Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 368 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: C8E9B3BDD3395C6A3CB2D514865CEF71) - cmd.exe (PID: 6384 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Te e Tee.cmd & Tee.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3552 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 2796 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6300 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 5460 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 3524 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5316 cmdline:
cmd /c md 491427 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 1120 cmdline:
extrac32 / Y /E Gold MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 5260 cmdline:
findstr /V "worm" St ations MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 1472 cmdline:
cmd /c cop y /b ..\Co operative + ..\Addin g + ..\Rep resenting + ..\Verba l + ..\Hea rts + ..\S audi + ..\ Thailand t MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Achievements.com (PID: 6460 cmdline:
Achievemen ts.com t MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 5148 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:46.004244+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:47.972818+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:50.246840+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49770 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:52.376993+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49776 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:54.520101+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49780 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:57.007002+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49785 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:59.685908+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49791 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:17:01.766455+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49798 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:46.751394+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:48.753732+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:17:02.430612+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49798 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:46.751394+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:48.753732+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:46.004244+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:47.972818+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:50.246840+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49770 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:52.376993+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49776 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:54.520101+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49780 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:57.007002+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49785 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:59.685908+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49791 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:17:01.766455+0100 | 2058040 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49798 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:44.459374+0100 | 2058039 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 60679 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:53.205300+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49776 | 104.21.48.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 11 Input Capture | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
8% | ReversingLabs | |||
12% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
brendon-sharjen.biz | 104.21.48.1 | true | true | unknown | |
pVuTqdzEGzqdPQYfSOOQnUISgzo.pVuTqdzEGzqdPQYfSOOQnUISgzo | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.48.1 | brendon-sharjen.biz | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580144 |
Start date and time: | 2024-12-24 02:15:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@24/23@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
20:16:03 | API Interceptor | |
20:16:45 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.48.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
brendon-sharjen.biz | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\491427\Achievements.com | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RedLine, Stealc | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Vidar | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 488179 |
Entropy (8bit): | 7.999595359559744 |
Encrypted: | true |
SSDEEP: | 6144:rlKaPp41IM0CAUIN51BlHJVxbQ31k8szvVP6XPVxN5OlDpSovNd53Pw/tWXP/:xPp8IM0Ci513HJE+9idj5QDpBvB8KH |
MD5: | F0ADDF65CDA25219523FB0CB6BAFE101 |
