Windows
Analysis Report
Oggq2dY6kx.exe
Overview
General Information
Sample name: | Oggq2dY6kx.exerenamed because original name is a hash value |
Original sample name: | E3E636DDED2B38EA6FC5710D467C29E9.exe |
Analysis ID: | 1579276 |
MD5: | e3e636dded2b38ea6fc5710d467c29e9 |
SHA1: | 682ac24c96964ebc941e107d2ed1cb1619433508 |
SHA256: | 37a6ebef45b4c6b9a635fb2c1152bdef53db3c6d749824c84d8cfe1e79d6df4d |
Tags: | AZORultexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Oggq2dY6kx.exe (PID: 7256 cmdline:
"C:\Users\ user\Deskt op\Oggq2dY 6kx.exe" MD5: E3E636DDED2B38EA6FC5710D467C29E9)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Azorult | AZORult is a credential and payment card information stealer. Among other things, version 2 added support for .bit-domains. It has been observed in conjunction with Chthonic as well as being dropped by Ramnit. |
{"C2 url": "http://195.245.112.115/index.php"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Azorult | Yara detected Azorult Info Stealer | Joe Security | ||
JoeSecurity_Azorult_1 | Yara detected Azorult | Joe Security | ||
Windows_Trojan_Azorult_38fce9ea | unknown | unknown |
| |
Azorult_1 | Azorult Payload | kevoreilly |
| |
Azorult | detect Azorult in memory | JPCERT/CC Incident Response Group |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Azorult | Yara detected Azorult Info Stealer | Joe Security | ||
JoeSecurity_Azorult_1 | Yara detected Azorult | Joe Security | ||
Windows_Trojan_Azorult_38fce9ea | unknown | unknown |
| |
Azorult | detect Azorult in memory | JPCERT/CC Incident Response Group |
| |
JoeSecurity_Azorult | Yara detected Azorult Info Stealer | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Azorult | Yara detected Azorult Info Stealer | Joe Security | ||
JoeSecurity_Azorult_1 | Yara detected Azorult | Joe Security | ||
Windows_Trojan_Azorult_38fce9ea | unknown | unknown |
| |
Azorult_1 | Azorult Payload | kevoreilly |
| |
Azorult | detect Azorult in memory | JPCERT/CC Incident Response Group |
| |
Click to see the 5 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:07:02.118563+0100 | 2029467 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 104.21.52.219 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:07:02.118563+0100 | 2810276 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 104.21.52.219 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 0_2_004094C4 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_0041303C | |
Source: | Code function: | 0_2_004111C4 | |
Source: | Code function: | 0_2_00414408 | |
Source: | Code function: | 0_2_00414408 | |
Source: | Code function: | 0_2_00412D70 | |
Source: | Code function: | 0_2_00412D70 | |
Source: | Code function: | 0_2_00412D70 | |
Source: | Code function: | 0_2_0041158C | |
Source: | Code function: | 0_2_00411590 | |
Source: | Code function: | 0_2_00412D9C |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_0040A4A4 |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 0_2_00417B1A |
Source: | Code function: | 0_2_0040D894 | |
Source: | Code function: | 0_2_0040D894 | |
Source: | Code function: | 0_2_004140E4 | |
Source: | Code function: | 0_2_004108EC | |
Source: | Code function: | 0_2_0040B11C | |
Source: | Code function: | 0_2_0040B11C | |
Source: | Code function: | 0_2_004080B0 | |
Source: | Code function: | 0_2_0040818E | |
Source: | Code function: | 0_2_004089DC | |
Source: | Code function: | 0_2_004089DC | |
Source: | Code function: | 0_2_004089DC | |
Source: | Code function: | 0_2_00415284 | |
Source: | Code function: | 0_2_0040CA34 | |
Source: | Code function: | 0_2_0040CA34 | |
Source: | Code function: | 0_2_00417B10 | |
Source: | Code function: | 0_2_00404C09 | |
Source: | Code function: | 0_2_0040D3E4 | |
Source: | Code function: | 0_2_0040A408 | |
Source: | Code function: | 0_2_0040C3B8 | |
Source: | Code function: | 0_2_0040C3B8 | |
Source: | Code function: | 0_2_0040A3D0 | |
Source: | Code function: | 0_2_0040DC9B | |
Source: | Code function: | 0_2_0040DC30 | |
Source: | Code function: | 0_2_0041B427 | |
Source: | Code function: | 0_2_0040B444 | |
Source: | Code function: | 0_2_0040B444 | |
Source: | Code function: | 0_2_0040A45C | |
Source: | Code function: | 0_2_0041A512 | |
Source: | Code function: | 0_2_00414CA4 | |
Source: | Code function: | 0_2_004094B0 | |
Source: | Code function: | 0_2_0041A4E0 |
Source: | Code function: | 0_2_00417B1A |
Source: | Code function: | 0_2_0041303C | |
Source: | Code function: | 0_2_004111C4 | |
Source: | Code function: | 0_2_00414408 | |
Source: | Code function: | 0_2_00414408 | |
Source: | Code function: | 0_2_00412D70 | |
Source: | Code function: | 0_2_00412D70 | |
Source: | Code function: | 0_2_00412D70 | |
Source: | Code function: | 0_2_0041158C | |
Source: | Code function: | 0_2_00411590 | |
Source: | Code function: | 0_2_00412D9C |
Source: | Code function: | 0_2_00416740 |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00417B1A |
Source: | Code function: | 0_2_00407A34 |
Source: | Code function: | 0_2_00404B4C |
Source: | Code function: | 0_2_004065CC |
