encrypted: | false |
SSDEEP: | 768:5Q1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:5ODv7xvTphAiPChgZ2kOE6 |
MD5: | 282AB097B01CDAD447DC1DEC1EBAA0FB |
SHA1: | 13D25195210E5B84A84C0515B2959F080D9E25B5 |
SHA-256: | D019D3E60089E913E851943DF5BA1004C9E461110806A433477284EBBAC65E7A |
SHA-512: | 8997D60A6CE20DFD1AF970C76E18BB3D03ABB805AF508E1673A7463DE20C26672E53AAAA6DC8B469FB7B8F330E8C0B071F1C4139F7F8FD75B86714967419BE32 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 126976 |
Entropy (8bit): | 5.4147064246524845 |
Encrypted: | false |
SSDEEP: | 1536:pKaj6iTcPAsAhxjgarB/5el3EYrDWyu0uZo2+9BGmdAT4:V6whxjgarB/5elDWy4ZNoGmP |
MD5: | FBF872324A54E549B6EC9E846A81C6C3 |
SHA1: | 71D47A9CC131438D7F4A1A248FFD7EBF7B3A1315 |
SHA-256: | 116E5ED526DA2C14F4034B89E8C0CDDC28034F526626C9A54F8D04DEF1E46E59 |
SHA-512: | 7937F03BFDA1CDFD285AA1819F2C7D291D587E8D8091CEBA2A307598AB7974212F9E621559792328E49CBB9C03CF3EE82FA1FACE25B6601AFC69E6C71E6B29AF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 7.997471893835348 |
Encrypted: | true |
SSDEEP: | 1536:+xGvArHauVXGmXMvVkudfFsgtyImauT/pXPlCelfpk6zLRcLV9s3:+FrHaEmtZb1MJT/hPRm6JcLV4 |
MD5: | 33C5C01B4A48FE88103F33BC658A9F9A |
SHA1: | DA4B51435B4DB3317855B533F9E2012481CEF3DC |
SHA-256: | 274E162320CAE71CCA0EB478CBD08D0E4121A6F8A8DEC5C07E6D90019AB0F8B5 |
SHA-512: | ADBD75FEBFB79AD33F4A0333113C04CAD977713463C80F8D88DA929D47CB21E1699372A4C997C08E24B232826B22DBA2746133D25E464A354F0E491F94D31261 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 143360 |
Entropy (8bit): | 6.421916419879091 |
Encrypted: | false |
SSDEEP: | 3072:XZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWf05m1:XK5vPeDkjGgQaE/loUDtf0W |
MD5: | 6D8F03D2EAE9E5CE114C15244F277E42 |
SHA1: | D27BCCAEB5138B54FA922AE26B965B39EF4E93C7 |
SHA-256: | 387C1AF3EE44FC3109233A809D6C95D44F325B6A71C598B51CDE9DE26BFC21BE |
SHA-512: | 552DF65FC2F0CA71DA32D3B2B8D05BBF8E977ECD983B32C6A5044BFCF75670A161B4C79FBD725EE2893A7AF0965D335C550F0DE47E752EB33DECF96091A90216 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55296 |
Entropy (8bit): | 7.9967211925060155 |
Encrypted: | true |
SSDEEP: | 1536:Nq79i2+8VCcfNPIAALBAx9phIx8SHbTihziLVXiY:6vWc5BSBAhhPSfE+5XiY |
MD5: | 61F51D39F3485972A6E2CE4B74CAF92D |
SHA1: | 838A3DD1574DCD24F8B3F3E58CCD95131A0D3BAB |
SHA-256: | 40D7E223C19C42D81195B8E92AB50C2F1B4D8E70A0265C22B62896CF059F8A5A |
SHA-512: | 233CC01E9D73449B77C6F775942C98727787C3742620A5FFA71598390FBD1D40CD49A77FB1E77C24F07BA3DF2656809687A1AAE7DE6FB274C17B79EC4B8584DF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1328 |
Entropy (8bit): | 4.08266473083989 |
Encrypted: | false |
SSDEEP: | 24:ZyGS9PvCA433C+sCNC1skNkvQfhSHQU2LD:S9n9mTsCNvEQH5OD |
MD5: | 82EB94FF3B53635E6A01DA871FE37FD0 |
SHA1: | F425DFAFA45E5B3BF622575DE0D875A51079E549 |
SHA-256: | AE20896A8600D260AAFFA093F60A148EB016D145B6D0F1031B1FEA90130E7DCC |
SHA-512: | 374C530D8718B727BC46A5ABF659153EBE39F87C4B6ABAAF5522950E1F8CDEEB9C3182457C717FB92031F8C53E16236100920FF92E57FDB1C2AF105AC12FCDDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\'Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74752 |
Entropy (8bit): | 7.997730670682572 |
Encrypted: | true |
SSDEEP: | 1536:r1b+0UkHSNxM+XL0chrgZsS8n74/mvav+wlHy5aaHFB:Zb+UHSQ+AcgZCMLlH6Hn |
MD5: | E0101A03406A88066B16F819185B76FD |
SHA1: | 738507474FEFD7AC503DB8515C69279498B326C6 |
SHA-256: | 020F4269469A6F5D6A20F8049160DA57668897E245BC923BED6CC6041E3B52C9 |
SHA-512: | F2977B80A55C76C972B13F8965AC04748F41B6474505270E7FDEA46897CF58A741C958CB38970C6D582716B7528E7D6B2B37417DAA7AA1EA501FA7EC4D2B728F |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.326545906029767 |
TrID: |
|
File name: | 'Setup.exe |
File size: | 73'408'236 bytes |
MD5: | 3fee44fe264f180ec2287d5c9d2808ac |
SHA1: | a7c0b097ab7c052cfa37e7e648d23be767693e7f |
SHA256: | b1fcb8a3893f8256bec4847002cf525ba68e8097797c24f412da96884e35f43d |
SHA512: | 47896eda6422e15eb13d92df8f928288a72f78d92b7d1768b642bafc6907600d820b7afc947e495513cab2e9be79d313de95b5083abbdd726250a66ff0307084 |
SSDEEP: | 24576:7epX2WaZB6iH4j6THFmpc4f8wS7UU2IlFYOJ6RV9S1CY1s6:qpSZL4WQVUjLLJo41C6D |
TLSH: | D8F792FEB1011A208C43756AF4A3541A5F6FCC2239A4A23B52F89650ABD71CC87D7E77 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t..."...B...8..... |
Icon Hash: | b873c29eb6f336b0 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | EDBF6A7F5C5815E14E4F7B3733618DB1 |
Thumbprint SHA-1: | 8EA890F9D0A72FAE54FD5C745426C638F478B8AA |
Thumbprint SHA-256: | 2F18EF0DB35F7A93022BE3F0F3A433B640445E233273C8F3BB1130D691EE3A45 |
Serial: | 03EC8EB325C4692D4082A37C344B45CB |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F478CE4C4CBh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F478CE4C1ADh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F478CE4C19Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F478CE49A9Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F478CE4BE71h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F478CE49B23h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F478CE49A9Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0xb15e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x45ffffc | 0x1ef0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0xb15e | 0xb200 | bde1894131b27af94d87d6cf134d986c | False | 0.941625702247191 | data | 7.793466140812105 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10c000 | 0xfd6 | 0x1000 | a5aefa58d6f02f89fd1ea75db0b64e82 | False | 0.593994140625 | data | 5.567736002752411 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1001f0 | 0x7519 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0005337425359442 |
RT_ICON | 0x10770c | 0x23a6 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0012053473591935 |
RT_ICON | 0x109ab4 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.6129326047358834 |
RT_DIALOG | 0x10abdc | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x10acdc | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x10adf8 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x10ae58 | 0x30 | data | English | United States | 0.8958333333333334 |
