Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
e5mIhMkcj5.exe

Overview

General Information

Sample name:e5mIhMkcj5.exe
renamed because original name is a hash value
Original sample name:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c.exe
Analysis ID:1578841
MD5:d11828146ff9e2e340c555f9531cac47
SHA1:ca027ca9bea1e48a0ac4d01370d3f4bc9d5e5088
SHA256:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c
Tags:bankerexeLATAMPAGAMENTOS-DIGITAIS-LTDAtrojanuser-johnk3r
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Entry point lies outside standard sections
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • e5mIhMkcj5.exe (PID: 6596 cmdline: "C:\Users\user\Desktop\e5mIhMkcj5.exe" MD5: D11828146FF9E2E340C555F9531CAC47)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: e5mIhMkcj5.exeVirustotal: Detection: 19%Perma Link
Source: e5mIhMkcj5.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: e5mIhMkcj5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: e5mIhMkcj5.exeStatic PE information: certificate valid
Source: e5mIhMkcj5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownHTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001785000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/avs_pro/index.php
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/avs_pro/index.php%
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001785000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/avs_pro/index.php(o
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/avs_pro/index.phprontdesHQ#
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/c
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/v
Source: e5mIhMkcj5.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: e5mIhMkcj5.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: e5mIhMkcj5.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0(
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: e5mIhMkcj5.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: e5mIhMkcj5.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: e5mIhMkcj5.exeString found in binary or memory: https://www.globalsign.com/repository/0

System Summary

barindex
Source: e5mIhMkcj5.exeStatic PE information: section name: .!Zx
Source: e5mIhMkcj5.exeStatic PE information: section name: .]#m
Source: e5mIhMkcj5.exeStatic PE information: section name: .2"V
Source: e5mIhMkcj5.exe, 00000001.00000000.1324737978.0000000001144000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe
Source: e5mIhMkcj5.exeBinary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe
Source: e5mIhMkcj5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.evad.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeFile created: C:\Users\user\AppData\Roaming\A449BEDBJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMutant created: \Sessions\1\BaseNamedObjects\A449BEDB2024
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: e5mIhMkcj5.exeVirustotal: Detection: 19%
Source: e5mIhMkcj5.exeReversingLabs: Detection: 23%
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: python313.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winhttpcom.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeWindow found: window name: TEditJump to behavior
Source: e5mIhMkcj5.exeStatic PE information: certificate valid
Source: e5mIhMkcj5.exeStatic file information: File size 8816544 > 1048576
Source: e5mIhMkcj5.exeStatic PE information: Raw size of .2"V is bigger than: 0x100000 < 0x851e00
Source: e5mIhMkcj5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .2"V
Source: e5mIhMkcj5.exeStatic PE information: section name: .!Zx
Source: e5mIhMkcj5.exeStatic PE information: section name: .]#m
Source: e5mIhMkcj5.exeStatic PE information: section name: .2"V