SHA1: | CE90B1A0A43AAF60733446DDFB0D333D08305B98 |
SHA-256: | 658C8C3CA11838525E8561C383F4953DE01D8729877C4E0C8B2196692881123A |
SHA-512: | 5DC9990A161CFCEE24330AA9D841B4222CA14C853D5A90640BE3327BBDCFDCFC1119418FEA3B6FEB09011B605469C16F1801CFD6DB9B9BA43B9B22FD26A8FA03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.99777119377709 |
Encrypted: | true |
SSDEEP: | 1536:lqUa28m2c/WFjtiZF7Njg6SKVIO3GGe40W/WdGf6rWdKGmbfaBI:RaNW/U4NNjPECr0LEJ3mbUI |
MD5: | 702D11B1CE0A7FB082886DF1CEC2F7A3 |
SHA1: | A338373CC67EC2DADBF34C226AA57CEC1D2F617C |
SHA-256: | 3606004A1659C064B2C06C6C5E83B9DE3288D6B11B45AB737D12B863574D440B |
SHA-512: | 8C39BCDA1EE70D9162CCAF057C8BFF603C26D427D5DC0190B636E68FB280E421471E494B62E0C0607D1A7A93C9DDA3E7B1F7FD9128ABC4C2B4935005DCD76DF1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68608 |
Entropy (8bit): | 6.673347668983059 |
Encrypted: | false |
SSDEEP: | 1536:yU0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvg:yUDQWf05mjccBiqXvpgF4qvg |
MD5: | 25FC33B141E09CED90E0C58B1326B393 |
SHA1: | A84878D575A5031FCB566D59BB9A0CB32D0912D7 |
SHA-256: | ABE0EB1103818A032CFDC4B45129C101CEBD7A1A9AC74D6CDE769554274F187B |
SHA-512: | 2AA6D19F83FFB61ED5E560D0AF4E24A8013192B774E50C95F8CFE9978785FB8A4C97941FDC00D2AB4FA6C8A6397577FB2806C13B84B1CFBCC699012F7942891F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 111616 |
Entropy (8bit): | 6.287641068217172 |
Encrypted: | false |
SSDEEP: | 3072:8g5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW7:/5vPeDkjGgQaE/l5 |
MD5: | 57D3B0DC6BB03C38101B3CB7BBA4C786 |
SHA1: | 03F554FDDD88208353B4E21EA6A5D211AAEDBB2F |
SHA-256: | 25F91384AD504BB9363272C0CCBDDA3BA196BCC2A50623CA3C0D88D310BB0DDD |
SHA-512: | 8700A3179D961D25ECEBF8E640E59B1B8891F6497839DCF359E3F979C52E6CB1E172B69952B37071349731AF31E3257F0D4D6D598641CABCC86A05AF23804A42 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 6.702612434243109 |
Encrypted: | false |
SSDEEP: | 1536:n932eOypvcLSDOSpZ+Sh+I+FrbCyI7P4CR:932eOyKODOSpQSAU4CR |
MD5: | 8F5C0A3E762AB18893AB566F6E003502 |
SHA1: | 094FB84574E5A0EEF3B95149AA08739EB36C9834 |
SHA-256: | 04C42C69D4553F0FE8172006A1447EB66B6BB107FE97A4B6F81C99CCAEBE44C2 |
SHA-512: | C87A29E0833A0EC0C4547BE4FD9C2D5675CAF4FA355566DA297ED0D78C44B8849DEBE295E4C26270AA6553448A44E2FC5E208D5578EA16ABD742182F627DD42B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 7.996670730518875 |
Encrypted: | true |
SSDEEP: | 768:Lk1R3Ju1xYQH7Z6KBn8fMJlmH6aCqMuomVvD2I+iFNKWREUQnyh4dwVoIDXmkYSB:Lkf5cxYGPsMiuqMuH+MrqUQntdIjkfVK |
MD5: | CC8E4CD36B739B1EF539502774D6168A |
SHA1: | E7BAC3E2C7AE978C5EED56186571D40F915CDE4A |
SHA-256: | E262B3B0F2EAC05C3ED827E0B13C634BB383DE70F37501043BCDDE327BEF3946 |
SHA-512: | DD3CAF6CE1BC7EDA75E3D4189E3CE9FBD49BD9615754FBBE0957463EFA68F12E6AFA1CAD35DECE72455A1422060B6FFF32B3F81FD8A5947581614A0B6CE79EFB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114688 |
Entropy (8bit): | 6.71556564826669 |
Encrypted: | false |
SSDEEP: | 3072:STmRxlHS3NxrHSBRtNPnj0nEoXnmowS2u5hVOoQ9:vHS3zcNPj0nEo3tb2l |
MD5: | 04401875809E8313D7F2A1581F04EE43 |
SHA1: | 183E68D7C007BB07F07854CF95DD3F2DAF51623E |
SHA-256: | 2AC42A0A177AC027D4ED5D1033B84E79C5EE548147BDABE0F422E4F247E1DE8E |
SHA-512: | 6A8B49A53A3B0AC0A90C83FF270E4C05B5364598E153160590C759F2FF7F391E86BEACDA831802326C12332230FF4EE9CDCE6B72A1F90424AEBFC2C3B385FBE6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 91136 |
Entropy (8bit): | 6.610826163863534 |
Encrypted: | false |
SSDEEP: | 1536:Li8q0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneAJu7QnswIPumV3BxZxu6/sPYcSk:q0Imbi80PtCZEMnVIPPBxT/sZy2 |
MD5: | 08DF0242195FF14BEECF48E4A50C57E8 |
SHA1: | 529579022A009099FFEC38CED60467AF24717A8F |
SHA-256: | 5259468A98B11E6B829C170101F20F794404384739B6692ACDADE068E4CBCE46 |
SHA-512: | 30AB012BC51184BC0C35D7A4FFBD319152F58590DF4CB2ACF6CB2084140C581B259A2DEF6143D5B3946D67987A52A2C72DD2E6579BC3D90F84C4EEEBF577C888 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 489345 |
Entropy (8bit): | 7.99869547581387 |
Encrypted: | true |
SSDEEP: | 12288:IuKYYTSqWPyMh64OOqGvtI7NcTiZgRwYBO2SLTh6lYPd:IuKdTcXb3A4NRwQSnd |
MD5: | FCC4C5C57A55C5A1680709FA8354FD10 |
SHA1: | 3BE7C47A83AFDAF052CED916CA0A915D3FD0ED15 |
SHA-256: | 696A62AF054C27EDB0D004F578CE9C9E86D33D472E2D22F1B7ADACED3B5C165D |
SHA-512: | 7BC9C6B64F1ABCE616B9F0613E077BD6C2359C96247D241B89B2C255E1242A86C34770495A774452D130C42E92AEC33EDBCE9418EE06BA16CDAFB4903DFAF0D7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 7.997503539464173 |
Encrypted: | true |
SSDEEP: | 1536:comv7l6J0UXyN6xH/lcLI3Bs+XkLIRAI5krJ6xGq55kmc2pA8QlsT:wBSiN6AL2XJRAI53xN5kWAlST |
MD5: | 22CBD6179295404A9093C9D0CAEECF25 |
SHA1: | 40AFE25A2373547A1CCE2A49BFDF8B66EE15D18C |
SHA-256: | 9DA6CE0C383330E444007994DDA9341174B169B44AC60B30D1BCCC26118332DA |
SHA-512: | D1B8B9089E7BD5DB47551DF6EDE3C8DB6D7C1C89D315AF6D2566AA7AEAF714B1C32CD99F4DC442AB5CB59E9F22DDAC74E33EC876B1478A83DD77E67B4B219C70 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 6.581247479086471 |
