Windows
Analysis Report
k6A01XaeEn.exe
Overview
General Information
Sample name: | k6A01XaeEn.exerenamed because original name is a hash value |
Original sample name: | fd5fe344fef63284ed51951698535fca.exe |
Analysis ID: | 1577869 |
MD5: | fd5fe344fef63284ed51951698535fca |
SHA1: | edd4a2cda68245606465c920ad824d8eed5d0c56 |
SHA256: | 9465a7b43d43fbd350d67bb6d7720306525fc409d9189e7ac5a2ada996b08bf5 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- k6A01XaeEn.exe (PID: 7736 cmdline:
"C:\Users\ user\Deskt op\k6A01Xa eEn.exe" MD5: FD5FE344FEF63284ED51951698535FCA) - WerFault.exe (PID: 7188 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 736 -s 167 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["grannyejh.lat", "crosshuaht.lat", "energyaffai.lat", "rapeflowwj.lat", "necklacebudi.lat", "sustainskelet.lat", "discokeyus.lat", "aspecteirs.lat"], "Build id": "4h5VfH--"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Windows_Trojan_Smokeloader_3687686f | unknown | unknown |
| |
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 3 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:16.261976+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:18.239271+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:20.632864+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:24.060830+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:27.078444+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:32.981624+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:39.281396+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:46.297827+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 104.21.21.99 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:16.970035+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:19.027809+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:16.970035+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:19.027809+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:16.261976+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:18.239271+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:20.632864+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49732 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:24.060830+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49733 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:27.078444+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49734 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:32.981624+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49737 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:39.281396+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:46.297827+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49743 | 104.21.21.99 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:14.474132+0100 | 2058360 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 64461 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:22.529357+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.21.21.99 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Directory queried: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Code function: | 0_3_00B4AEDA | |
Source: | Code function: | 0_3_00B4AEDA | |
Source: | Code function: | 0_3_00B492A2 | |
Source: | Code function: | 0_3_00B4C451 | |
Source: | Code function: | 0_3_00B4C451 | |
Source: | Code function: | 0_3_00B4C4C9 | |
Source: | Code function: | 0_3_00B4C4C9 | |
Source: | Code function: | 0_3_00B4DB20 | |
Source: | Code function: | 0_3_00B4DB20 | |
Source: | Code function: | 0_3_00B4DB20 | |
Source: | Code function: | 0_3_00B4AAD2 | |
Source: | Code function: | 0_3_00B4AAD2 | |
Source: | Code function: | 0_3_00B48AC2 | |
Source: | Code function: | 0_3_00B4C331 | |
Source: | Code function: | 0_3_00B4C331 | |
Source: | Code function: | 0_3_00B52F22 | |
Source: | Code function: | 0_3_00B52F22 | |
Source: | Code function: | 0_3_00B52F22 | |
Source: | Code function: | 0_3_00B52F22 | |
Source: | Code function: | 0_3_00B52F22 | |
Source: | Code function: | 0_3_00B52F22 | |
Source: | Code function: | 0_3_00B4AEDA | |
Source: | Code function: | 0_3_00B4AEDA | |
Source: | Code function: | 0_3_00B4C379 | |
Source: | Code function: | 0_3_00B4C379 | |
Source: | Code function: | 0_3_00B52966 | |
Source: | Code function: | 0_3_00B52966 | |
Source: | Code function: | 0_3_00B52966 | |
Source: | Code function: | 0_3_00B52966 | |
Source: | Code function: | 0_3_00B52966 | |
Source: | Code function: | 0_3_00B52966 |
Source: | Static PE information: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | Directory queried: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 11 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 31 Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 22 Software Packing | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
74% | ReversingLabs | Win32.Trojan.StealC | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
discokeyus.lat | 104.21.21.99 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.21.99 | discokeyus.lat | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577869 |
Start date and time: | 2024-12-18 20:53:12 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 31s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | k6A01XaeEn.exerenamed because original name is a hash value |
Original Sample Name: | fd5fe344fef63284ed51951698535fca.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@2/5@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 172.202.163.200, 20.190.147.11, 13.107.246.63
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target k6A01XaeEn.exe, PID 7736 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryDirectoryFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: k6A01XaeEn.exe