RT_MANIFEST | 0x10ae88 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T18:29:00.478255+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:04.418541+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49737 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:04.418541+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49737 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:05.648844+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:11.035223+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49738 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:11.035223+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:12.402250+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:16.943671+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49740 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:18.242783+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49755 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:23.667786+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49768 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:29.667270+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49784 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:36.299115+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49798 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:41.844772+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49811 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:45.844145+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49811 | 172.67.179.225 | 443 | TCP |
2024-12-18T18:29:47.438712+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49822 | 172.67.191.144 | 443 | TCP |
2024-12-18T18:29:48.081671+0100 | 2832502 | ETPRO MALWARE PowerShell Decoding Potential Stage 2 | 1 | 172.67.191.144 | 443 | 192.168.2.4 | 49822 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 18:28:59.215660095 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:28:59.215698004 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:28:59.215786934 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:28:59.218838930 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:28:59.218852997 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:00.478154898 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:00.478255033 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:00.536423922 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:00.536448002 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:00.537106991 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:00.585510015 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:00.913212061 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:00.913280010 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:00.913403034 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:04.418540955 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:04.418638945 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:04.418699980 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:04.423569918 CET | 49737 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:04.423592091 CET | 443 | 49737 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:04.430006027 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:04.430047035 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:04.430104017 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:04.430423975 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:04.430438042 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:05.648761988 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:05.648844004 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:05.650053978 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:05.650064945 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:05.650294065 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:05.658997059 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:05.659019947 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:05.659075022 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.035223007 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.035276890 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.035343885 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.035356045 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.035604000 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.035650015 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.035657883 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.043531895 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.043581963 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.043584108 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.043610096 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.043653965 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.051793098 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.062746048 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.062856913 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.062910080 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.062944889 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.063002110 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.071151018 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.075839996 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.075916052 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.076045036 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.076045036 CET | 49738 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.076071978 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.076085091 CET | 443 | 49738 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.170882940 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.170912027 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:11.171081066 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.171441078 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:11.171453953 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:12.402182102 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:12.402250051 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:12.417320967 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:12.417332888 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:12.418107033 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:12.422513008 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:12.458826065 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:12.458842039 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:12.459053993 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:12.459060907 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:16.943692923 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:16.943835020 CET | 443 | 49740 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:16.943979979 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:16.944020033 CET | 49740 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:17.021486998 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:17.021501064 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:17.021612883 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:17.021892071 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:17.021903038 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:18.242618084 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:18.242783070 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:18.244106054 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:18.244117022 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:18.244455099 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:18.245738029 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:18.245861053 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:18.245902061 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:22.364963055 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:22.365050077 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:22.365135908 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:22.365372896 CET | 49755 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:22.365392923 CET | 443 | 49755 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:22.441234112 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:22.441267967 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:22.441385984 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:22.441718102 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:22.441734076 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:23.667658091 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:23.667785883 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:23.669476032 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:23.669491053 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:23.669851065 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:23.671364069 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:23.671525002 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:23.671571016 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:23.671643019 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:23.671654940 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:28.359520912 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:28.359622002 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:28.359814882 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:28.359814882 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:28.445342064 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:28.445403099 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:28.446218967 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:28.446537971 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:28.446557045 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:28.663513899 CET | 49768 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:28.663559914 CET | 443 | 49768 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:29.667196989 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:29.667269945 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:29.678209066 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:29.678235054 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:29.678481102 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:29.690804958 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:29.690876007 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:29.690886021 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:34.817398071 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:34.817507029 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:34.817687035 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:34.817753077 CET | 49784 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:34.817769051 CET | 443 | 49784 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:34.964884043 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:34.964905024 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:34.965408087 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:34.965951920 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:34.965969086 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:36.299021959 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:36.299114943 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:36.300803900 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:36.300815105 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:36.301048994 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:36.302476883 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:36.302547932 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:36.302556038 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:40.606703043 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:40.606812000 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:40.606889963 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:40.609069109 CET | 49798 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:40.609106064 CET | 443 | 49798 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:40.611108065 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:40.611186028 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:40.611251116 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:40.611696005 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:40.611737967 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:41.844671011 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:41.844772100 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:41.846172094 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:41.846196890 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:41.846446037 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:41.847618103 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:41.847639084 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:41.847698927 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:45.844151974 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:45.844258070 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:45.844378948 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:45.844554901 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:45.844585896 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:45.844633102 CET | 49811 | 443 | 192.168.2.4 | 172.67.179.225 |
Dec 18, 2024 18:29:45.844649076 CET | 443 | 49811 | 172.67.179.225 | 192.168.2.4 |
Dec 18, 2024 18:29:46.215193987 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:46.215220928 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:46.215281010 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:46.215604067 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:46.215617895 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:47.438565016 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:47.438711882 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:47.440371037 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:47.440386057 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:47.440618038 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:47.441896915 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:47.483371973 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:48.081410885 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:48.081465006 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:48.081552029 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:48.081648111 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:48.081882000 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:48.081892967 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Dec 18, 2024 18:29:48.081933975 CET | 49822 | 443 | 192.168.2.4 | 172.67.191.144 |
Dec 18, 2024 18:29:48.081939936 CET | 443 | 49822 | 172.67.191.144 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 18:28:28.047287941 CET | 57736 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 18, 2024 18:28:28.280244112 CET | 53 | 57736 | 1.1.1.1 | 192.168.2.4 |
Dec 18, 2024 18:28:58.854770899 CET | 61478 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 18, 2024 18:28:59.210037947 CET | 53 | 61478 | 1.1.1.1 | 192.168.2.4 |
Dec 18, 2024 18:29:45.846025944 CET | 50284 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 18, 2024 18:29:46.214302063 CET | 53 | 50284 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 18:28:28.047287941 CET | 192.168.2.4 | 1.1.1.1 | 0xdc10 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 18:28:58.854770899 CET | 192.168.2.4 | 1.1.1.1 | 0x22db | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 18:29:45.846025944 CET | 192.168.2.4 | 1.1.1.1 | 0xf166 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 18:28:28.280244112 CET | 1.1.1.1 | 192.168.2.4 | 0xdc10 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 18:28:59.210037947 CET | 1.1.1.1 | 192.168.2.4 | 0x22db | No error (0) | 172.67.179.225 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 18:28:59.210037947 CET | 1.1.1.1 | 192.168.2.4 | 0x22db | No error (0) | 104.21.35.211 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 18:29:46.214302063 CET | 1.1.1.1 | 192.168.2.4 | 0xf166 | No error (0) | 172.67.191.144 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 18:29:46.214302063 CET | 1.1.1.1 | 192.168.2.4 | 0xf166 | No error (0) | 104.21.84.113 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49737 | 172.67.179.225 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:00 UTC | 263 | OUT | |
2024-12-18 17:29:00 UTC | 8 | OUT | |
2024-12-18 17:29:04 UTC | 1029 | IN | |
2024-12-18 17:29:04 UTC | 7 | IN | |
2024-12-18 17:29:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 172.67.179.225 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:05 UTC | 264 | OUT | |
2024-12-18 17:29:05 UTC | 79 | OUT | |
2024-12-18 17:29:11 UTC | 1035 | IN | |
2024-12-18 17:29:11 UTC | 334 | IN | |
2024-12-18 17:29:11 UTC | 1369 | IN | |
2024-12-18 17:29:11 UTC | 1369 | IN | |
2024-12-18 17:29:11 UTC | 1369 | IN | |
2024-12-18 17:29:11 UTC | 1369 | IN | |
2024-12-18 17:29:11 UTC | 1369 | IN | |
2024-12-18 17:29:11 UTC | 333 | IN | |
2024-12-18 17:29:11 UTC | 1369 | IN | |
2024-12-18 17:29:11 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 172.67.179.225 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:12 UTC | 282 | OUT | |
2024-12-18 17:29:12 UTC | 15331 | OUT | |
2024-12-18 17:29:12 UTC | 2832 | OUT | |
2024-12-18 17:29:16 UTC | 1037 | IN | |
2024-12-18 17:29:16 UTC | 20 | IN | |
2024-12-18 17:29:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49755 | 172.67.179.225 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:18 UTC | 277 | OUT | |
2024-12-18 17:29:18 UTC | 8760 | OUT | |
2024-12-18 17:29:22 UTC | 1041 | IN | |
2024-12-18 17:29:22 UTC | 20 | IN | |
2024-12-18 17:29:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49768 | 172.67.179.225 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:23 UTC | 272 | OUT | |
2024-12-18 17:29:23 UTC | 15331 | OUT | |
2024-12-18 17:29:23 UTC | 5046 | OUT | |
2024-12-18 17:29:28 UTC | 1031 | IN | |
2024-12-18 17:29:28 UTC | 20 | IN | |
2024-12-18 17:29:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49784 | 172.67.179.225 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:29 UTC | 278 | OUT | |
2024-12-18 17:29:29 UTC | 1230 | OUT | |
2024-12-18 17:29:34 UTC | 1038 | IN | |
2024-12-18 17:29:34 UTC | 20 | IN | |
2024-12-18 17:29:34 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49798 | 172.67.179.225 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:36 UTC | 276 | OUT | |
2024-12-18 17:29:36 UTC | 1102 | OUT | |
2024-12-18 17:29:40 UTC | 1039 | IN | |
2024-12-18 17:29:40 UTC | 20 | IN | |
2024-12-18 17:29:40 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49811 | 172.67.179.225 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:41 UTC | 265 | OUT | |
2024-12-18 17:29:41 UTC | 114 | OUT | |
2024-12-18 17:29:45 UTC | 1044 | IN | |
2024-12-18 17:29:45 UTC | 138 | IN | |
2024-12-18 17:29:45 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49822 | 172.67.191.144 | 443 | 736 | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 17:29:47 UTC | 207 | OUT | |
2024-12-18 17:29:48 UTC | 894 | IN | |
2024-12-18 17:29:48 UTC | 475 | IN | |
2024-12-18 17:29:48 UTC | 1369 | IN | |
2024-12-18 17:29:48 UTC | 176 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 12:28:21 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\'Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 73'408'236 bytes |
MD5 hash: | 3FEE44FE264F180EC2287D5C9D2808AC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 12:28:22 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 12:28:23 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 12:28:24 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x520000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 12:28:24 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x420000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 12:28:25 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x520000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 12:28:25 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x420000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 12:28:25 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 12:28:25 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 12:28:25 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 12:28:25 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\346609\Aviation.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb50000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 11 |
Start time: | 12:28:26 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe60000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 26 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403885 Relevance: 1.3, APIs: 1, Instructions: 11COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|