Encrypted: | false |
SSDEEP: | 1536:ljv18fRQLTh/5fhjLueoMmOrrHL/uDoiouK+r5bLmbZzW9FfTubb1/DdZ:lv18mLthfhnueoMmOqDoioO5bLezW9FO |
MD5: | C276627720D5B1DCCC95B7FB88D6B661 |
SHA1: | 062AEC14E32810B316D4F163969A46489CDDC7C1 |
SHA-256: | 1DABAF8DB4B3B33B3D49864C0B6F853C8D1F2E6124337F2ED0CD4DA6B904F383 |
SHA-512: | 8AFB61E7C8326A0A230090F403124240DEC6A6B21C0C1C291033F57A0789C373DDF180DFB91B265409D57C726E458CC9E8138E532BB4A82058024FC5780527A8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 7.997126096691516 |
Encrypted: | true |
SSDEEP: | 1536:uT4dfLdnBaq1yyJ1fkHYBXVNVDHTsd8OA2FfvQdOe1bVHupHzswmCn/ybhj9/:uEnnN1rPkYBlNVHTm8exodrb1uxFhUJ |
MD5: | 696671D6BA9BAA0609F2FFC2202A5592 |
SHA1: | BB7FB6F0A20D32AE13BC225250F8CAA8C597D6AE |
SHA-256: | DA5BAE677CCD13D5A3C9BDCE05409831E2AF9CC48C920CB3E2A4A8F4FAFFF7DC |
SHA-512: | 96E2C76E69DC79C7CF759A71A86D1671E01F0C90FF15FAFD3E3B34E47FFCEBBB392751B89D1A1CFF183F8ABD9C1CEA5CF8E56AFEDADA6571F965E13FFC98EBA1 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 94208 |
Entropy (8bit): | 7.9980212964177335 |
Encrypted: | true |
SSDEEP: | 1536:AGfao0Xvq9EDpS+djZ35/zsoE94kGT+Q4iJf1E/XZZa3PmCwRXbVv3AcfayBSutO:AVbpS+djZ35bsD4dBrd6Za3PnwRFDXtO |
MD5: | DCDA7A17BCAEB98EABC1D5189C466DF6 |
SHA1: | 7DC88EB0AD24EBD9F4056EA16EC68CA535DAC389 |
SHA-256: | EDD2C94028623406C0CAEDFC25D0BB187F5A336535EBFAB6E4E141AD25FA8C76 |
SHA-512: | BABD7DCC37B423FED0EF2E9192794D646F8A80FCB08FA06C2885613F06D333E4E941AA625B1EF5F3DDE0A1C7BD81D5EBCD53BB14FE5E24246E9D579436AC228D |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 84992 |
Entropy (8bit): | 6.567997164763007 |
Encrypted: | false |
SSDEEP: | 1536:tz7nts/M26N7oKzYkBvRmLORuCYm9PrpmESvn+pqFqaynB6GMKY99z+ajU1r:Bt8T6pUkBJR8CThpmESv+AqVnBypIN |
MD5: | 598E3B02662EAF3C489E5DC44C6BF1F0 |
SHA1: | 8A6CF416D68ECF9FC193806068E7913BF048C3D5 |
SHA-256: | BFEBE29E902C7A2AF9A92E5DB87A526D8F6758FF864AF5202F17CD7B6F6A61EC |
SHA-512: | 66283EC425AB9D6FA1CC5BCF60F0EAC6CCF2C634E486D6EA866B8854D44820D5618E97E325E27AE3F8B1C7918DEBC4B45AE94112EA0AA047A6C93CB1630D45C6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 76800 |
Entropy (8bit): | 6.016710110320542 |
Encrypted: | false |
SSDEEP: | 1536:w6YF640L6wy4Za9IN3YRYfv2j62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFuzW:w6u640ewy4Za9coRC2jfTq8QLeAg0Fui |
MD5: | 2AFE64C999B9D085D0AA85087ABF6B63 |
SHA1: | 0D074396B3EC70CF23482AD26C0E16152EE4D92D |
SHA-256: | F398E3F850AB1367556CB843CB4C4959A9E9C3209360B19A32F9FC0DB8B54D14 |
SHA-512: | 60902BFF471D03A02993E2E9D00E558503D0D9C256695415FECB4A115EE346CDD21CD691D1004B23F93B073D87389D9CAFB464B4C601C9ED015D2F3C4A4F7509 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2749 |
Entropy (8bit): | 5.449962359996162 |
Encrypted: | false |
SSDEEP: | 48:29n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+MAyKne:+SEA5O5W+MfH5S1CqlVJcI6me |
MD5: | D1484DAC2034E7F9EA25455B41A86916 |
SHA1: | E7837405A02A09DBDFD837266B5014ED21BFE27A |
SHA-256: | 2916A024E9269F2ED799DC74BEE0703C5ACB25B69D0666706000324EA2EEBAC6 |
SHA-512: | 9E1B9C4D99593BFAB4A0C0FBB73EC83F9FED05A81F2487A4646880AF55EA3FBEFCB8DB13442968CC35321AD153371A0ACDC7D4FA3C79C4460909BFF4365DF140 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 119199 |
Entropy (8bit): | 6.08336290210046 |
Encrypted: | false |
SSDEEP: | 1536:XgarB/5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:XgarB/5elDWy4ZNoGmROL7F1G7ho2kOb |
MD5: | F20E20DBDA82978916C7010BF8759D1A |
SHA1: | D2DAC5623ADFC336585423DB6D6B1D2C4D86B41A |
SHA-256: | 70D21C4623B769B3D5BD495731059684D6C206E23A94F5730082A1A958965BB0 |
SHA-512: | 5D3EDAC733E364918BFE3FB31FEE127F96DDE7A80CDD196FA157724CDD7FFBB517C3320794E160A76CF56CCD4FA44B768F27FE963EE6B563AAB7DA28A33A8AE5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21287 |
Entropy (8bit): | 5.151781127084143 |
Encrypted: | false |
SSDEEP: | 384:qqvSlKhOsEVW8PMsg7W/PmN3k+hrtiYaxP0rcHyCtf7wAEQivGC:qZMCVW8PMsB/PmNFhxiYa90YcAE8C |
MD5: | 75EFA1D4EDA38667456C67EA625B5A9E |
SHA1: | DCA00FD783BCAD1DADADD8B9C7099F970A9A8ADF |
SHA-256: | 9E9347AF3F2C006812B747B77730AA029F647D5148F899CBF304CEA21C14FA6F |
SHA-512: | E1F11EFCE48775249352033EEEA8BCB9CAADF993693564EEDDA9678B7C4FD41600487074E1CD9E23D9757FC5EA3BEEB70912EAD5A3E5736E76FD50EE3F12A1AD |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21287 |
Entropy (8bit): | 5.151781127084143 |
Encrypted: | false |
SSDEEP: | 384:qqvSlKhOsEVW8PMsg7W/PmN3k+hrtiYaxP0rcHyCtf7wAEQivGC:qZMCVW8PMsB/PmNFhxiYa90YcAE8C |
MD5: | 75EFA1D4EDA38667456C67EA625B5A9E |
SHA1: | DCA00FD783BCAD1DADADD8B9C7099F970A9A8ADF |
SHA-256: | 9E9347AF3F2C006812B747B77730AA029F647D5148F899CBF304CEA21C14FA6F |
SHA-512: | E1F11EFCE48775249352033EEEA8BCB9CAADF993693564EEDDA9678B7C4FD41600487074E1CD9E23D9757FC5EA3BEEB70912EAD5A3E5736E76FD50EE3F12A1AD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17139 |