Time | Type | Description |
---|---|---|
14:54:16 | API Interceptor | |
14:55:10 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.21.99 | Get hash | malicious | HTMLPhisher | Browse | ||
Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse | |||
Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
discokeyus.lat | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader, RHADAMANTHYS | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRAT | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, Stealc | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_k6A01XaeEn.exe_1a38eed210313069526e11c1b112e2bcb68f5c_a1f3c556_4d7b85ca-6846-40b1-b65b-adb0d5d5bdf6\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0259059851514825 |
Encrypted: | false |
SSDEEP: | 96:2yz457shQsXhrV72fLQXIDcQMc67cE2cw3o+HbHg/8BRTf3Oy1E45WAU6NCUtW2L:9zhhQS0C/cFju3mezuiFRZ24IO8H |
MD5: | 80C0C0E66EA3516DD1F188475CC22799 |
SHA1: | BAB79CE05D042165B597E24C521650BDFC804ACB |
SHA-256: | 09F227EA430D9A896152D5E521D1475B798D286ABCC145C60F74963B9500990C |
SHA-512: | C75D37694C64A6CF9B523D8D39E22796A6715238E41060CB03740CBC53915F5B894FC56EB4F09B3800023B960D45334A30AF8B8D512ECA4FEC7D40A6CE0A5FFB |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 48458 |
Entropy (8bit): | 2.577745698358565 |
Encrypted: | false |
SSDEEP: | 384:DlRKqvo7/QCTBqFL2d8f0r8wCbyvA2ukh:xDSRTB6IFC23ukh |
MD5: | E5FB3628BC566F6E3586AA2A3374B1E4 |
SHA1: | 3AA51D014A99ED48DC5D6E219CF695888693100D |
SHA-256: | B328E96DC3CEAEEC15834E6533E1566D939DEB5913357EB257327FF9CAA67B15 |
SHA-512: | A2C8BC3AD6367DFDBF5E525993C6E36CA0623C3734B72ED10204CD0CF272EF2D851AF96356BA4E0517DD95FB4E5036286A4CD22DB0871C5CC513397DE71DB398 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8324 |
Entropy (8bit): | 3.6995929267912406 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ2/6046Y9SSUuxwbgmf+SUpDG89b/6sf3GVm:R6lXJ26j6YISU8wbgmf+S2/Zf31 |
MD5: | 24804AEA409F8B1B100904D14C95BFD2 |
SHA1: | FB22B0F0F0965E8BF63E7DC1EE7760D4D570512B |
SHA-256: | 2B90C0CB9A59B62CB541C2C693E80EC064606560D80F884C19BA9EE1E3E3AB5D |
SHA-512: | 7F189CD397F0B319C87115A5FB317970EDFAD438F005AEA2A758947281D1B5384E14D18D4AC40F77B1E79C010B4748E47D581E98FB425FA1D49D0D979C6EA25A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4579 |
Entropy (8bit): | 4.457832194712016 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsXJg77aI9cnWpW8VYOYm8M4JxKOMFVZi+q8M5pACk3PcPzYPpd:uIjf5I7CW7VWJyiM3CzOpd |
MD5: | 3F376C375CE0A6AFC84AC0FE2D5A6D65 |
SHA1: | 664483EA0AE549D2E934807CDDADFB0557375067 |
SHA-256: | 2746ED7AC31908B763671DC76BE6F607626B623792AAE590876A772552469CA9 |
SHA-512: | 4FB83111733D31F76C072EA94B5A0826BB5C3AE5595E3153F39E5F6178163B25A67EFF8662F014AAFBE2ED92DF443263688CAB6533705F4E732A57F7EBDDE346 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4654132144536565 |
Encrypted: | false |
SSDEEP: | 6144:zIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNedwBCswSbC:kXD94+WlLZMM6YFHs+C |
MD5: | 5BBAF019D802E854AB533741752766F3 |
SHA1: | 468949FB1347C17E06A674E1D151346FF7067E1A |
SHA-256: | E5A5E6525F772098C95C63CC619D7F94573901AB5A2C825AF44CE0F0EC241A9B |
SHA-512: | 0453E0705F73DDBE4EDC4B00516E6AE9C5DBBFC4F2B5919E5D5784E817F2277485E471B806D1D314C4C0C7FA05A39045B0B54B8E733FC2DC3625D0B18D28F10F |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.679527391728973 |
TrID: |
|
File name: | k6A01XaeEn.exe |
File size: | 368'640 bytes |
MD5: | fd5fe344fef63284ed51951698535fca |
SHA1: | edd4a2cda68245606465c920ad824d8eed5d0c56 |
SHA256: | 9465a7b43d43fbd350d67bb6d7720306525fc409d9189e7ac5a2ada996b08bf5 |
SHA512: | dec6bb11e1018ee3ee545f5c477053a5d94fdad7709881e8dfce2a94905218621f4df787104ac8ba180e7077d8daf9ebb07da020dd174648d7d00136a81da212 |
SSDEEP: | 6144:O9xVifwhcOwQuXuSE9uncSOkgZaKffgACke4dBseTwdW:O9xVpumccSrKgnewI |
TLSH: | B874CF1176F1A621E7FFC6307934FAA0597FB8A26E35818F2A78265F0D703918D6170B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B.A;#..;#..;#...lK.:#..%qY.%#..%qH./#..%q^.U#......>#..;#..O#..%qW.:#..%qI.:#..%qL.:#..Rich;#..........PE..L...._.d........... |
Icon Hash: | 151a111012951009 |
Entrypoint: | 0x401877 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x64995FF1 [Mon Jun 26 09:52:49 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | 607342d0c32277611749326750554d8e |
Instruction |
---|
call 00007FD91CE6888Bh |
jmp 00007FD91CE64F0Dh |
mov edi, edi |
push ebp |
mov ebp, esp |
sub esp, 00000328h |
mov dword ptr [00446C38h], eax |
mov dword ptr [00446C34h], ecx |
mov dword ptr [00446C30h], edx |
mov dword ptr [00446C2Ch], ebx |
mov dword ptr [00446C28h], esi |
mov dword ptr [00446C24h], edi |
mov word ptr [00446C50h], ss |
mov word ptr [00446C44h], cs |
mov word ptr [00446C20h], ds |
mov word ptr [00446C1Ch], es |
mov word ptr [00446C18h], fs |
mov word ptr [00446C14h], gs |
pushfd |
pop dword ptr [00446C48h] |
mov eax, dword ptr [ebp+00h] |
mov dword ptr [00446C3Ch], eax |
mov eax, dword ptr [ebp+04h] |
mov dword ptr [00446C40h], eax |
lea eax, dword ptr [ebp+08h] |
mov dword ptr [00446C4Ch], eax |
mov eax, dword ptr [ebp-00000320h] |
mov dword ptr [00446B88h], 00010001h |
mov eax, dword ptr [00446C40h] |
mov dword ptr [00446B3Ch], eax |
mov dword ptr [00446B30h], C0000409h |
mov dword ptr [00446B34h], 00000001h |
mov eax, dword ptr [00444004h] |
mov dword ptr [ebp-00000328h], eax |
mov eax, dword ptr [00444008h] |
mov dword ptr [ebp-00000324h], eax |