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1730005 value: E9 8B 2F 03 76 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762F90 value: E9 7A D0 FC 89 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1B70005 value: E9 5B 2E BF 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762E60 value: E9 AA D1 40 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1B90005 value: E9 EB 3E BD 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77763EF0 value: E9 1A C1 42 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1BA0005 value: E9 DB 2F BC 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762FE0 value: E9 2A D0 43 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1BB0005 value: E9 BB 2D BB 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762DC0 value: E9 4A D2 44 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1BD0005 value: E9 CB 2A B9 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762AD0 value: E9 3A D5 46 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1BE0005 value: E9 7B 2B B8 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762B80 value: E9 8A D4 47 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1BF0005 value: E9 1B 2F B7 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762F20 value: E9 EA D0 48 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C00005 value: E9 FB 2C B6 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762D00 value: E9 0A D3 49 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C10005 value: E9 DB 2D B5 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762DE0 value: E9 2A D2 4A 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C20005 value: E9 AB 3E B4 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77763EB0 value: E9 5A C1 4B 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C30005 value: E9 2B 2F B3 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762F30 value: E9 DA D0 4C 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C40005 value: E9 9B 2F B2 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762FA0 value: E9 6A D0 4D 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C50005 value: E9 0B 2D B1 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762D10 value: E9 FA D2 4E 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C60005 value: E9 CB 3B B0 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77763BD0 value: E9 3A C4 4F 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C70005 value: E9 2B 2D AF 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762D30 value: E9 DA D2 50 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C80005 value: E9 4B 47 AE 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77764750 value: E9 BA B8 51 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1C90005 value: E9 BB 2C AD 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762CC0 value: E9 4A D3 52 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1CA0005 value: E9 8B 3B AC 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77763B90 value: E9 7A C4 53 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1CB0005 value: E9 5B 2B AB 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762B60 value: E9 AA D4 54 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 1CC0005 value: E9 6B 2B AA 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 6596 base: 77762B70 value: E9 9A D4 55 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 1130F09
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 97CB0A
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 90BB8B
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 932392
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 9A7795
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 91B4D3
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 8F2024
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 92BC19
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 107370D
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 10774FB
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 10B81E7
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 1015495
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 9CE079
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 971FE0
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe TID: 5292Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe TID: 2520Thread sleep time: -30000s >= -30000sJump to behavior
Source: e5mIhMkcj5.exe, 00000001.00000003.1665341379.00000000017CB000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988671031.00000000017C7000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1665361684.000000000179F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988696834.00000000017CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: e5mIhMkcj5.exe, 00000001.00000003.1665341379.00000000017CB000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988671031.00000000017C7000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988696834.00000000017CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.000000000179F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: les%\Windows Defender\MsMpeng.exe
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.000000000179F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
1
Credential API Hooking
121
Security Software Discovery
Remote Services1
Credential API Hooking
1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS111
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
e5mIhMkcj5.exe19%VirustotalBrowse
e5mIhMkcj5.exe24%ReversingLabsWin32.Trojan.Ousaban
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://23.94.207.151/avs_pro/index.php%e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://23.94.207.151/avs_pro/index.php(oe5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001785000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://23.94.207.151/e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001785000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://23.94.207.151/ce5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://23.94.207.151/avs_pro/index.phpe5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://23.94.207.151/avs_pro/index.phprontdesHQ#e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://23.94.207.151/ve5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                23.94.207.151