Entropy (8bit): | 7.991204463178143 |
Encrypted: | true |
SSDEEP: | 384:cwOgWqcvOcRmXg4cQNx5wGACw2W1GKacrBXbAkJYEqjtbD:cw5WqcvOcM5wGO1vBX/E |
MD5: | F113256363EDA6570C7BE0B19CB3F9F4 |
SHA1: | 317CAFC19FD9C22E06FBAA09331D57710225EF03 |
SHA-256: | CECBDBBE9A2E63B88958941029693B7DD0D33E78102EF16BC6D1B15F71FCFD81 |
SHA-512: | FC6876DA78D3B05DCFA13FD0902EC5588D7605FCF70734CB4DBE6ED2B1F22B5E37D374F810C0D14A08C6B5231BD9D1EE50624CA596EDF5A92EF3AF074EA51854 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 137216 |
Entropy (8bit): | 5.606408056726014 |
Encrypted: | false |
SSDEEP: | 1536:78QuklMBNIimuzaAwusPdKaj6iTcPAsAhxj:78XvBNbjaAtsPh6whxj |
MD5: | 91B6EF8A6CBC980AD5536CC7FDA0042D |
SHA1: | AF643D623D298D0A7D787D405EA9B6B00F309EDB |
SHA-256: | 8F3956C380965189D118B5233C171A9CB9E669F7BEF2C535BDD83A1D7FF95497 |
SHA-512: | 02EBF3AFB4F42DC1A454F753DF31B9C77DC66DA1F492F792FB2D938608E639C3CB64FE908481787D50560F787F95636D9A596C63862FF0BC9579734AE59C2C08 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 7.997805869997911 |
Encrypted: | true |
SSDEEP: | 1536:mhs7iF9j6Dln7AY80CZVkvc+PsUYIgHqoBDAeExptDZJ/NxVeR:qCiFF6hn825PDPgKo6HN7eR |
MD5: | 00269F323FC877644AED0FF1B34A600A |
SHA1: | 42D66A05AD328C0980044C11A43CF5523F384BF7 |
SHA-256: | F9448ACFFE5114B750AC18121122D96D418BCEA312B3151CAF25FD04FA8999C9 |
SHA-512: | 14BC76A266A8D8060B2B6E5388110D4530A30E8573D765732C00662A7421C0D372B02630CBFE40486957498F27A1CD534704FAF64F96E8FBA2D1691327E59DCC |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.9743823467287225 |
TrID: |
|
File name: | Setup.exe |
File size: | 1'082'707 bytes |
MD5: | c8e9b3bdd3395c6a3cb2d514865cef71 |
SHA1: | eded5d4b0886d9e6cbf694a12cca7b025b71b486 |
SHA256: | 2ceb886853c05d65854361edf4fdb61ea332d59ab080c39b85f6d621ab1fb1dd |
SHA512: | 7fba5a06882b54ea082f31594cb5ef6e31068d83385416150e20043f1b409610955ff1d00f42c8021745e9b3a168c4b472212d6def41444c2f2df262cfb42d51 |
SSDEEP: | 24576:WWhDWLiul0CSYpBLLILJ5eF8RgWOwRD/raUD:phWL3SYDIl8SxOyD/bD |
TLSH: | 9435338B8AC4A432FCE20BB135B1A15725FBFD5B293CC50F1B86B5EE6BB26015611713 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8..... |
Icon Hash: | ccb2b131693396cc |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 648FDCF28A095B6DA4C31C9D5CD35A64 |
Thumbprint SHA-1: | 8DAAE716F69B30A0DDC8C8A3F8EAC6C5B328CFD2 |
Thumbprint SHA-256: | 20740B0C498F45830DD1D84EC746DEA5E43C2B0D32C603F2C2403A333CE9E8E7 |
Serial: | 115BBE9E1C286827AF66E7A01390C206 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007FC570ECE14Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007FC570ECDE2Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007FC570ECDE1Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007FC570ECB71Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007FC570ECDAF1h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FC570ECB7A3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FC570ECB71Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x6676 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x106083 | 0x24d0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x6676 | 0x6800 | 57de287294f6740653ced21719294f3e | False | 0.6849834735576923 | data | 6.673508610567193 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x107000 | 0xfd6 | 0x1000 | d90088913738b68d7f0e9767e522f979 | False | 0.568115234375 | data | 5.31940614476939 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x100268 | 0x2045 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0013315579227697 |
RT_ICON | 0x1022b0 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.511899918633035 |
RT_ICON | 0x104918 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.6024590163934426 |
RT_ICON | 0x105a40 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7650709219858156 |
RT_DIALOG | 0x105ea8 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x105fa8 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x1060c4 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x106124 | 0x3e | data | English | United States | 0.8225806451612904 |
RT_VERSION | 0x106164 | 0x23c | data | English | United States | 0.506993006993007 |
RT_MANIFEST | 0x1063a0 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:16:44.459374+0100 | 2058039 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (brendon-sharjen .biz) | 1 | 192.168.2.5 | 60679 | 1.1.1.1 | 53 | UDP |