call dword ptr [000000C0h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4290c | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x421000 | 0x112e8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x41000 | 0x194 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x3f35c | 0x3f400 | 9976381cf58d0f66c1346f9c84e59d35 | False | 0.8037765563241107 | data | 7.371498425770648 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x41000 | 0x2218 | 0x2400 | 4fb72ba1cc81a7852a7aa3706c847f3b | False | 0.3490668402777778 | data | 5.373695785620911 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x44000 | 0x3dc4bc | 0x7000 | f4844b84bde1ca15ae8869ac69c9ac02 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x421000 | 0x112e8 | 0x11400 | 7cb2356f2efa7527c98aa7827d0c9d5a | False | 0.4493744338768116 | data | 4.76016678197608 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x4215e0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | Turkmen | Turkmenistan | 0.5101279317697228 |
RT_ICON | 0x422488 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | Turkmen | Turkmenistan | 0.5658844765342961 |
RT_ICON | 0x422d30 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | Turkmen | Turkmenistan | 0.6002304147465438 |
RT_ICON | 0x4233f8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | Turkmen | Turkmenistan | 0.6394508670520231 |
RT_ICON | 0x423960 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Turkmen | Turkmenistan | 0.4099585062240664 |
RT_ICON | 0x425f08 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Turkmen | Turkmenistan | 0.4793621013133208 |
RT_ICON | 0x426fb0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Turkmen | Turkmenistan | 0.47704918032786886 |
RT_ICON | 0x427938 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Turkmen | Turkmenistan | 0.5806737588652482 |
RT_ICON | 0x427e18 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | Turkmen | Turkmenistan | 0.3411513859275053 |
RT_ICON | 0x428cc0 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | Turkmen | Turkmenistan | 0.4711191335740072 |
RT_ICON | 0x429568 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | Turkmen | Turkmenistan | 0.5040322580645161 |
RT_ICON | 0x429c30 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Turkmen | Turkmenistan | 0.5158959537572254 |
RT_ICON | 0x42a198 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Turkmen | Turkmenistan | 0.42738589211618255 |
RT_ICON | 0x42c740 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | Turkmen | Turkmenistan | 0.43386491557223267 |
RT_ICON | 0x42d7e8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | Turkmen | Turkmenistan | 0.4344262295081967 |
RT_ICON | 0x42e170 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Turkmen | Turkmenistan | 0.4521276595744681 |
RT_STRING | 0x42e808 | 0x386 | data | 0.4567627494456763 | ||
RT_STRING | 0x42eb90 | 0xb2 | data | 0.601123595505618 | ||
RT_STRING | 0x42ec48 | 0x6d0 | data | 0.4288990825688073 | ||
RT_STRING | 0x42f318 | 0x71e | data | 0.4313940724478595 | ||
RT_STRING | 0x42fa38 | 0x6e2 | data | 0.43473325766174803 | ||
RT_STRING | 0x430120 | 0x65c | data | 0.43611793611793614 | ||
RT_STRING | 0x430780 | 0x71a | data | 0.4251925192519252 | ||
RT_STRING | 0x430ea0 | 0x7c8 | data | 0.41967871485943775 | ||
RT_STRING | 0x431668 | 0x756 | data | 0.4222577209797657 | ||
RT_STRING | 0x431dc0 | 0x528 | data | 0.45227272727272727 | ||
RT_GROUP_ICON | 0x42e5d8 | 0x76 | data | Turkmen | Turkmenistan | 0.6694915254237288 |
RT_GROUP_ICON | 0x427da0 | 0x76 | data | Turkmen | Turkmenistan | 0.6610169491525424 |
RT_VERSION | 0x42e650 | 0x1b4 | data | 0.5688073394495413 |
DLL | Import |
---|---|
KERNEL32.dll | SearchPathW, SetLocaleInfoA, SetErrorMode, InterlockedIncrement, InterlockedDecrement, SetDefaultCommConfigW, ReadConsoleOutputAttribute, GetEnvironmentStringsW, GetTimeFormatA, SetEvent, GetModuleHandleW, GetDateFormatA, GetCommandLineA, SetProcessPriorityBoost, LoadLibraryW, DeleteVolumeMountPointW, GetConsoleAliasW, GetFileAttributesW, GetStartupInfoA, SetLastError, GetProcAddress, BuildCommDCBW, GetNumaHighestNodeNumber, GetAtomNameA, LoadLibraryA, Process32Next, LocalAlloc, GetFileType, AddAtomW, AddAtomA, FoldStringA, CreatePipe, GetModuleHandleA, OpenFileMappingW, GetShortPathNameW, FindFirstVolumeA, EndUpdateResourceA, GetVersionExA, UnregisterWaitEx, SetFileAttributesW, GetLastError, HeapFree, HeapAlloc, MultiByteToWideChar, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, ReadFile, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA |
USER32.dll | GetProcessDefaultLayout |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Turkmen | Turkmenistan |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T20:54:14.474132+0100 | 2058360 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) | 1 | 192.168.2.4 | 64461 | 1.1.1.1 | 53 | UDP |
2024-12-18T20:54:16.261976+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:16.261976+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:16.970035+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:16.970035+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:18.239271+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:18.239271+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:19.027809+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:19.027809+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:20.632864+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49732 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:20.632864+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:22.529357+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49732 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:24.060830+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49733 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:24.060830+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:27.078444+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49734 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:27.078444+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:32.981624+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49737 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:32.981624+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:39.281396+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49742 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:39.281396+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:46.297827+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.4 | 49743 | 104.21.21.99 | 443 | TCP |