Source: | Code function: | 0_2_00404C15 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 2 Obfuscated Files or Information | LSASS Memory | 1 Account Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 1 System Owner/User Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 14 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
96% | ReversingLabs | Win32.Infostealer.CoinStealer | ||
88% | Virustotal | Browse | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
inglesxyz.shop | 104.21.52.219 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true | unknown | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.52.219 | inglesxyz.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579276 |
Start date and time: | 2024-12-21 12:06:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 58s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Oggq2dY6kx.exerenamed because original name is a hash value |
Original Sample Name: | E3E636DDED2B38EA6FC5710D467C29E9.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.winEXE@1/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, AsyncRAT, LummaC Stealer, XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| |
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mint Stealer | Browse |
| ||
Get hash | malicious | Mint Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
|
File type: | |
Entropy (8bit): | 6.303597203842279 |
TrID: |
|
File name: | Oggq2dY6kx.exe |
File size: | 114'688 bytes |
MD5: | e3e636dded2b38ea6fc5710d467c29e9 |
SHA1: | 682ac24c96964ebc941e107d2ed1cb1619433508 |
SHA256: | 37a6ebef45b4c6b9a635fb2c1152bdef53db3c6d749824c84d8cfe1e79d6df4d |
SHA512: | aed777a27d9507de8583ad68ae807f26abd7bb538651ea6b54ed1b896e81a2285a134a5852661377b98cf85f2197f5cabc3e634036cec9183c8cad7325995c73 |
SSDEEP: | 3072:KExRaX6raoCoCyz6/mqv1JR+yBtGOeheWginBq:faZ1tme+1winw |
TLSH: | A5B3196EF7C19277D02408BDCD45A1B9907975302E391822F7E64F6CD8F96C2AA6C2C7 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x41a684 |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 6d1f2b41411eacafcf447fc002d8cb00 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
mov eax, 0041A51Ch |
call 00007F6230C941D1h |
mov eax, 0041A6ACh |
call 00007F6230CA85CFh |
call 00007F6230C928B6h |
add bh, bh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1d000 | 0x79e | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1e000 | 0x135c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x196b0 | 0x19800 | 36cb28728042ffae219a1946fa4be687 | False | 0.5062327665441176 | data | 6.185523493326931 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0x1b000 | 0x66c | 0x800 | e9650bf22ef923968a1214ea2fbd8ce9 | False | 0.716796875 | data | 6.268942670866809 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0x1c000 | 0x8c5 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x1d000 | 0x79e | 0x800 | 556c360ee726e003c5e1f6a038e97572 | False | 0.4248046875 | data | 4.584408491713284 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x1e000 | 0x135c | 0x1400 | 47e0321680a57d86584b7d24879d5e1d | False | 0.7943359375 | data | 6.670961239193358 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, WideCharToMultiByte, MultiByteToWideChar, GetThreadLocale, GetStartupInfoA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle |
user32.dll | GetKeyboardType, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | GetModuleHandleA |
advapi32.dll | RegOpenKeyExA, RegEnumKeyA, FreeSid |
kernel32.dll | WriteFile, Sleep, LocalFree, LoadLibraryExW, LoadLibraryA, GlobalUnlock, GlobalLock, GetTickCount, GetSystemInfo, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetFileAttributesW, GetCurrentProcessId, GetCurrentProcess, FreeLibrary, FindNextFileW, FindFirstFileW, FindClose, ExitProcess, DeleteFileW, CreateDirectoryW, CopyFileW |
gdi32.dll | SelectObject, DeleteObject, DeleteDC, CreateCompatibleDC, CreateCompatibleBitmap, BitBlt |
user32.dll | ReleaseDC, GetSystemMetrics, GetDC, CharToOemBuffA |
ole32.dll | OleInitialize, CoCreateInstance |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:07:02.118563+0100 | 2029467 | ET MALWARE Win32/AZORult V3.3 Client Checkin M14 | 1 | 192.168.2.4 | 49730 | 104.21.52.219 | 80 | TCP |
2024-12-21T12:07:02.118563+0100 | 2810276 | ETPRO MALWARE AZORult CnC Beacon M1 | 1 | 192.168.2.4 | 49730 | 104.21.52.219 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2024 12:07:00.884154081 CET | 49730 | 80 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:01.003731966 CET | 80 | 49730 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:01.003817081 CET | 49730 | 80 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:01.003994942 CET | 49730 | 80 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:01.123589039 CET | 80 | 49730 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:02.118379116 CET | 80 | 49730 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:02.118515968 CET | 80 | 49730 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:02.118562937 CET | 49730 | 80 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:02.118562937 CET | 49730 | 80 