2024-12-24T02:16:46.004244+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:46.004244+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:46.751394+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:46.751394+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:47.972818+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:47.972818+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:48.753732+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:48.753732+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:50.246840+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49770 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:50.246840+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49770 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:52.376993+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49776 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:52.376993+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49776 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:53.205300+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49776 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:54.520101+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49780 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:54.520101+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49780 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:57.007002+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49785 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:57.007002+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49785 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:59.685908+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49791 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:16:59.685908+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49791 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:17:01.766455+0100 | 2058040 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) | 1 | 192.168.2.5 | 49798 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:17:01.766455+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49798 | 104.21.48.1 | 443 | TCP |
2024-12-24T02:17:02.430612+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49798 | 104.21.48.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 02:16:44.780865908 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:44.780930042 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:44.781042099 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:44.782346010 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:44.782371044 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.003920078 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.004244089 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.005511999 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.005525112 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.005950928 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.047760010 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.051804066 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.051825047 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.051899910 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.751413107 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.751507998 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.751575947 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.753186941 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.753200054 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.753220081 CET | 49759 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.753225088 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.759856939 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.759901047 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:46.759993076 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.760977030 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:46.760992050 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:47.972753048 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:47.972817898 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:47.974591970 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:47.974600077 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:47.974845886 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:47.976717949 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:47.976752043 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:47.976789951 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.753741980 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.753796101 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.753830910 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.753876925 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.753899097 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.753953934 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.753961086 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.759061098 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.759116888 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.759125948 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.767503977 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.767553091 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.767561913 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.775986910 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.776041985 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.776050091 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.829010010 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.873631001 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.922765017 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.922775984 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.942584991 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.942634106 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.942641973 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.942671061 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.942728996 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.942837954 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.942854881 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:48.942871094 CET | 49765 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:48.942878008 CET | 443 | 49765 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:49.032031059 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:49.032089949 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:49.032207966 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:49.033153057 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:49.033170938 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:50.246639013 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:50.246840000 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:50.248490095 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:50.248502016 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:50.248728991 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:50.249994040 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:50.250189066 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:50.250219107 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:51.146164894 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:51.146311998 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:51.146430016 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:51.146516085 CET | 49770 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:51.146532059 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:51.163712025 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:51.163785934 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:51.163906097 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:51.164275885 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:51.164314032 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:52.376882076 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:52.376992941 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:52.378539085 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:52.378556013 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:52.378884077 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:52.380223989 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:52.380402088 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:52.380440950 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:52.380532026 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:52.423346996 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:53.205316067 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:53.205435038 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:53.205504894 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:53.205657959 CET | 49776 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:53.205677986 CET | 443 | 49776 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:53.309669971 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:53.309719086 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:53.309801102 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:53.310444117 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:53.310455084 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:54.519993067 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:54.520101070 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:54.521440983 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:54.521445990 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:54.521678925 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:54.522985935 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:54.523147106 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:54.523166895 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:54.523263931 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:54.523271084 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:55.468038082 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:55.468120098 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:55.468260050 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:55.468502045 CET | 49780 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:55.468513966 CET | 443 | 49780 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:55.794543028 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:55.794584990 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:55.794653893 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:55.795470953 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:55.795490980 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:57.006905079 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:57.007002115 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:57.008599043 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:57.008610964 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:57.008852005 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:57.011338949 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:57.011578083 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:57.011584997 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:58.048671961 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:58.048763037 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:58.048863888 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:58.076699972 CET | 49785 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:58.076744080 CET | 443 | 49785 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:58.476511002 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:58.476562023 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:58.476629972 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:58.476977110 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:58.476994991 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:59.685826063 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:59.685908079 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:59.689080954 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:59.689100027 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:59.689341068 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:16:59.690532923 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:59.690766096 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:16:59.690773964 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:00.553190947 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:00.553282022 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:00.553663969 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:00.553663969 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:00.555365086 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:00.555398941 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:00.555496931 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:00.555757999 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:00.555769920 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:00.860477924 CET | 49791 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:00.860513926 CET | 443 | 49791 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:01.766379118 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:01.766454935 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:01.768094063 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:01.768100977 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:01.768322945 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:01.769845963 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:01.769895077 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:01.769906044 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:02.430588961 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:02.430677891 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:02.430766106 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:02.431058884 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:02.431080103 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Dec 24, 2024 02:17:02.431098938 CET | 49798 | 443 | 192.168.2.5 | 104.21.48.1 |
Dec 24, 2024 02:17:02.431107044 CET | 443 | 49798 | 104.21.48.1 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 02:16:10.193510056 CET | 56964 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 24, 2024 02:16:10.421765089 CET | 53 | 56964 | 1.1.1.1 | 192.168.2.5 |
Dec 24, 2024 02:16:44.459373951 CET | 60679 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 24, 2024 02:16:44.775166035 CET | 53 | 60679 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 02:16:10.193510056 CET | 192.168.2.5 | 1.1.1.1 | 0x4d61 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 02:16:44.459373951 CET | 192.168.2.5 | 1.1.1.1 | 0x1983 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 02:16:10.421765089 CET | 1.1.1.1 | 192.168.2.5 | 0x4d61 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 02:16:44.775166035 CET | 1.1.1.1 | 192.168.2.5 | 0x1983 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:16:44.775166035 CET | 1.1.1.1 | 192.168.2.5 | 0x1983 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:16:44.775166035 CET | 1.1.1.1 | 192.168.2.5 | 0x1983 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:16:44.775166035 CET | 1.1.1.1 | 192.168.2.5 | 0x1983 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:16:44.775166035 CET | 1.1.1.1 | 192.168.2.5 | 0x1983 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:16:44.775166035 CET | 1.1.1.1 | 192.168.2.5 | 0x1983 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:16:44.775166035 CET | 1.1.1.1 | 192.168.2.5 | 0x1983 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49759 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:16:46 UTC | 266 | OUT | |
2024-12-24 01:16:46 UTC | 8 | OUT | |
2024-12-24 01:16:46 UTC | 1125 | IN | |
2024-12-24 01:16:46 UTC | 7 | IN | |
2024-12-24 01:16:46 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49765 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:16:47 UTC | 267 | OUT | |
2024-12-24 01:16:47 UTC | 86 | OUT | |
2024-12-24 01:16:48 UTC | 1127 | IN | |
2024-12-24 01:16:48 UTC | 242 | IN | |
2024-12-24 01:16:48 UTC | 1369 | IN | |
2024-12-24 01:16:48 UTC | 1369 | IN | |
2024-12-24 01:16:48 UTC | 187 | IN | |
2024-12-24 01:16:48 UTC | 1369 | IN | |
2024-12-24 01:16:48 UTC | 1369 | IN | |
2024-12-24 01:16:48 UTC | 1369 | IN | |
2024-12-24 01:16:48 UTC | 1369 | IN | |
2024-12-24 01:16:48 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49770 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:16:50 UTC | 275 | OUT | |
2024-12-24 01:16:50 UTC | 12782 | OUT | |
2024-12-24 01:16:51 UTC | 1131 | IN | |
2024-12-24 01:16:51 UTC | 20 | IN | |
2024-12-24 01:16:51 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49776 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:16:52 UTC | 276 | OUT | |
2024-12-24 01:16:52 UTC | 15030 | OUT | |
2024-12-24 01:16:53 UTC | 1131 | IN | |
2024-12-24 01:16:53 UTC | 20 | IN | |
2024-12-24 01:16:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49780 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:16:54 UTC | 283 | OUT | |
2024-12-24 01:16:54 UTC | 15331 | OUT | |
2024-12-24 01:16:54 UTC | 5231 | OUT | |
2024-12-24 01:16:55 UTC | 1127 | IN | |
2024-12-24 01:16:55 UTC | 20 | IN | |
2024-12-24 01:16:55 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49785 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:16:57 UTC | 274 | OUT | |
2024-12-24 01:16:57 UTC | 1181 | OUT | |
2024-12-24 01:16:58 UTC | 1133 | IN | |
2024-12-24 01:16:58 UTC | 20 | IN | |
2024-12-24 01:16:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49791 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:16:59 UTC | 282 | OUT | |
2024-12-24 01:16:59 UTC | 1117 | OUT | |
2024-12-24 01:17:00 UTC | 1124 | IN | |
2024-12-24 01:17:00 UTC | 20 | IN | |
2024-12-24 01:17:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49798 | 104.21.48.1 | 443 | 6460 | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:01 UTC | 268 | OUT | |
2024-12-24 01:17:01 UTC | 121 | OUT | |
2024-12-24 01:17:02 UTC | 1124 | IN | |
2024-12-24 01:17:02 UTC | 54 | IN | |
2024-12-24 01:17:02 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 20:16:02 |
Start date: | 23/12/2024 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'082'707 bytes |
MD5 hash: | C8E9B3BDD3395C6A3CB2D514865CEF71 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 20:16:03 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 20:16:03 |
Start date: | 23/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 20:16:06 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcc0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 20:16:06 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x570000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 20:16:06 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcc0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 20:16:06 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x570000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 20:16:07 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 20:16:07 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x540000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 20:16:07 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x570000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 11 |
Start time: | 20:16:08 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 20:16:08 |
Start date: | 23/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\491427\Achievements.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcc0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 13 |
Start time: | 20:16:08 |
Start date: | 23/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcb0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 25 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|