                unknownUnited States
                36352AS-COLOCROSSINGUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1578841
                Start date and time:2024-12-20 15:27:14 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 1s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:e5mIhMkcj5.exe
                renamed because original name is a hash value
                Original Sample Name:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c.exe
                Detection:MAL
                Classification:mal64.evad.winEXE@1/0@0/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                09:28:25API Interceptor3268x Sleep call for process: e5mIhMkcj5.exe modified
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AS-COLOCROSSINGUSarm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                • 107.174.209.17
                uctgkfb7.exeGet hashmaliciousXWormBrowse
                • 192.210.175.202
                file.exeGet hashmaliciousRemcosBrowse
                • 107.173.4.16
                SwiftCopy_PaymtRecpt121228.exeGet hashmaliciousRemcosBrowse
                • 192.210.150.17
                Document.xlaGet hashmaliciousUnknownBrowse
                • 172.245.123.12
                greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                • 23.95.235.29
                sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                • 23.95.235.29
                createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                • 172.245.123.12
                ORDER-24171200967.XLS..jsGet hashmaliciousWSHRat, Caesium Obfuscator, STRRATBrowse
                • 192.3.220.6
                newthingswithgreatupdateiongivenbestthingswithme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                • 107.173.4.16
                No context
                No context
                No created / dropped files found
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.993493827980054
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:e5mIhMkcj5.exe
                File size:8'816'544 bytes
                MD5:d11828146ff9e2e340c555f9531cac47
                SHA1:ca027ca9bea1e48a0ac4d01370d3f4bc9d5e5088
                SHA256:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c
                SHA512:2305b6b9a5b530651b33958093b96ccdbee63d03530a082c39c94809278458658faca472b66a090493928ec26f6e3d28c8ba278faf6ac9cb7afc8ab70a918779
                SSDEEP:196608:q8NN2mvIbRvnSZkIeQZ8eYMa46OdXxVQIB:qeN2uOnRIIehVQ4
                TLSH:8096335AFEEF3CC8F40A6D3005359CFC7875EC680A54CE28559ABA4998B7053B73A163
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..e...............&.....H......m........ ....@.......................................@................................
                Icon Hash:18c21a3e0e660418
                Entrypoint:0x123976d
                Entrypoint Section:.2"V
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x65F0C531 [Tue Mar 12 21:12:17 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:c8fda3b55e4040ba39dbeb455bda13b3
                Signature Valid:true
                Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                Signature Validation Error:The operation completed successfully
                Error Number:0
                Not Before, Not After
                • 13/12/2024 16:10:46 14/12/2025 16:10:46
                Subject Chain
                • E=pagamentosdigitaais@gmail.com, CN=PAGAMENTOS DIGITAIS LTDA, O=PAGAMENTOS DIGITAIS LTDA, L=JOAO PESSOA, S=PARAIBA, C=BR, OID.1.3.6.1.4.1.311.60.2.1.3=BR, SERIALNUMBER=55.972.702/0001-29, OID.2.5.4.15=Private Organization
                Version:3
                Thumbprint MD5:FC24237D18BE5D7114AA3DCDAAE6AD6C
                Thumbprint SHA-1:3C9DB92427EA2A17F23D86D1B5704C90C1949548
                Thumbprint SHA-256:19BAF25862979BC0C7CB3971187128986BEB6DB4A4C6986B452A286850E570B0
                Serial:0B98FD483EA0DD6E7C6A6317
                Instruction
                push edi
                pushfd
                mov edi, C411C603h
                sub edi, B30F4939h
                mov edi, E5A3E327h
                or edi, edi
                not edi
                mov edi, dword ptr [esp+04h]
                mov dword ptr [esp+04h], D5D8AD42h
                push dword ptr [esp+00h]
                popfd
                lea esp, dword ptr [esp+04h]
                call 00007FCB147B8B60h
                dec esp
                mov dword ptr [esp+08h], edx
                inc sp
                mov edx, dword ptr [ebp+00h]
                call 00007FCB148015F0h
                add ebp, 00000002h
                jmp 00007FCB140D269Ch
                add dl, 00000029h
                xor dl, FFFFFFBBh
                mov dword ptr [esp+00h], 8D038F26h
                add dl, FFFFFF92h
                rol dl, 1
                xor dl, 00000037h
                xor bl, dl
                neg dword ptr [esp+00h]
                call 00007FCB14061A3Dh
                jp 00007FCB14060282h
                sbb edi, 00000002h
                mov dword ptr [esp+00h], 41095A3Dh
                and dword ptr [esp+00h], 639FE311h
                call 00007FCB148287DAh
                xor esi, edx
                rep outsd
                sar dword ptr [eax-3F857761h], FFFFFFA1h
                and al, C1h
                sti
                push eax
                push edi
                in eax, dx
                les ecx, fword ptr [ecx-28AF8E80h]
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x757c380x8c.2"V
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xec40000x13579.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x865e000x29a0.2"V
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xed80000x390.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xec3ab00x40.2"V
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x6710000x30.]#m
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000xce10x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x20000xb400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x30000x3c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .!Zx0x40000x66cad40x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .]#m0x6710000x480x2002266ec4049a04fc3a59c1b526a72b2feFalse0.080078125data0.3459259103346658IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .2"V0x6720000x851c600x851e0028cc6be39d4f7aa84057d316b4b9de52unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0xec40000x135790x13600f4f9f19583650c28f7ee2c4e7d3ca429False0.4890751008064516data6.167129680442765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0xed80000x3900x4006223522a7ebf9ac317fb34927716e181False0.5185546875data3.9146739003418265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0xec43400x3a47PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9777464977545411
                RT_ICON0xec7d880x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.29319464033850495
                RT_ICON0xec93b00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.3702025586353945
                RT_ICON0xeca2580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.4002707581227437
                RT_ICON0xecab000x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.4735023041474654
                RT_ICON0xecb1c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3713872832369942
                RT_ICON0xecb7300x2e29PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.976982313615977
                RT_ICON0xece55c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.13491969768540388
                RT_ICON0xed27840x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.18869294605809128
                RT_ICON0xed4d2c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.25961538461538464
                RT_ICON0xed5dd40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.33114754098360655
                RT_ICON0xed675c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3962765957446808
                RT_GROUP_ICON0xed6bc40xaedataEnglishUnited States0.632183908045977
                RT_VERSION0xed6c740x3c0dataEnglishUnited States0.4197916666666667
                RT_MANIFEST0xed70340x545XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4558932542624166
                DLLImport
                api-ms-win-crt-runtime-l1-1-0.dll_set_app_type
                api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                api-ms-win-crt-stdio-l1-1-0.dll__p__commode
                api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
                KERNEL32.dllGetCurrentThreadId
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Dec 20, 2024 15:28:25.016074896 CET4971480192.168.2.723.94.207.151
                Dec 20, 2024 15:28:25.138662100 CET804971423.94.207.151192.168.2.7
                Dec 20, 2024 15:28:25.138834000 CET4971480192.168.2.723.94.207.151
                Dec 20, 2024 15:28:25.139153004 CET4971480192.168.2.723.94.207.151
                Dec 20, 2024 15:28:25.139172077 CET4971480192.168.2.723.94.207.151
                Dec 20, 2024 15:28:25.258836031 CET804971423.94.207.151192.168.2.7
                Dec 20, 2024 15:28:25.259243011 CET804971423.94.207.151192.168.2.7
                Dec 20, 2024 15:28:26.448056936 CET804971423.94.207.151192.168.2.7
                Dec 20, 2024 15:28:26.499413967 CET4971480192.168.2.723.94.207.151
                Dec 20, 2024 15:28:31.454185009 CET804971423.94.207.151192.168.2.7
                Dec 20, 2024 15:28:31.454308987 CET4971480192.168.2.723.94.207.151
                Dec 20, 2024 15:28:31.778409958 CET4971480192.168.2.723.94.207.151
                Dec 20, 2024 15:28:31.898231983 CET804971423.94.207.151192.168.2.7
                • 23.94.207.151
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.74971423.94.207.151806596C:\Users\user\Desktop\e5mIhMkcj5.exe
                TimestampBytes transferredDirectionData
                Dec 20, 2024 15:28:25.139153004 CET250OUTPOST /avs_pro/index.php HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded; Charset=UTF-8
                Accept: */*
                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                Content-Length: 135
                Host: 23.94.207.151
                Dec 20, 2024 15:28:25.139172077 CET135OUTData Raw: 6f 70 3d 68 5a 76 44 58 72 2b 53 4d 56 35 43 53 69 56 79 61 32 77 52 61 48 55 42 41 67 35 36 66 43 34 70 4d 56 6b 6a 42 6c 6c 66 56 6c 78 44 52 68 59 47 43 42 6c 62 57 30 4a 4b 57 42 68 65 52 56 64 66 46 41 4d 43 64 56 46 4e 47 54 5a 50 49 53 38
                Data Ascii: op=hZvDXr+SMV5CSiVya2wRaHUBAg56fC4pMVkjBllfVlxDRhYGCBlbW0JKWBheRVdfFAMCdVFNGTZPIS8YfnV9ZGcVcnJ+fCQvKSglcmsDAhwFBxkFCAteS1xDQmMICwAAaRY=
                Dec 20, 2024 15:28:26.448056936 CET203INHTTP/1.1 200 OK
                Date: Fri, 20 Dec 2024 14:28:26 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 0
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=UTF-8


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Target ID:1
                Start time:09:28:18
                Start date:20/12/2024
                Path:C:\Users\user\Desktop\e5mIhMkcj5.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\e5mIhMkcj5.exe"
                Imagebase:0x280000
                File size:8'816'544 bytes
                MD5 hash:D11828146FF9E2E340C555F9531CAC47
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Borland Delphi
                Reputation:low
                Has exited:false

                No disassembly