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:02.120595932 CET | 49730 | 80 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:02.120958090 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:02.121011972 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:02.121083021 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:02.132453918 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:02.132482052 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:02.240120888 CET | 80 | 49730 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:03.354096889 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:03.354228973 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:03.411226988 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:03.411248922 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:03.411644936 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:03.411705971 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:03.415302992 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:03.455374956 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:03.790167093 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:03.790236950 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Dec 21, 2024 12:07:03.790256023 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:03.790296078 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:03.791241884 CET | 49731 | 443 | 192.168.2.4 | 104.21.52.219 |
Dec 21, 2024 12:07:03.791268110 CET | 443 | 49731 | 104.21.52.219 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2024 12:07:00.566895962 CET | 57986 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 21, 2024 12:07:00.878288031 CET | 53 | 57986 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 21, 2024 12:07:00.566895962 CET | 192.168.2.4 | 1.1.1.1 | 0x30df | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 21, 2024 12:07:00.878288031 CET | 1.1.1.1 | 192.168.2.4 | 0x30df | No error (0) | 104.21.52.219 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:07:00.878288031 CET | 1.1.1.1 | 192.168.2.4 | 0x30df | No error (0) | 172.67.204.92 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.52.219 | 80 | 7256 | C:\Users\user\Desktop\Oggq2dY6kx.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 21, 2024 12:07:01.003994942 CET | 268 | OUT | |
Dec 21, 2024 12:07:02.118379116 CET | 1031 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49731 | 104.21.52.219 | 443 | 7256 | C:\Users\user\Desktop\Oggq2dY6kx.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:07:03 UTC | 163 | OUT | |
2024-12-21 11:07:03 UTC | 958 | IN | |
2024-12-21 11:07:03 UTC | 16 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 06:06:59 |
Start date: | 21/12/2024 |
Path: | C:\Users\user\Desktop\Oggq2dY6kx.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 114'688 bytes |
MD5 hash: | E3E636DDED2B38EA6FC5710D467C29E9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 4.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 2.2% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 10 |
Graph
Function 00417B1A Relevance: 57.8, APIs: 20, Strings: 13, Instructions: 64libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004065CC Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040561C Relevance: 220.8, APIs: 63, Strings: 63, Instructions: 312libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00419108 Relevance: 57.0, APIs: 4, Strings: 28, Instructions: 964synchronizationCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00418688 Relevance: 42.4, APIs: 18, Strings: 6, Instructions: 375libraryloadernetworkCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040955E Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 10libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407C58 Relevance: 4.6, APIs: 3, Instructions: 80COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004040F4 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 16memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407B78 Relevance: 3.1, APIs: 2, Instructions: 84COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407B77 Relevance: 3.1, APIs: 2, Instructions: 80COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004033F4 Relevance: 3.1, APIs: 2, Instructions: 71COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004033EC Relevance: 3.1, APIs: 2, Instructions: 66COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004033F0 Relevance: 3.1, APIs: 2, Instructions: 64COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401388 Relevance: 2.5, APIs: 2, Instructions: 37memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004065C4 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004065C8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00403604 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401464 Relevance: 1.3, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004015B0 Relevance: 1.3, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00414408 Relevance: 16.2, APIs: 4, Strings: 5, Instructions: 496fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00404C15 