2024-12-18T20:54:46.297827+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 104.21.21.99 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 20:54:14.998786926 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:14.998836040 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:14.998963118 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:15.026006937 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:15.026032925 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.261853933 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.261976004 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.265597105 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.265608072 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.266164064 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.313307047 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.361743927 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.361774921 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.361880064 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.970108986 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.970349073 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.970453024 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.988377094 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.988404036 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:16.988420963 CET | 49730 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:16.988429070 CET | 443 | 49730 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:17.012738943 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:17.012775898 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:17.012866974 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:17.013231039 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:17.013247967 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:18.239087105 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:18.239270926 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:18.241645098 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:18.241657972 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:18.241996050 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:18.243715048 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:18.243756056 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:18.243810892 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.027708054 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.027759075 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.027867079 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.027884960 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.044748068 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.044881105 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.044894934 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.078310966 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.078349113 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.078469992 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.078489065 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.078602076 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.092026949 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.106513977 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.106616020 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.106638908 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.154079914 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.154273033 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.154299974 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.203939915 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.216558933 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.226874113 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.227004051 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.227065086 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.227066040 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.229104996 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.229104996 CET | 49731 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.229136944 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.229147911 CET | 443 | 49731 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.397494078 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.397615910 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:19.397738934 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.398073912 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:19.398114920 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:20.632775068 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:20.632863998 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:20.636523008 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:20.636553049 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:20.636889935 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:20.638246059 