Windows
Analysis Report
Loader.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Loader.exe (PID: 380 cmdline:
"C:\Users\ user\Deskt op\Loader. exe" MD5: 245D1F68F4E8CAFFB294D206958761E5) - conhost.exe (PID: 5228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Loader.exe (PID: 504 cmdline:
"C:\Users\ user\Deskt op\Loader. exe" MD5: 245D1F68F4E8CAFFB294D206958761E5)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["talkynicer.lat", "tentabatte.lat", "shapestickyr.lat", "curverpluch.lat", "wordyfindy.lat", "slipperyloo.lat", "bashfulacid.lat", "volcanohushe.click", "manyrestro.lat"], "Build id": "pqZnKP--Z2xsZXhl"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 4 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:17:04.845791+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49708 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:07.080105+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49709 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:09.470936+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49710 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:12.305800+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49712 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:15.429568+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49723 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:18.748829+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49730 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:21.891648+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49743 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:26.564441+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49754 | 172.67.145.201 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:17:05.854185+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49708 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:07.871102+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49709 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:27.334990+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49754 | 172.67.145.201 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:17:05.854185+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49708 | 172.67.145.201 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:17:07.871102+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49709 | 172.67.145.201 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:17:19.521214+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49730 | 172.67.145.201 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_00417745 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00ED0CF8 | |
Source: | Code function: | 0_2_00ED0DA9 | |
Source: | Code function: | 3_2_00ED0CF8 | |
Source: | Code function: | 3_2_00ED0DA9 |
Source: | Code function: | 3_2_0042D0CD | |
Source: | Code function: | 3_2_0040D11B | |
Source: | Code function: | 3_2_0040D11B | |
Source: | Code function: | 3_2_00409400 | |
Source: | Code function: | 3_2_0043D4E1 | |
Source: | Code function: | 3_2_00417745 | |
Source: | Code function: | 3_2_00440770 | |
Source: | Code function: | 3_2_004387D0 | |
Source: | Code function: | 3_2_00429070 | |
Source: | Code function: | 3_2_00429070 | |
Source: | Code function: | 3_2_004058D0 | |
Source: | Code function: | 3_2_004058D0 | |
Source: | Code function: | 3_2_004158FC | |
Source: | Code function: | 3_2_00416896 | |
Source: | Code function: | 3_2_0042C89E | |
Source: | Code function: | 3_2_0042B8BD | |
Source: | Code function: | 3_2_0042B963 | |
Source: | Code function: | 3_2_0040D907 | |
Source: | Code function: | 3_2_00440180 | |
Source: | Code function: | 3_2_0041598C | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_0041B9A0 | |
Source: | Code function: | 3_2_0041B25A | |
Source: | Code function: | 3_2_00417A75 | |
Source: | Code function: | 3_2_00417207 | |
Source: | Code function: | 3_2_0042B215 | |
Source: | Code function: | 3_2_0043F286 | |
Source: | Code function: | 3_2_004142A0 | |
Source: | Code function: | 3_2_004142A0 | |
Source: | Code function: | 3_2_004142A0 | |
Source: | Code function: | 3_2_004142A0 | |
Source: | Code function: | 3_2_00417AB8 | |
Source: | Code function: | 3_2_0042BB60 | |
Source: | Code function: | 3_2_0042BB66 | |
Source: | Code function: | 3_2_00402B70 | |
Source: | Code function: | 3_2_00421B00 | |
Source: | Code function: | 3_2_00421B00 | |
Source: | Code function: | 3_2_0043DB10 | |
Source: | Code function: | 3_2_0043D325 | |
Source: | Code function: | 3_2_004163C0 | |
Source: | Code function: | 3_2_004163C0 | |
Source: | Code function: | 3_2_004163C0 | |
Source: | Code function: | 3_2_004393D0 | |
Source: | Code function: | 3_2_004393D0 | |
Source: | Code function: | 3_2_004073F0 | |
Source: | Code function: | 3_2_004073F0 | |
Source: | Code function: | 3_2_0041A3A0 | |
Source: | Code function: | 3_2_0040B3BB | |
Source: | Code function: | 3_2_0043E450 | |
Source: | Code function: | 3_2_00440450 | |
Source: | Code function: | 3_2_00426430 | |
Source: | Code function: | 3_2_0040E49F | |
Source: | Code function: | 3_2_0040C4AE | |
Source: | Code function: | 3_2_0042856C | |
Source: | Code function: | 3_2_00415506 | |
Source: | Code function: | 3_2_00415506 | |
Source: | Code function: | 3_2_00418DC5 | |
Source: | Code function: | 3_2_0041D5B0 | |
Source: | Code function: | 3_2_0041864E | |
Source: | Code function: | 3_2_00428630 | |
Source: | Code function: | 3_2_00426639 | |
Source: | Code function: | 3_2_00426639 | |
Source: | Code function: | 3_2_0042963E | |
Source: | Code function: | 3_2_00417EEE | |
Source: | Code function: | 3_2_00417EEE | |
Source: | Code function: | 3_2_00429E80 | |
Source: | Code function: | 3_2_00415E9A | |
Source: | Code function: | 3_2_00415E9A | |
Source: | Code function: | 3_2_00415E9A | |
Source: | Code function: | 3_2_00415E9A | |
Source: | Code function: | 3_2_00415E9A | |
Source: | Code function: | 3_2_00415E9A | |
Source: | Code function: | 3_2_0043CEA0 | |
Source: | Code function: | 3_2_00409EB9 | |
Source: | Code function: | 3_2_00418F52 | |
Source: | Code function: | 3_2_00435F00 | |
Source: | Code function: | 3_2_0042963E | |
Source: | Code function: | 3_2_0040AF23 | |
Source: | Code function: | 3_2_0043F730 | |
Source: | Code function: | 3_2_004167E1 | |
Source: | Code function: | 3_2_00424F80 | |
Source: | Code function: | 3_2_004257AC |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_00433500 |
Source: | Code function: | 3_2_031B1000 |
Source: | Code function: | 3_2_00433500 |
Source: | Code function: | 0_2_00EBE094 | |
Source: | Code function: | 0_2_00EB1000 | |
Source: | Code function: | 0_2_00ED6102 | |
Source: | Code function: | 0_2_00EC2AA1 | |
Source: | Code function: | 0_2_00ED43FF | |
Source: | Code function: | 0_2_00EC8D90 | |
Source: | Code function: | 0_2_00EC3EA0 | |
Source: | Code function: | 3_2_004098CE | |
Source: | Code function: | 3_2_004230D3 | |
Source: | Code function: | 3_2_00426090 | |
Source: | Code function: | 3_2_0042217D | |
Source: | Code function: | 3_2_0040D11B | |
Source: | Code function: | 3_2_0042C98C | |
Source: | Code function: | 3_2_00411BC0 | |
Source: | Code function: | 3_2_0043DBAC | |
Source: | Code function: | 3_2_00409400 | |
Source: | Code function: | 3_2_004384B0 | |
Source: | Code function: | 3_2_0041052C | |
Source: | Code function: | 3_2_0043FEF0 | |
Source: | Code function: | 3_2_00440770 | |
Source: | Code function: | 3_2_004387D0 | |
Source: | Code function: | 3_2_00429070 | |
Source: | Code function: | 3_2_00409000 | |
Source: | Code function: | 3_2_00428000 | |
Source: | Code function: | 3_2_0041C0C0 | |
Source: | Code function: | 3_2_004058D0 | |
Source: | Code function: | 3_2_004038D0 | |
Source: | Code function: | 3_2_00423750 | |
Source: | Code function: | 3_2_0043E8A7 | |
Source: | Code function: | 3_2_0042A950 | |
Source: | Code function: | 3_2_0041C920 | |
Source: | Code function: | 3_2_004301D5 | |
Source: | Code function: | 3_2_004239E0 | |
Source: | Code function: | 3_2_004391E1 | |
Source: | Code function: | 3_2_00408180 | |
Source: | Code function: | 3_2_00406180 | |
Source: | Code function: | 3_2_00440180 | |
Source: | Code function: | 3_2_0041E990 | |
Source: | Code function: | 3_2_0041A190 | |
Source: | Code function: | 3_2_00419190 | |
Source: | Code function: | 3_2_0041B9A0 | |
Source: | Code function: | 3_2_00418241 | |
Source: | Code function: | 3_2_0041FA74 | |
Source: | Code function: | 3_2_00430A78 | |
Source: | Code function: | 3_2_00417207 | |
Source: | Code function: | 3_2_00433210 | |
Source: | Code function: | 3_2_00428A31 | |
Source: | Code function: | 3_2_00415A3C | |
Source: | Code function: | 3_2_0042C2C1 | |
Source: | Code function: | 3_2_00404280 | |
Source: | Code function: | 3_2_004142A0 | |
Source: | Code function: | 3_2_00417AB8 | |
Source: | Code function: | 3_2_00423B40 | |
Source: | Code function: | 3_2_0041D350 | |
Source: | Code function: | 3_2_00421B00 | |
Source: | Code function: | 3_2_0042D306 | |
Source: | Code function: | 3_2_004163C0 | |
Source: | Code function: | 3_2_004393D0 | |
Source: | Code function: | 3_2_004383D0 | |
Source: | Code function: | 3_2_004073F0 | |
Source: | Code function: | 3_2_0042D3F1 | |
Source: | Code function: | 3_2_00425380 | |
Source: | Code function: | 3_2_0043F380 | |
Source: | Code function: | 3_2_00422B84 | |
Source: | Code function: | 3_2_0041CB90 | |
Source: | Code function: | 3_2_0042D391 | |
Source: | Code function: | 3_2_00422BA0 | |
Source: | Code function: | 3_2_00404BB0 | |
Source: | Code function: | 3_2_00440450 | |
Source: | Code function: | 3_2_0042B46E | |
Source: | Code function: | 3_2_00436C7D | |
Source: | Code function: | 3_2_00426430 | |
Source: | Code function: | 3_2_0042B435 | |
Source: | Code function: | 3_2_00418CE1 | |
Source: | Code function: | 3_2_00439C8E | |
Source: | Code function: | 3_2_0043F490 | |
Source: | Code function: | 3_2_0040CC99 | |
Source: | Code function: | 3_2_0040E49F | |
Source: | Code function: | 3_2_004374A3 | |
Source: | Code function: | 3_2_00427D52 | |
Source: | Code function: | 3_2_0042856C | |
Source: | Code function: | 3_2_00415506 | |
Source: | Code function: | 3_2_00427527 | |
Source: | Code function: | 3_2_0043EDCE | |
Source: | Code function: | 3_2_0043F5E0 | |
Source: | Code function: | 3_2_00437D80 | |
Source: | Code function: | 3_2_0041D5B0 | |
Source: | Code function: | 3_2_00406610 | |
Source: | Code function: | 3_2_0042E617 | |
Source: | Code function: | 3_2_00405E20 | |
Source: | Code function: | 3_2_00427E22 | |
Source: | Code function: | 3_2_00428630 | |
Source: | Code function: | 3_2_00430637 | |
Source: | Code function: | 3_2_00426639 | |
Source: | Code function: | 3_2_00402ED0 | |
Source: | Code function: | 3_2_00417EEE | |
Source: | Code function: | 3_2_0043F690 | |
Source: | Code function: | 3_2_00415E9A | |
Source: | Code function: | 3_2_00414EA0 | |
Source: | Code function: | 3_2_0040F6AA | |
Source: | Code function: | 3_2_0042774C | |
Source: | Code function: | 3_2_00423750 | |
Source: | Code function: | 3_2_00421770 | |
Source: | Code function: | 3_2_0040AF23 | |
Source: | Code function: | 3_2_0043F730 | |
Source: | Code function: | 3_2_0043C730 | |
Source: | Code function: | 3_2_00410FC8 | |
Source: | Code function: | 3_2_00426FD0 | |
Source: | Code function: | 3_2_00437FE0 | |
Source: | Code function: | 3_2_0040A780 | |
Source: | Code function: | 3_2_0041CFA0 | |
Source: | Code function: | 3_2_004257AC | |
Source: | Code function: | 3_2_00EBE094 | |
Source: | Code function: | 3_2_00EB1000 | |
Source: | Code function: | 3_2_00ED6102 | |
Source: | Code function: | 3_2_00EC2AA1 | |
Source: | Code function: | 3_2_00ED43FF | |
Source: | Code function: | 3_2_00EC8D90 | |
Source: | Code function: | 3_2_00EC3EA0 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_004387D0 |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Code function: | 0_2_00EE8236 | |
Source: | Code function: | 0_2_00EBE76D | |
Source: | Code function: | 3_2_004488E3 | |
Source: | Code function: | 3_2_0043F2F2 | |
Source: | Code function: | 3_2_00EBE76D |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00ED0CF8 | |
Source: | Code function: | 0_2_00ED0DA9 | |
Source: | Code function: | 3_2_00ED0CF8 | |
Source: | Code function: | 3_2_00ED0DA9 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_3-33389 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 3_2_0043DA10 |
Source: | Code function: | 0_2_00EC72FD |
Source: | Code function: | 0_2_00EE619E | |
Source: | Code function: | 0_2_00EB1690 | |
Source: | Code function: | 3_2_00EB1690 |
Source: | Code function: | 0_2_00ECC705 |
Source: | Code function: | 0_2_00EBE06C | |
Source: | Code function: | 0_2_00EC72FD | |
Source: | Code function: | 0_2_00EBE42C | |
Source: | Code function: | 0_2_00EBE420 | |
Source: | Code function: | 3_2_00EBE06C | |
Source: | Code function: | 3_2_00EC72FD | |
Source: | Code function: | 3_2_00EBE42C | |
Source: | Code function: | 3_2_00EBE420 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00EE619E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00ED08CD | |
Source: | Code function: | 0_2_00ED0062 | |
Source: | Code function: | 0_2_00ED02B3 | |
Source: | Code function: | 0_2_00ECBA4C | |
Source: | Code function: | 0_2_00ED034E | |
Source: | Code function: | 0_2_00ED05A1 | |
Source: | Code function: | 0_2_00ED06D5 | |
Source: | Code function: | 0_2_00ED0600 | |
Source: | Code function: | 0_2_00ECBFF0 | |
Source: | Code function: | 0_2_00ED07C7 | |
Source: | Code function: | 0_2_00ED0720 | |
Source: | Code function: | 3_2_00ED08CD | |
Source: | Code function: | 3_2_00ED0062 | |
Source: | Code function: | 3_2_00ED02B3 | |
Source: | Code function: | 3_2_00ECBA4C | |
Source: | Code function: | 3_2_00ED034E | |
Source: | Code function: | 3_2_00ED05A1 | |
Source: | Code function: | 3_2_00ED06D5 | |
Source: | Code function: | 3_2_00ED0600 | |
Source: | Code function: | 3_2_00ECBFF0 | |
Source: | Code function: | 3_2_00ED07C7 | |
Source: | Code function: | 3_2_00ED0720 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00EBEB50 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 241 Security Software Discovery | SMB/Windows Admin Shares | 3 Clipboard Data | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 21 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 11 File and Directory Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 33 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
37% | ReversingLabs | Win32.Trojan.Generic | ||
32% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
volcanohushe.click | 172.67.145.201 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.145.201 | volcanohushe.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580145 |
Start date and time: | 2024-12-24 02:16:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Loader.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/1@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
20:17:05 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.145.201 | Get hash | malicious | Captcha Phish | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
volcanohushe.click | Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Process: | C:\Users\user\Desktop\Loader.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15 |
Entropy (8bit): | 3.906890595608518 |
Encrypted: | false |
SSDEEP: | 3:SXhRi75n:SC5 |
MD5: | 3A33AF4BC7DC9699EE324B91553C2B46 |
SHA1: | 4CCE2BF1011CA006FAAB23506A349173ACC40434 |
SHA-256: | 226D20C16ED4D8DDDFD00870E83E3B6EEDEDB86704A7BF43B5826B71D61500AE |
SHA-512: | 960194C8B60C086520D1A76B94F52BA88AC2DDEC76A18B2D7ABF758FFFF138E9EDD23E62D4375A34072B42FBA51C6D186554B1AA71D60835EF1E18BEB8873B1D |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.614610454522393 |
TrID: |
|
File name: | Loader.exe |
File size: | 540'160 bytes |
MD5: | 245d1f68f4e8caffb294d206958761e5 |
SHA1: | d80d3805309b53632aabb56a1a3284c1e8ba6c26 |
SHA256: | 397c3c9ce2aff57799b4620f05103733cc2489f91df6da545b5c1e5ac4350ebb |
SHA512: | 973fa8759e30a9718518f6d106fb147b35f7c56c40c2092aa860d67a7a82dfd1b2f11cd45d929652e86498dfcc7e01e3a8726c0af513cc6cbf392cc98519612c |
SSDEEP: | 12288:luB9du8NOZx84E5YoS7OJlnDYrPLPJgu4dgT6lYDfAmy/yqv/kheLk:u9du88Zx8VAeDgPLxZ4GO+y4heQ |
TLSH: | 13B4E011B580C072DC63147798B6EBAA863EF9200F22AADFA7940D7ADF352D19731717 |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...WZig..........".................R.............@.......................................@.................................dH..<.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40ef52 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67695A57 [Mon Dec 23 12:40:55 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 5cc7e689f2864a0a9a8589c00efad8df |
Instruction |
---|
call 00007FF9E4BC8A0Ah |
jmp 00007FF9E4BC8879h |
mov ecx, dword ptr [00436840h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007FF9E4BC8A06h |
test esi, ecx |
jne 00007FF9E4BC8A28h |
call 00007FF9E4BC8A31h |
mov ecx, eax |
cmp ecx, edi |
jne 00007FF9E4BC8A09h |
mov ecx, BB40E64Fh |
jmp 00007FF9E4BC8A10h |
test esi, ecx |
jne 00007FF9E4BC8A0Ch |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [00436840h], ecx |
not ecx |
pop edi |
mov dword ptr [00436880h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [00434AC4h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [00434A78h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [00434A74h] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [00434B0Ch] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00437E18h |
call dword ptr [00434AE4h] |
ret |
mov al, 01h |
ret |
push 00030000h |
push 00010000h |
push 00000000h |
call 00007FF9E4BD01EBh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x34864 | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x3a000 | 0x1d70 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x30d08 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x2d008 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x34a0c | 0x16c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2a52b | 0x2a600 | ca7697ad91eaacd837ed51179759a947 | False | 0.5367809734513275 | data | 6.539348053061756 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2c000 | 0x9d7c | 0x9e00 | 964f1e27d13bf05fbdae349f651c8112 | False | 0.4288221914556962 | data | 4.95389314063731 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x36000 | 0x25e4 | 0x1600 | f9cffcfbe2a982ed0d73caf2c5c26405 | False | 0.40678267045454547 | data | 4.770466622070642 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x39000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x3a000 | 0x1d70 | 0x1e00 | 050a442cf25b388dea29342e31853d9f | False | 0.7709635416666667 | data | 6.524650010128688 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0x3c000 | 0x4be00 | 0x4be00 | e6f22ba3cc87ac612cb16657017e76f9 | False | 1.0003249845551894 | data | 7.999371959704677 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
USER32.dll | DefWindowProcW |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:17:04.845791+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49708 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:05.854185+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49708 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:05.854185+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49708 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:07.080105+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49709 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:07.871102+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49709 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:07.871102+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49709 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:09.470936+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49710 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:12.305800+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49712 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:15.429568+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49723 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:18.748829+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49730 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:19.521214+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49730 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:21.891648+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49743 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:26.564441+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49754 | 172.67.145.201 | 443 | TCP |
2024-12-24T02:17:27.334990+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49754 | 172.67.145.201 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 02:17:03.621469975 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:03.621511936 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:03.621583939 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:03.625793934 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:03.625809908 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:04.845710993 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:04.845791101 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:04.909502983 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:04.909523964 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:04.909878969 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:04.957793951 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.081316948 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.081316948 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.081433058 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:05.854080915 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:05.854187965 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:05.854253054 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.856393099 CET | 49708 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.856406927 CET | 443 | 49708 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:05.866286039 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.866311073 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:05.866391897 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.866713047 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:05.866729021 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.079993010 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.080105066 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.081573009 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.081589937 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.081918955 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.086178064 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.086205006 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.086276054 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.871071100 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.871130943 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.871253967 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.871345997 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.871809006 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.871860027 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.871879101 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.873501062 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.873557091 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.873572111 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.879357100 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.879421949 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.879436016 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.887686014 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.887754917 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.887770891 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.943764925 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.943804979 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:07.989041090 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:07.991450071 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.035926104 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.063085079 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.066898108 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.066950083 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.066972971 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.067027092 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.067091942 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.067508936 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.067529917 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.067558050 CET | 49709 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.067573071 CET | 443 | 49709 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.257098913 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.257142067 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:08.257227898 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.257570982 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:08.257580996 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:09.470782042 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:09.470936060 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:09.472242117 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:09.472249031 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:09.472562075 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:09.478351116 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:09.478506088 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:09.478533983 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:10.543795109 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:10.543889046 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:10.543939114 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:10.558837891 CET | 49710 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:10.558851957 CET | 443 | 49710 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:11.091346025 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:11.091399908 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:11.091481924 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:11.091866016 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:11.091883898 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:12.305706978 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:12.305799961 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:12.307281971 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:12.307291985 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:12.307534933 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:12.312709093 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:12.312884092 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:12.312927961 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:12.313000917 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:12.355340004 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:13.544833899 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:13.544944048 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:13.544994116 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:13.546232939 CET | 49712 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:13.546250105 CET | 443 | 49712 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:14.213356972 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:14.213399887 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:14.213489056 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:14.213891983 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:14.213901043 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:15.429491997 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:15.429568052 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:15.430779934 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:15.430788040 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:15.431036949 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:15.432377100 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:15.432560921 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:15.432590008 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:15.432653904 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:15.432662964 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:16.397047997 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:16.397178888 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:16.397255898 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:16.422259092 CET | 49723 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:16.422307014 CET | 443 | 49723 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:17.534132004 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:17.534174919 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:17.534243107 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:17.534568071 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:17.534579992 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:18.748744965 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:18.748828888 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:18.750593901 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:18.750602961 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:18.750850916 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:18.752547979 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:18.752631903 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:18.752636909 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:19.521193027 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:19.521296024 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:19.521373987 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:19.618077993 CET | 49730 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:19.618114948 CET | 443 | 49730 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:20.660115004 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:20.660162926 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:20.660300016 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:20.660670996 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:20.660687923 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.891585112 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.891648054 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.893668890 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.893678904 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.893909931 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.905814886 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.906673908 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.906719923 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.906917095 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.906950951 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.907077074 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.907125950 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.907258034 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.907293081 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.907413960 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.907453060 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.907589912 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.907644987 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.907655001 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.907665014 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.907835007 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.907864094 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.907882929 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.908013105 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.908049107 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.951360941 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.951531887 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.951576948 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.951602936 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.951620102 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.951647043 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.951657057 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:21.951682091 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:21.951698065 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:25.319788933 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:25.319916964 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:25.319989920 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:25.321907997 CET | 49743 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:25.321943045 CET | 443 | 49743 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:25.348287106 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:25.348339081 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:25.348407984 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:25.348864079 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:25.348879099 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:26.564300060 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:26.564440966 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:26.568228960 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:26.568236113 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:26.568559885 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:26.577100039 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:26.577132940 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:26.577197075 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.334988117 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.335495949 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.335530043 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.335576057 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.335608959 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.335659981 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.336066008 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.343342066 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.343414068 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.343422890 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.358155966 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.358227968 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.358256102 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.410967112 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.410990000 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.454659939 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.454746008 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.454811096 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.455106974 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.455121040 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Dec 24, 2024 02:17:27.455158949 CET | 49754 | 443 | 192.168.2.6 | 172.67.145.201 |
Dec 24, 2024 02:17:27.455164909 CET | 443 | 49754 | 172.67.145.201 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 02:17:03.262599945 CET | 60370 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 02:17:03.581610918 CET | 53 | 60370 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 02:17:03.262599945 CET | 192.168.2.6 | 1.1.1.1 | 0xff17 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 02:17:03.581610918 CET | 1.1.1.1 | 192.168.2.6 | 0xff17 | No error (0) | 172.67.145.201 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:17:03.581610918 CET | 1.1.1.1 | 192.168.2.6 | 0xff17 | No error (0) | 104.21.71.155 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49708 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:05 UTC | 265 | OUT | |
2024-12-24 01:17:05 UTC | 8 | OUT | |
2024-12-24 01:17:05 UTC | 1130 | IN | |
2024-12-24 01:17:05 UTC | 7 | IN | |
2024-12-24 01:17:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49709 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:07 UTC | 266 | OUT | |
2024-12-24 01:17:07 UTC | 50 | OUT | |
2024-12-24 01:17:07 UTC | 1124 | IN | |
2024-12-24 01:17:07 UTC | 245 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN | |
2024-12-24 01:17:07 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49710 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:09 UTC | 276 | OUT | |
2024-12-24 01:17:09 UTC | 12814 | OUT | |
2024-12-24 01:17:10 UTC | 1134 | IN | |
2024-12-24 01:17:10 UTC | 20 | IN | |
2024-12-24 01:17:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49712 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:12 UTC | 280 | OUT | |
2024-12-24 01:17:12 UTC | 15084 | OUT | |
2024-12-24 01:17:13 UTC | 1134 | IN | |
2024-12-24 01:17:13 UTC | 20 | IN | |
2024-12-24 01:17:13 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49723 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:15 UTC | 275 | OUT | |
2024-12-24 01:17:15 UTC | 15331 | OUT | |
2024-12-24 01:17:15 UTC | 4581 | OUT | |
2024-12-24 01:17:16 UTC | 1126 | IN | |
2024-12-24 01:17:16 UTC | 20 | IN | |
2024-12-24 01:17:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49730 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:18 UTC | 282 | OUT | |
2024-12-24 01:17:18 UTC | 1231 | OUT | |
2024-12-24 01:17:19 UTC | 1126 | IN | |
2024-12-24 01:17:19 UTC | 20 | IN | |
2024-12-24 01:17:19 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49743 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:21 UTC | 284 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:21 UTC | 15331 | OUT | |
2024-12-24 01:17:25 UTC | 1131 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49754 | 172.67.145.201 | 443 | 504 | C:\Users\user\Desktop\Loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:17:26 UTC | 266 | OUT | |
2024-12-24 01:17:26 UTC | 85 | OUT | |
2024-12-24 01:17:27 UTC | 1129 | IN | |
2024-12-24 01:17:27 UTC | 240 | IN | |
2024-12-24 01:17:27 UTC | 1369 | IN | |
2024-12-24 01:17:27 UTC | 1369 | IN | |
2024-12-24 01:17:27 UTC | 83 | IN | |
2024-12-24 01:17:27 UTC | 1369 | IN | |
2024-12-24 01:17:27 UTC | 1369 | IN | |
2024-12-24 01:17:27 UTC | 1369 | IN | |
2024-12-24 01:17:27 UTC | 1369 | IN | |
2024-12-24 01:17:27 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 20:17:02 |
Start date: | 23/12/2024 |
Path: | C:\Users\user\Desktop\Loader.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xeb0000 |
File size: | 540'160 bytes |
MD5 hash: | 245D1F68F4E8CAFFB294D206958761E5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 20:17:02 |
Start date: | 23/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 20:17:02 |
Start date: | 23/12/2024 |
Path: | C:\Users\user\Desktop\Loader.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xeb0000 |
File size: | 540'160 bytes |
MD5 hash: | 245D1F68F4E8CAFFB294D206958761E5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 10% |
Dynamic/Decrypted Code Coverage: | 0.4% |
Signature Coverage: | 1.2% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 32 |
Graph
Function 00EE619E Relevance: 42.3, APIs: 10, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECBD42 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1860 Relevance: 9.2, APIs: 6, Instructions: 162fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1700 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 81memoryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC481D Relevance: 4.6, APIs: 3, Instructions: 51threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC49B3 Relevance: 4.5, APIs: 3, Instructions: 30threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECC862 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC4935 Relevance: 3.0, APIs: 2, Instructions: 38threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1B70 Relevance: 3.0, APIs: 2, Instructions: 28COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECAD27 Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1EA0 Relevance: 1.8, APIs: 1, Instructions: 289COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBCE13 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECAD61 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0062 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 182COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED07C7 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0DA9 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBE42C Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED034E Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBE094 Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0CF8 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC3EA0 Relevance: 1.6, Strings: 1, Instructions: 333COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0600 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC2AA1 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0720 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED08CD Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBE420 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECC705 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1000 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1690 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECDC7B Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBEB1C Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED8A9C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECA3BC Relevance: 9.1, APIs: 2, Strings: 3, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC4A89 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECC516 Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBE8E7 Relevance: 7.6, APIs: 5, Instructions: 116threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECF766 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED52C1 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0B86 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC1652 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED1F7C Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB2A60 Relevance: 6.1, APIs: 4, Instructions: 53threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBEFA7 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECA7E0 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECA04C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 5.3% |
Dynamic/Decrypted Code Coverage: | 7.1% |
Signature Coverage: | 33.6% |
Total number of Nodes: | 238 |
Total number of Limit Nodes: | 18 |
Graph
Function 00411BC0 Relevance: 143.9, APIs: 3, Strings: 78, Instructions: 2186COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004387D0 Relevance: 32.3, APIs: 11, Strings: 7, Instructions: 776memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031B1000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409400 Relevance: 7.9, Strings: 6, Instructions: 366COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417745 Relevance: 1.8, APIs: 1, Instructions: 250COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440770 Relevance: 1.5, Strings: 1, Instructions: 297COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DA10 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D11B Relevance: 1.4, Strings: 1, Instructions: 195COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D0CD Relevance: .2, Instructions: 153COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D4E1 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004085B0 Relevance: 7.6, APIs: 5, Instructions: 87threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CAD6 Relevance: 3.1, APIs: 2, Instructions: 120COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E9A1 Relevance: 3.0, APIs: 2, Instructions: 16COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BD74 Relevance: 1.6, APIs: 1, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D990 Relevance: 1.5, APIs: 1, Instructions: 47memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432919 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E1EE Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CC67 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BD40 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BD20 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433500 Relevance: 21.1, APIs: 6, Strings: 6, Instructions: 121clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0062 