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 41threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00412D70 Relevance: 10.7, APIs: 3, Strings: 3, Instructions: 159fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00412D9C Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 141fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041303C Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 139fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004111C4 Relevance: 9.0, APIs: 3, Strings: 2, Instructions: 201fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041158C Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 144fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00411590 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 142fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00404B4C Relevance: 1.5, APIs: 1, Instructions: 37COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040A4A4 Relevance: 1.5, APIs: 1, Instructions: 16comCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407A34 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040831C Relevance: 33.6, APIs: 16, Strings: 3, Instructions: 323libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00408324 Relevance: 33.6, APIs: 16, Strings: 3, Instructions: 319libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00408328 Relevance: 33.6, APIs: 16, Strings: 3, Instructions: 317libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00418124 Relevance: 33.5, APIs: 10, Strings: 9, Instructions: 269libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00417278 Relevance: 26.5, APIs: 5, Strings: 10, Instructions: 213sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041727C Relevance: 26.5, APIs: 5, Strings: 10, Instructions: 211sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00417290 Relevance: 26.5, APIs: 5, Strings: 10, Instructions: 201sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407DD0 Relevance: 22.8, APIs: 6, Strings: 7, Instructions: 100libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407DD4 Relevance: 22.8, APIs: 6, Strings: 7, Instructions: 98libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00416B94 Relevance: 21.2, APIs: 7, Strings: 5, Instructions: 225libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00416B8C Relevance: 21.2, APIs: 7, Strings: 5, Instructions: 216libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00416B90 Relevance: 21.2, APIs: 7, Strings: 5, Instructions: 214libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00415F30 Relevance: 19.6, APIs: 4, Strings: 7, Instructions: 305registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004178B4 Relevance: 18.2, APIs: 12, Instructions: 162COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004129A4 Relevance: 12.5, APIs: 3, Strings: 4, Instructions: 222fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041256C Relevance: 12.5, APIs: 3, Strings: 4, Instructions: 222fileCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00403368 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 38filewindowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402668 Relevance: 11.4, APIs: 9, Instructions: 109COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410E70 Relevance: 10.7, APIs: 3, Strings: 3, Instructions: 239fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401934 Relevance: 9.1, APIs: 6, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410BB8 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 198fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410900 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 197fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402AC4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 49registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00416584 Relevance: 8.8, APIs: 2, Strings: 3, Instructions: 46libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00406654 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 32libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410E58 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 120fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410E60 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 116fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410E68 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 112fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410BB0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 108fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410BB4 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 106fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00417E78 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 61libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00417E7C Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 59libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00416644 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00417E80 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401870 Relevance: 6.0, APIs: 4, Instructions: 48memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|