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:20.638433933 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:20.638478994 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:20.638552904 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:20.638567924 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:22.529388905 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:22.529534101 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:22.529633999 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:22.529802084 CET | 49732 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:22.529824972 CET | 443 | 49732 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:22.721307993 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:22.721359968 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:22.721446991 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:22.721805096 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:22.721822977 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:24.060672998 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:24.060830116 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:24.066598892 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:24.066615105 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:24.067615986 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:24.068958998 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:24.069125891 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:24.069165945 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:25.271780968 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:25.271991968 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:25.272109032 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:25.272212029 CET | 49733 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:25.272229910 CET | 443 | 49733 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:25.835374117 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:25.835426092 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:25.835515976 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:25.849277020 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:25.849307060 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:27.078337908 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:27.078444004 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:27.080307007 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:27.080317974 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:27.080751896 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:27.082448006 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:27.082633972 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:27.082659960 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:27.082753897 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:27.082763910 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:30.952018023 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:30.952296019 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:30.952384949 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:30.955409050 CET | 49734 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:30.955452919 CET | 443 | 49734 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:31.654572010 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:31.654627085 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:31.654721975 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:31.655102015 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:31.655118942 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:32.981477976 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:32.981623888 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:32.985044003 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:32.985058069 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:32.985403061 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:32.986757040 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:32.986895084 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:32.986901999 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:37.518337965 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:37.518440962 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:37.518501997 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:37.518620014 CET | 49737 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:37.518646002 CET | 443 | 49737 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:38.047904015 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:38.047950029 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:38.048048019 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:38.048433065 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:38.048449039 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.281224966 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.281395912 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.285387993 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.285409927 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.285851955 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.295090914 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.295926094 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.295970917 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.296135902 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.296169043 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.296400070 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.296432972 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.296617985 