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 182COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042856C Relevance: 9.3, Strings: 7, Instructions: 519COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428630 Relevance: 9.3, Strings: 7, Instructions: 514COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004257AC Relevance: 9.3, Strings: 7, Instructions: 503COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426430 Relevance: 9.1, Strings: 7, Instructions: 396COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED07C7 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D5B0 Relevance: 8.5, Strings: 6, Instructions: 1030COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B9A0 Relevance: 6.8, Strings: 5, Instructions: 597COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0DA9 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBE42C Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417207 Relevance: 5.4, Strings: 4, Instructions: 423COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415506 Relevance: 4.1, Strings: 3, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A3A0 Relevance: 3.9, Strings: 3, Instructions: 173COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042963E Relevance: 3.9, Strings: 3, Instructions: 150COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426639 Relevance: 3.1, Strings: 2, Instructions: 613COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E49F Relevance: 2.8, Strings: 2, Instructions: 259COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004142A0 Relevance: 2.4, Strings: 1, Instructions: 1107COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415E9A Relevance: 1.7, Strings: 1, Instructions: 496COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004393D0 Relevance: 1.7, Strings: 1, Instructions: 454COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421B00 Relevance: 1.7, Strings: 1, Instructions: 440COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417AB8 Relevance: 1.6, Strings: 1, Instructions: 330COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440450 Relevance: 1.5, Strings: 1, Instructions: 295COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B8BD Relevance: 1.4, Strings: 1, Instructions: 198COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B963 Relevance: 1.4, Strings: 1, Instructions: 170COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BB66 Relevance: 1.4, Strings: 1, Instructions: 156COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B25A Relevance: 1.4, Strings: 1, Instructions: 153COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BB60 Relevance: 1.4, Strings: 1, Instructions: 140COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C4AE Relevance: 1.3, Strings: 1, Instructions: 63COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041864E Relevance: 1.3, Strings: 1, Instructions: 57COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E450 Relevance: 1.3, Strings: 1, Instructions: 36COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409EB9 Relevance: 1.3, Strings: 1, Instructions: 31COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DB10 Relevance: 1.3, Strings: 1, Instructions: 26COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004073F0 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F730 Relevance: .6, Instructions: 579COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004058D0 Relevance: .4, Instructions: 449COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004163C0 Relevance: .4, Instructions: 395COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440180 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CEA0 Relevance: .2, Instructions: 214COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B215 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AF23 Relevance: .2, Instructions: 187COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D907 Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418DC5 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418F52 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D325 Relevance: .1, Instructions: 106COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004167E1 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416896 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041598C Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435F00 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429E80 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C89E Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004158FC Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B70 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B3BB Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F286 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417A75 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424F80 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043234E Relevance: 75.4, APIs: 1, Strings: 42, Instructions: 161memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432019 Relevance: 75.4, APIs: 1, Strings: 42, Instructions: 159memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECDC7B Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECBD42 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBEB1C Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED8A9C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECA3BC Relevance: 9.1, APIs: 2, Strings: 3, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC4A89 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECC516 Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1860 Relevance: 7.7, APIs: 5, Instructions: 162COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBE8E7 Relevance: 7.6, APIs: 5, Instructions: 116threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECF766 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED52C1 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED0B86 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EC1652 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ED1F7C Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB2A60 Relevance: 6.1, APIs: 4, Instructions: 53threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBEFA7 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECA7E0 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECA04C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|