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.296647072 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.296818018 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.296854019 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.297012091 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.297043085 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.297056913 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.297070980 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.297234058 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.297254086 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.297275066 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.297436953 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.297463894 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.343353033 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.346319914 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.346359015 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.346389055 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.346412897 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.346435070 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.346443892 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:39.346518993 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:39.346533060 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:45.548615932 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:45.548721075 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:45.548777103 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:45.548954964 CET | 49742 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:45.548979998 CET | 443 | 49742 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:45.558614016 CET | 49743 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:45.558697939 CET | 443 | 49743 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:45.558871984 CET | 49743 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:45.559325933 CET | 49743 | 443 | 192.168.2.4 | 104.21.21.99 |
Dec 18, 2024 20:54:45.559360027 CET | 443 | 49743 | 104.21.21.99 | 192.168.2.4 |
Dec 18, 2024 20:54:46.297827005 CET | 49743 | 443 | 192.168.2.4 | 104.21.21.99 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 20:54:14.474132061 CET | 64461 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 18, 2024 20:54:14.993315935 CET | 53 | 64461 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 20:54:14.474132061 CET | 192.168.2.4 | 1.1.1.1 | 0x2f1b | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 20:54:14.993315935 CET | 1.1.1.1 | 192.168.2.4 | 0x2f1b | No error (0) | 104.21.21.99 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 20:54:14.993315935 CET | 1.1.1.1 | 192.168.2.4 | 0x2f1b | No error (0) | 172.67.197.170 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.21.99 | 443 | 7736 | C:\Users\user\Desktop\k6A01XaeEn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 19:54:16 UTC | 261 | OUT | |
2024-12-18 19:54:16 UTC | 8 | OUT | |
2024-12-18 19:54:16 UTC | 1036 | IN | |
2024-12-18 19:54:16 UTC | 7 | IN | |
2024-12-18 19:54:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 104.21.21.99 | 443 | 7736 | C:\Users\user\Desktop\k6A01XaeEn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 19:54:18 UTC | 262 | OUT | |
2024-12-18 19:54:18 UTC | 42 | OUT | |
2024-12-18 19:54:19 UTC | 1042 | IN | |
2024-12-18 19:54:19 UTC | 327 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN | |
2024-12-18 19:54:19 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 104.21.21.99 | 443 | 7736 | C:\Users\user\Desktop\k6A01XaeEn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 19:54:20 UTC | 273 | OUT | |
2024-12-18 19:54:20 UTC | 15331 | OUT | |
2024-12-18 19:54:20 UTC | 2785 | OUT | |
2024-12-18 19:54:22 UTC | 1042 | IN | |
2024-12-18 19:54:22 UTC | 20 | IN | |
2024-12-18 19:54:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 104.21.21.99 | 443 | 7736 | C:\Users\user\Desktop\k6A01XaeEn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 19:54:24 UTC | 275 | OUT | |
2024-12-18 19:54:24 UTC | 8755 | OUT | |
2024-12-18 19:54:25 UTC | 1035 | IN | |
2024-12-18 19:54:25 UTC | 20 | IN | |
2024-12-18 19:54:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49734 | 104.21.21.99 | 443 | 7736 | C:\Users\user\Desktop\k6A01XaeEn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 19:54:27 UTC | 281 | OUT | |
2024-12-18 19:54:27 UTC | 15331 | OUT | |
2024-12-18 19:54:27 UTC | 5107 | OUT | |
2024-12-18 19:54:30 UTC | 1043 | IN | |
2024-12-18 19:54:30 UTC | 20 | IN | |
2024-12-18 19:54:30 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49737 | 104.21.21.99 | 443 | 7736 | C:\Users\user\Desktop\k6A01XaeEn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 19:54:32 UTC | 276 | OUT | |
2024-12-18 19:54:32 UTC | 1231 | OUT | |
2024-12-18 19:54:37 UTC | 1044 | IN | |
2024-12-18 19:54:37 UTC | 20 | IN | |
2024-12-18 19:54:37 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49742 | 104.21.21.99 | 443 | 7736 | C:\Users\user\Desktop\k6A01XaeEn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 19:54:39 UTC | 281 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:39 UTC | 15331 | OUT | |
2024-12-18 19:54:45 UTC | 1042 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:54:11 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\k6A01XaeEn.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 368'640 bytes |
MD5 hash: | FD5FE344FEF63284ED51951698535FCA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 14:54:46 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe60000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |