Windows
Analysis Report
eMBO6wS1b5.exe
Overview
General Information
Sample name: | eMBO6wS1b5.exerenamed because original name is a hash value |
Original sample name: | 73565a0bcdcb7ff5f9ce005a2530e215.exe |
Analysis ID: | 1580261 |
MD5: | 73565a0bcdcb7ff5f9ce005a2530e215 |
SHA1: | d5b3f48caa2b3c5bd9258cc3f8ce7b41c3d5b22b |
SHA256: | 0da872d62bc25e38d6eac1f6d2f35f8301dfa06087cc68c50ea93f326f934b8c |
Tags: | exeLummaStealeruser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- eMBO6wS1b5.exe (PID: 5432 cmdline:
"C:\Users\ user\Deskt op\eMBO6wS 1b5.exe" MD5: 73565A0BCDCB7FF5F9CE005A2530E215) - cmd.exe (PID: 3064 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Le u Leu.cmd & Leu.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3384 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 3200 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 504 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 2836 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6888 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 416 cmdline:
cmd /c md 801291 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 380 cmdline:
extrac32 / Y /E Array MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 828 cmdline:
findstr /V "Serve" L td MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 2192 cmdline:
cmd /c cop y /b ..\Bu mper + ..\ Specialist + ..\Bind + ..\Inte nded + ..\ Francisco + ..\Recen t f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Historic.com (PID: 6716 cmdline:
Historic.c om f MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 5192 cmdline:
powershell -exec byp ass error code: 523 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3916 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 716 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:18:44.441343+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49800 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:46.528423+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49804 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:48.858808+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49816 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:51.034060+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49823 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:53.265297+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49829 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:55.689052+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49835 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:57.676428+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49841 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:00.437287+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49847 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:04.035566+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49859 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:06.653357+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49865 | 172.67.169.205 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:18:45.185987+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49800 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:47.296491+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49804 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:05.111929+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49859 | 104.21.18.185 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:18:45.185987+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49800 | 104.21.18.185 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:18:47.296491+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49804 | 104.21.18.185 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:18:49.805687+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49816 | 104.21.18.185 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_00406301 | |
Source: | Code function: | 1_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 1_2_004050F9 |
Source: | Code function: | 1_2_004044D1 |
Source: | Code function: | 1_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 1_2_0040737E | |
Source: | Code function: | 1_2_00406EFE | |
Source: | Code function: | 1_2_004079A2 | |
Source: | Code function: | 1_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 1_2_004044D1 |
Source: | Code function: | 1_2_004024FB |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_00406328 |
Source: | Static PE information: |
Source: | Code function: | 28_2_02CA0C32 | |
Source: | Code function: | 28_2_07493221 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 1_2_00406301 | |
Source: | Code function: | 1_2_00406CC7 |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 1_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 1_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 11 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 121 Virtualization/Sandbox Evasion | 11 Input Capture | 3 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 121 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | 1 Clipboard Data | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 2 Obfuscated Files or Information | LSA Secrets | 13 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 15 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | ReversingLabs | |||
20% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
beefshooti.click | 104.21.18.185 | true | true | unknown | |
neqi.shop | 172.67.169.205 | true | false | high | |
ax-0001.ax-msedge.net | 150.171.27.10 | true | false | high | |
jIjmPxXivVpjpLDcixRH.jIjmPxXivVpjpLDcixRH | unknown | unknown | false | unknown | |
klipcatepiu0.shop | unknown | unknown | false | high | |
tse1.mm.bing.net | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.18.185 | beefshooti.click | United States | 13335 | CLOUDFLARENETUS | true | |
172.67.169.205 | neqi.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580261 |
Start date and time: | 2024-12-24 08:17:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 3s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 32 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | eMBO6wS1b5.exerenamed because original name is a hash value |
Original Sample Name: | 73565a0bcdcb7ff5f9ce005a2530e215.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@27/26@5/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 2.16.158.83, 2.16.158.80, 2.16.158.91, 2.16.158.75, 2.16.158.90, 2.16.158.96, 2.16.158.82, 2.16.158.169, 2.16.158.170, 2.16.158.176, 2.16.158.187, 2.16.158.35, 2.16.158.40, 2.16.158.186, 2.16.158.179, 2.16.158.27, 2.16.158.184, 2.16.158.33, 2.16.158.74, 2.16.158.56, 2.16.158.72, 2.16.158.51, 2.16.158.43, 23.218.208.109, 20.190.177.23, 20.103.156.88, 13.107.246.63, 172.202.163.200, 150.171.28.10
- Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, g.bing.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, www-www.bing.com.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, mm-mm.bing.net.trafficmanager.net, login.live.com, e16604.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net
- Execution Graph export aborted for target powershell.exe, PID 5192 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
02:18:03 | API Interceptor | |
02:18:11 | API Interceptor | |
02:19:10 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.18.185 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Unknown | Browse | |||
172.67.169.205 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ax-0001.ax-msedge.net | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | UltraVNC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Socks5Systemz | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
beefshooti.click | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
neqi.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Abobus Obfuscator, Braodo | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Abobus Obfuscator, Braodo | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\801291\Historic.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RedLine, Stealc | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:NlllulPki/llllZ:NllUcylll |
MD5: | D8D47FD6FA3E199E4AFF68B91F1D04A8 |
SHA1: | 788625E414B030E5174C5BE7262A4C93502C2C21 |
SHA-256: | 2D9AF9AB25D04D1CF9B25DB196A988CD6E4124C1B8E185B96F2AB9554F4A6738 |
SHA-512: | 5BFD83D07DC3CB53563F215BE1D4D7206340A4C0AB06988697637C402793146D13CDDE0E27DC8301E4506553D957876AC9D7A7BF3C7431BBDD5F019C17AB0A58 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 454444 |
Entropy (8bit): | 7.999617366695598 |
Encrypted: | true |
SSDEEP: | 12288:UDcjKShjVL+JktXKF7eYADYju6BhyOk6fxLAvkq3:wG+eYAU7BhbkAGkq3 |
MD5: | 7A802684A30C0D32FB3006E132AD2AB7 |
SHA1: | 1949D7C82A4B12A2A2F83649D1F94A60C404B653 |
SHA-256: | ECE59D36ABB64F070377725F94FC5B835A7625DB24095872ECB35BB70593448A |
SHA-512: | 45AD0B874BFC728EE805A5E36771C6D774856F99B1CA586336EF664244B8414AA00A69D6028006C314452FBD71B356CC7749F9C138D792499DFE227D1EEFB900 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 130048 |
Entropy (8bit): | 6.692542680164972 |
Encrypted: | false |
SSDEEP: | 3072:xSAU4CE0Imbi80PtCZEMnVIPPBxT/sZydTmF:xSAhClbfSCOMVIPPL/sZT |
MD5: | CFE95E735E0FE30464E51F974DD9000F |
SHA1: | 62186C040A5BC4F19D82083A3109E12D82049EF7 |
SHA-256: | 580EE14A7456D23810F567588D7A7BF0C7B2B96F2A11967E6124C4ED9E8E92B4 |
SHA-512: | E5936D87D5FC8CB723162C0F79E74D5217BD652DFEB7716E2D4BDDE8322B42E861E9EB56B869545538905A597E236C7B792B43EB2B52D0EC185CACF7220A951E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 488756 |
Entropy (8bit): | 7.998565459908825 |
Encrypted: | true |
SSDEEP: | 12288:QQA2UA26l8ObLXbd5cgpeSnbCBKcf438YIvzmvhy:QQA2LvxnbdRrSFwHIv4hy |
MD5: | 3851434D989FD40123C2422BBD9F5195 |
SHA1: | 9ACC51C1B13B87F91EA84AED568BC26FBD887961 |
SHA-256: | C22603BABF0DC323AE310355D7161A3B20C3D4F8D7DD1C1681D25FCC97E3C3DA |
SHA-512: | DF35BC5A4C7B0B848952A203579778E25F4108981C543789B7466CDA420C5F19979C7E2F0A9D84F7D889599D8B5E7898E5BEEC309507F1C1699DDD4CA808CEFB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 6.584182346644431 |
Encrypted: | false |
SSDEEP: | 1536:/GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrHL/uDoiouK+r5bLmbZzW9FfTuA:vpIbv18mLthfhnueoMmOqDoioO5bLezU |
MD5: | 542F6DD0A950539DB036E3FFA69D4608 |
SHA1: | 36F14E4E9A889121CDE291A194F1EC61E781C102 |
SHA-256: | F1275F6B2DEB0A0A3A3AEB04892E3CD06E584A7A92F594C9AFE22AB710A9A30D |
SHA-512: | 44D9822FF985ABB0381C257F026BBE9E7522EE2F4FF93AF564366EA3DBD08DF9AB42EF666B5AF80C835C351981CA337DE59B1EB88AF708FC0045BFB9AFFD3B6A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 7.997087399294372 |
Encrypted: | true |
SSDEEP: | 1536:EnHeWt6otLBuRkp49yfrz8MSvQK0AitUxGZtFi8:zQXQRl9yfv1TlU2F7 |
MD5: | 90BABE7B9870D8012351721311728A3A |
SHA1: | 67D4B47B9429AAF72D99EDB2F88DF9FDF700D512 |
SHA-256: | 45D4F6990C244AC649470B556E110E26AA565DC6E22495CDDD028F3058B1E9BE |
SHA-512: | B3707C4ACA4A434A3B1F075041806346AE5FBB54ACD9C81A576645139A41C40A1411B8057A510E6F06A3133C441439B1717E777C6D17D9BD2048D3475EDA738C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 91136 |
Entropy (8bit): | 7.997946801804645 |
Encrypted: | true |
SSDEEP: | 1536:PV2IvRILkGiRyp4dCxNqXN+IYkJt8gXyC4BAuDi4qEAD6R2iN753MKGRJsKezTQH:N2IRUkrwOCXqXISJ6gCCkzVs6cKG+zT+ |
MD5: | E842804601B408EF56E6EB96090328D6 |
SHA1: | A952A8A5CDCA61971F3B1DC169CCCCC967E22FB8 |
SHA-256: | 383E434DEE70F707BCAAD9C6CCF089521E38DB9A02A57DA94DD77B98942C6CFC |
SHA-512: | 9248D0619A95D5D746D976D33E4525507AF1CD585FBF4ED8908CA0FEAAF3C2B857ECC33493686BE57E9B83109E868C97FC60EF455731BE2C4B475EBA820E59EE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 125060 |
Entropy (8bit): | 6.125215266545277 |
Encrypted: | false |
SSDEEP: | 3072:gxjgarB/5elDWy4ZNoGmROL7F1G7ho2kOb:ggarZ8aBZ2GmRq76tl |
MD5: | 9A5F6840BFB0472C7329DB6CF2864547 |
SHA1: | 66A6914591203F2CE26AC50896AB015D1C503BEF |
SHA-256: | E6B55C1C9BDB6F058A774EF8FD059B196ADAD4C4DB9821B38E6E341DCF4E13C4 |
SHA-512: | 0CE9D5E671D15D5227AFA3082695B1F487ECBB8CDC36D53516BF2CAAA6EC497F0558D1EDF2D73625675E97CE01C6ECECFF22C4209D125411AFB7D802F96FB8DF |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 134144 |
Entropy (8bit): | 5.610368136886665 |
Encrypted: | false |
SSDEEP: | 1536:Sz08QuklMBNIimuzaAwusPdKaj6iTcPAsAc:Sz08XvBNbjaAtsPh6wc |
MD5: | 3975181A0E22C9800EF356767CEF72F9 |
SHA1: | F3D77D47286802F17137B1E8DABEDC72B76D5E25 |
SHA-256: | 6628DC6F1E5E5B963407F69424AAE4007849ADD73D36244D312C877C0BEA2641 |
SHA-512: | E0B779E05EEDA5C7334230BC19FFE4293D665B0C8AD7C51CFA7BF764B9440F295704DFA8BE8C9B58B33C1A74DCEFE3597DCD0B1513DD6653B68ED626BC320871 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 6.505440858060107 |
Encrypted: | false |
SSDEEP: | 3072:u8Bp/LxyA3laW2UDQWf05mjccBiqXvpgF4qv+32eOyKODOSpY:uE/loUDtf0accB3gBmmLsiSO |
MD5: | B234836D87A034592466D5904B392068 |
SHA1: | 9F0BBEC64F2D0A7318B9D1A6AD13CD05AD5E0456 |
SHA-256: | F537B707D8AB2CE19CB48E26D937ECD60539CCB7F495456F961AC156201E3CFC |
SHA-512: | 603980221694827CD6FBD129EA4AAE2567219B22AA1F9212D0BCFF2A15411B97B32110C0ACE066493D406EAB602831D80077358C761B7EEAE10967D8C8DB36F9 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 7.997981698046356 |
Encrypted: | true |
SSDEEP: | 1536:AiQATCCnmstEyH+ju98e4EqNh7nMKl5LbIcF0ShqWM/FZe3M+F1fSnwuhlZO04Be:FCCGju3qQIhtDjM/F8c+uLhnOrBe |
MD5: | 33292BD82D30376E0FE0EE959F41F12A |
SHA1: | 32AE5F2E1838CBC577A48CC29A3A76CDE154CA2D |
SHA-256: | ED11F293430497DFFD60671E978C0D6CF585FB11133510EE4B02DBD7DB0E0EE8 |
SHA-512: | DAFAFAD19C5FEACCBE0413248DABE61F18604DE98EB1594F6147B014625E6491DDB9C43BB194F9871CCC3BC19A3FE796E7875E6E368FFB50E9814CD12E20DEF9 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68608 |
Entropy (8bit): | 7.997582784323982 |
Encrypted: | true |
SSDEEP: | 1536:VNBuSyMGnwcuGO3CTXaMtbfVUsX1mnF6sJEJYRn31sFoDhsUbkXB:VfvGnCGO3CrayxUHnF6sJyYJCFYsUbkR |
MD5: | FD23C7C05ED0C66C6E36C76B54A75480 |
SHA1: | 1D1B23C9EF6D837D375421580317646454896372 |
SHA-256: | E498CE2F9FEBF399D2218DF0FCE34F0B548A8EECD2D514457495A8C628D1E7A8 |
SHA-512: | F535EBD4DCF045E402777B8B57EB6ACB009E5FD61250882DA0FDEBBF555FF859A9BF4C5B145D5F7A077B20F55DD04FCFF2CC67B5C8A4A7BEACF029E96DE9F6D2 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 6.513738997667006 |
Encrypted: | false |
SSDEEP: | 1536:e1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdlDfFgQr:eZg5PXPeiR6MKkjGWoUlJUPdgQr |
MD5: | 8C0DAFFD3F8B5EB4F99BA6F475D68587 |
SHA1: | 23A2EFEFDD7F0CDD08C6C8A0D66BEB55A6D3368F |
SHA-256: | F872FBC2517F9A90DDC1BD0DAAAD5F355742B6E81261059E79ECD8B761A48A37 |
SHA-512: | FFCD49F59BC3ECD61F8A8DEAC12023DE7A3ABA0FDA6839F70A25AC7DCEB97621A8164A3F71C2279982766B5D084402C4D8511996D8357479A08D8BA5783F8ED3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 5.779720962625848 |
Encrypted: | false |
SSDEEP: | 1536:sN3YRYfv2j62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFr:woRC2jfTq8QLeAg0Fr |
MD5: | 1319D24B95B27459833C76D35D546DA1 |
SHA1: | 98FACEF8822449D50DEDB74146FC57B18ECE028C |
SHA-256: | 3E7C22499C550A54929E15708217D26A21A9EBD42C1452700233EA73B0E15A16 |
SHA-512: | 65F1E4742D7DFE92AADD1C776C48AAAF40BBF52E25641E6C5518A423FB64F2F12E282D961F0B2FFF0513A88AE5C94F3484A386F81D7857F9744D8B1DB1C72F65 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 23598 |
Entropy (8bit): | 5.093107806004424 |
Encrypted: | false |
SSDEEP: | 384:zAVjsQEl8vKFM8E7+FOMqAOxpFb7s8fvH25X44bdYsqk+C/GGlcau0AWXzAo:zAFA8vkEQOCObFb7s8Xd4mxxFG9u01D5 |
MD5: | 8B8493F4FECBD46319EB5D801A3B1219 |
SHA1: | 8978B1C7367D4E6574D3CE5D173F258A0595BAAD |
SHA-256: | 44919A4E9E169BABE5E100A0BC7F19DC1E6985CB7F657DCAC3765BDBD6FED665 |
SHA-512: | FC041A3A5A099937E175120B3BCF836FA7BFFF1A9ED133D445E4BE8022B94110ADFBE0BC714F7129054A5B4B3C2A44CCDEC49486797077AA5A9FB27B872C9297 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 23598 |
Entropy (8bit): | 5.093107806004424 |
Encrypted: | false |
SSDEEP: | 384:zAVjsQEl8vKFM8E7+FOMqAOxpFb7s8fvH25X44bdYsqk+C/GGlcau0AWXzAo:zAFA8vkEQOCObFb7s8Xd4mxxFG9u01D5 |
MD5: | 8B8493F4FECBD46319EB5D801A3B1219 |
SHA1: | 8978B1C7367D4E6574D3CE5D173F258A0595BAAD |
SHA-256: | 44919A4E9E169BABE5E100A0BC7F19DC1E6985CB7F657DCAC3765BDBD6FED665 |
SHA-512: | FC041A3A5A099937E175120B3BCF836FA7BFFF1A9ED133D445E4BE8022B94110ADFBE0BC714F7129054A5B4B3C2A44CCDEC49486797077AA5A9FB27B872C9297 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 985 |
Entropy (8bit): | 3.273846248585184 |
Encrypted: | false |
SSDEEP: | 12:zyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1:zyGS9PvCA433C+sCNC1 |
MD5: | 7375EBDA4B9BD538F8F0AF11126BB90F |
SHA1: | 05F91AD53ABE4AF15BD6ECB565A2738ED3B86484 |
SHA-256: | E754A4F62BF8B9A52233B38AFB6F6783A7B5C2A031C4E1836EB6E9865295A623 |
SHA-512: | 89A13E976406763E83F1D271F0BA44DF3B5FEA72A87046DC2C4F0EDECCADA7199918F0540050C705D9DDF1DEF6931C105DAA46712D56FFA4238C16CC58C7BBC9 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 128000 |
Entropy (8bit): | 6.627319010386656 |
Encrypted: | false |
SSDEEP: | 3072:v0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqVnBA:v0nEo3tb2j6AUkB0CThp6vmVna |
MD5: | D90E12EA461FFBCE54C9AB546D847545 |
SHA1: | 8487C93A0483C9422DC1C5B80EA68AE88A94B029 |
SHA-256: | 279776F38E7A4E361587591523FB406D6C87C95FDE8A921D605078468F0C0D8D |
SHA-512: | DD9A9E42306897A08912478AE6A3D22AB3980B89070FDC16F4C35DFCC9D704AC681047D852A2A0FD2D80121CB70C3FC11F062D2858A4AF34DAC6C2E63649F2BC |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58368 |
Entropy (8bit): | 6.698313097324345 |
Encrypted: | false |
SSDEEP: | 1536:hwANUQlHS3cctlxWboHdMJ3RraSXL21rKoUnD:PxlHS3NxrHSBRtNPnD |
MD5: | 4EEBC03E522A0878A4E833CBB934E5C7 |
SHA1: | 8CC2DD4660272C3F8E115189DD0B18F56839C08F |
SHA-256: | 61BC2C7A4CAF17DD0BD9ED89187420B021D59747543B347C467C1B62B8DA4551 |
SHA-512: | C417A087107F0C0230F8AF4A1C36C23196763A2E3181DE7D1E7DA028140D9B0EAED5933093DB619366BB0F7DFAB3E348FC278665C3E39EEC21B2727179DC6C60 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46892 |
Entropy (8bit): | 7.9958739827321335 |
Encrypted: | true |
SSDEEP: | 768:yb/b1DNUQ7LR1RjOG2Taw2yAp9iRZy+47rMUqrqCEea8UEZMRqBqOiSY7+U5wrqO:obbUQ7zlmOdFibyjr5kqjea8nBtRzmq3 |
MD5: | 58F23126D9C59D6B08CF125161AC7F32 |
SHA1: | CC6299338D1E113B1DE8902AE7135AAABB23A98C |
SHA-256: | B02D4EB194AE40128E66DFAF0DAB38901599B44496DD8BB9876C95EFBBD8978D |
SHA-512: | A524A902E9496AFB4432FB2A580B3AB244F52625D699143A09687C13485F4949DA09E2DC95E2A9723DACEE9D8B92204D74B3D5BCB7C96BA57176ED75AEF6628C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 87040 |
Entropy (8bit): | 7.998032618021949 |
Encrypted: | true |
SSDEEP: | 1536:KeKplFRvqMGv7+X7kEm6bSTpX8SlpsE9hD7zKC6lk6vRNKc6M5kE7JN9xSK0ar2d:LKplzCM47DEmECMkpsE9hXzKCpWNkIav |
MD5: | EF211EE574F7C2F1681D8E438A472A68 |
SHA1: | 926BED4F9537F175660D1365F7027A02BE7407DE |
SHA-256: | 49FEAD0B167792DB6F99920D21F28400C7CA5EA815D69445E468661CA790E7BF |
SHA-512: | B06333D1262B5EEDCFBCA4D90F3F2757CE92709B09686A63169406869C4F328AB6AA5986943D81649C1DF7F656F76805CB1B76C1C39F0C5123F5B294FC2BE30B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.97632858227613 |
TrID: |
|
File name: | eMBO6wS1b5.exe |
File size: | 1'325'507 bytes |
MD5: | 73565a0bcdcb7ff5f9ce005a2530e215 |
SHA1: | d5b3f48caa2b3c5bd9258cc3f8ce7b41c3d5b22b |
SHA256: | 0da872d62bc25e38d6eac1f6d2f35f8301dfa06087cc68c50ea93f326f934b8c |
SHA512: | 2fb0e16e47318fc2244f49cfc2a5aa0ccb966f6c13e4f87f4b4cff6f32c861c811963419ce3da13eaa62d00896dada8a8eb46798b52ea3981adc1ae442e0aa0c |
SSDEEP: | 24576:RfGPIqJvUwjujvpjGcN05TLG3nBD4bEeVSnwtI9u6S7kh1kleY8kQQkqcU:F4JvUwjuj0cW5ToBDcEoAwI1kl6k+m |
TLSH: | A35533DA890E403BFAE449B43A68DD5A7736FE253DF0C90F8708CE885A907D5C351B69 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8..... |
Icon Hash: | f8f0e0b0b0b0b23a |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | D4E75D16F15BD3BC32ACDF4EAF83A59A |
Thumbprint SHA-1: | 8A5A56EFFDC462AE8A6CF732BB21E2541995BF36 |
Thumbprint SHA-256: | 44DBAC9846A7E8F8EAE8BF0F9518B44FB86C257DD797742B767AF6ED1995AAF4 |
Serial: | 4EF1C2D67B37517957F42E8D |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F6AB8BF2F4Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F6AB8BF2C2Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F6AB8BF2C1Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F6AB8BF051Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F6AB8BF28F1h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F6AB8BF05A3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F6AB8BF051Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x482ee | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x140853 | 0x3170 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x482ee | 0x48400 | 07f04b8d41bceabff3e5ea756f544601 | False | 0.9850170307093425 | data | 7.926338781448185 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x149000 | 0xfd6 | 0x1000 | 07fd20e372e797fd8c2ac92cfe6e53aa | False | 0.568359375 | data | 5.315344493199193 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x100298 | 0x3bacc | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.9929345246862061 |
RT_ICON | 0x13bd64 | 0x7a24 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0005117052577714 |
RT_ICON | 0x143788 | 0x2dba | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0009396890483513 |
RT_ICON | 0x146544 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.7834699453551912 |
RT_ICON | 0x14766c | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.8679078014184397 |
RT_DIALOG | 0x147ad4 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x147bd4 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x147cf0 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x147d50 | 0x4c | data | English | United States | 0.8157894736842105 |
RT_VERSION | 0x147d9c | 0x27c | data | English | United States | 0.4968553459119497 |
RT_MANIFEST | 0x148018 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:18:44.441343+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49800 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:45.185987+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49800 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:45.185987+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49800 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:46.528423+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49804 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:47.296491+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49804 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:47.296491+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49804 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:48.858808+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49816 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:49.805687+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49816 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:51.034060+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49823 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:53.265297+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49829 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:55.689052+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49835 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:18:57.676428+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49841 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:00.437287+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49847 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:04.035566+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49859 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:05.111929+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49859 | 104.21.18.185 | 443 | TCP |
2024-12-24T08:19:06.653357+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49865 | 172.67.169.205 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 08:18:43.220890999 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:43.220942020 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:43.221010923 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:43.224003077 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:43.224018097 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:44.441257000 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:44.441343069 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:44.442938089 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:44.442962885 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:44.443207979 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:44.485488892 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:44.495084047 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:44.495167971 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:44.495208025 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:45.186012983 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:45.186099052 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:45.186144114 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:45.243140936 CET | 49800 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:45.243172884 CET | 443 | 49800 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:45.316679955 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:45.316735029 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:45.316808939 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:45.317104101 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:45.317123890 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:46.528326035 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:46.528423071 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:46.530225992 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:46.530240059 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:46.530493021 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:46.531789064 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:46.531896114 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:46.531924963 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.296493053 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.296540022 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.296561003 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.296592951 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.296596050 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.296607971 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.296637058 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.296643019 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.296689034 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.296705008 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.311290026 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.311357975 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.311369896 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.319664001 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.319729090 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.319739103 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.376111984 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.416131020 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.470089912 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.470113039 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.492091894 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.492177963 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.492197037 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.492312908 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.492563963 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.492572069 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.500260115 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.500564098 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.500639915 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.500641108 CET | 49804 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.500658989 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.500669956 CET | 443 | 49804 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.643604040 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.643699884 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:47.646991014 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.647361994 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:47.647402048 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:48.858730078 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:48.858808041 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:48.859914064 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:48.859945059 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:48.860174894 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:48.861320972 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:48.861481905 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:48.861529112 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:49.805654049 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:49.805732012 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:49.805979013 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:49.806112051 CET | 49816 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:49.806134939 CET | 443 | 49816 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:49.820642948 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:49.820694923 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:49.820820093 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:49.822876930 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:49.822895050 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.033982038 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.034060001 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:51.035296917 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:51.035310984 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.035579920 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.037015915 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:51.037159920 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:51.037200928 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.037272930 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:51.083328962 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.974836111 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.974934101 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:51.975090981 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:51.975233078 CET | 49823 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:51.975246906 CET | 443 | 49823 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:52.050298929 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:52.050329924 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:52.050875902 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:52.051243067 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:52.051255941 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:53.265224934 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:53.265296936 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:53.266844034 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:53.266858101 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:53.267154932 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:53.268456936 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:53.268623114 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:53.268660069 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:53.268826962 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:53.268836021 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:54.202538967 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:54.202671051 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:54.203023911 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:54.203023911 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:54.474679947 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:54.474744081 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:54.474818945 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:54.475199938 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:54.475219011 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:54.501132965 CET | 49829 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:54.501163960 CET | 443 | 49829 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:55.688980103 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:55.689052105 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:55.690326929 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:55.690340042 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:55.690573931 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:55.691766977 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:55.691873074 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:55.691900969 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:56.440589905 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:56.440712929 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:56.440778017 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:56.440948963 CET | 49835 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:56.440968990 CET | 443 | 49835 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:56.462115049 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:56.462162018 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:56.462297916 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:56.462726116 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:56.462742090 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:57.676336050 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:57.676428080 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:57.678247929 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:57.678260088 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:57.678592920 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:57.680411100 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:57.680577993 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:57.680584908 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:58.738760948 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:58.738862991 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:58.738997936 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:58.739094019 CET | 49841 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:58.739137888 CET | 443 | 49841 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:59.223547935 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:59.223607063 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:18:59.223681927 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:59.224208117 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:18:59.224225998 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.437217951 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.437287092 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.438694000 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.438703060 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.438930035 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.440170050 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.440917969 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.440954924 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441076040 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.441109896 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441205978 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.441232920 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441346884 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.441378117 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441525936 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.441555977 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441677094 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.441704035 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441715956 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.441729069 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441838980 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.441864014 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.441890955 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.442003012 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.442034006 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.487333059 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.487497091 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.487544060 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.487581015 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.531325102 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:00.531439066 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:00.579338074 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:02.780935049 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:02.781058073 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:02.781162977 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:02.781388998 CET | 49847 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:02.781409979 CET | 443 | 49847 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:02.821737051 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:02.821768999 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:02.821870089 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:02.822196007 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:02.822207928 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:04.035487890 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:04.035566092 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:04.037038088 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:04.037051916 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:04.037278891 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:04.038485050 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:04.038501978 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:04.038547039 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:05.111936092 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:05.112061977 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:05.112117052 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:05.112266064 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:05.112282991 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:05.112333059 CET | 49859 | 443 | 192.168.2.6 | 104.21.18.185 |
Dec 24, 2024 08:19:05.112338066 CET | 443 | 49859 | 104.21.18.185 | 192.168.2.6 |
Dec 24, 2024 08:19:05.425771952 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:05.425842047 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:05.425976038 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:05.426440954 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:05.426456928 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:06.653275967 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:06.653357029 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:06.654995918 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:06.655019045 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:06.655544043 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:06.657155991 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:06.699330091 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:10.234527111 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:10.234603882 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:10.234766006 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:10.235302925 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:10.235302925 CET | 49865 | 443 | 192.168.2.6 | 172.67.169.205 |
Dec 24, 2024 08:19:10.235333920 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Dec 24, 2024 08:19:10.235343933 CET | 443 | 49865 | 172.67.169.205 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 08:18:11.230935097 CET | 56755 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 08:18:11.463063002 CET | 53 | 56755 | 1.1.1.1 | 192.168.2.6 |
Dec 24, 2024 08:18:18.162810087 CET | 50163 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 08:18:42.905926943 CET | 64326 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 08:18:43.212152004 CET | 53 | 64326 | 1.1.1.1 | 192.168.2.6 |
Dec 24, 2024 08:19:05.115812063 CET | 58181 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 08:19:05.424583912 CET | 53 | 58181 | 1.1.1.1 | 192.168.2.6 |
Dec 24, 2024 08:19:10.254894018 CET | 56932 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 08:19:10.476272106 CET | 53 | 56932 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 08:18:11.230935097 CET | 192.168.2.6 | 1.1.1.1 | 0x453f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 08:18:18.162810087 CET | 192.168.2.6 | 1.1.1.1 | 0x791a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 08:18:42.905926943 CET | 192.168.2.6 | 1.1.1.1 | 0x9179 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 08:19:05.115812063 CET | 192.168.2.6 | 1.1.1.1 | 0xf293 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 08:19:10.254894018 CET | 192.168.2.6 | 1.1.1.1 | 0xf5d1 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 08:18:11.463063002 CET | 1.1.1.1 | 192.168.2.6 | 0x453f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 08:18:18.300266027 CET | 1.1.1.1 | 192.168.2.6 | 0x791a | No error (0) | mm-mm.bing.net.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 24, 2024 08:18:18.300266027 CET | 1.1.1.1 | 192.168.2.6 | 0x791a | No error (0) | 150.171.27.10 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:18:18.300266027 CET | 1.1.1.1 | 192.168.2.6 | 0x791a | No error (0) | 150.171.28.10 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:18:41.870614052 CET | 1.1.1.1 | 192.168.2.6 | 0xd932 | No error (0) | ax-0001.ax-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 24, 2024 08:18:41.870614052 CET | 1.1.1.1 | 192.168.2.6 | 0xd932 | No error (0) | 150.171.28.10 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:18:41.870614052 CET | 1.1.1.1 | 192.168.2.6 | 0xd932 | No error (0) | 150.171.27.10 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:18:43.212152004 CET | 1.1.1.1 | 192.168.2.6 | 0x9179 | No error (0) | 104.21.18.185 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:18:43.212152004 CET | 1.1.1.1 | 192.168.2.6 | 0x9179 | No error (0) | 172.67.183.30 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:19:05.424583912 CET | 1.1.1.1 | 192.168.2.6 | 0xf293 | No error (0) | 172.67.169.205 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:19:05.424583912 CET | 1.1.1.1 | 192.168.2.6 | 0xf293 | No error (0) | 104.21.27.229 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:19:10.476272106 CET | 1.1.1.1 | 192.168.2.6 | 0xf5d1 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49800 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:18:44 UTC | 263 | OUT | |
2024-12-24 07:18:44 UTC | 8 | OUT | |
2024-12-24 07:18:45 UTC | 1121 | IN | |
2024-12-24 07:18:45 UTC | 7 | IN | |
2024-12-24 07:18:45 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49804 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:18:46 UTC | 264 | OUT | |
2024-12-24 07:18:46 UTC | 76 | OUT | |
2024-12-24 07:18:47 UTC | 1127 | IN | |
2024-12-24 07:18:47 UTC | 242 | IN | |
2024-12-24 07:18:47 UTC | 1369 | IN | |
2024-12-24 07:18:47 UTC | 1369 | IN | |
2024-12-24 07:18:47 UTC | 172 | IN | |
2024-12-24 07:18:47 UTC | 1369 | IN | |
2024-12-24 07:18:47 UTC | 1369 | IN | |
2024-12-24 07:18:47 UTC | 1369 | IN | |
2024-12-24 07:18:47 UTC | 1369 | IN | |
2024-12-24 07:18:47 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49816 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:18:48 UTC | 279 | OUT | |
2024-12-24 07:18:48 UTC | 12838 | OUT | |
2024-12-24 07:18:49 UTC | 1131 | IN | |
2024-12-24 07:18:49 UTC | 20 | IN | |
2024-12-24 07:18:49 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49823 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:18:51 UTC | 280 | OUT | |
2024-12-24 07:18:51 UTC | 15090 | OUT | |
2024-12-24 07:18:51 UTC | 1124 | IN | |
2024-12-24 07:18:51 UTC | 20 | IN | |
2024-12-24 07:18:51 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49829 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:18:53 UTC | 278 | OUT | |
2024-12-24 07:18:53 UTC | 15331 | OUT | |
2024-12-24 07:18:53 UTC | 4605 | OUT | |
2024-12-24 07:18:54 UTC | 1125 | IN | |
2024-12-24 07:18:54 UTC | 20 | IN | |
2024-12-24 07:18:54 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49835 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:18:55 UTC | 272 | OUT | |
2024-12-24 07:18:55 UTC | 5421 | OUT | |
2024-12-24 07:18:56 UTC | 1127 | IN | |
2024-12-24 07:18:56 UTC | 20 | IN | |
2024-12-24 07:18:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49841 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:18:57 UTC | 281 | OUT | |
2024-12-24 07:18:57 UTC | 1255 | OUT | |
2024-12-24 07:18:58 UTC | 1123 | IN | |
2024-12-24 07:18:58 UTC | 20 | IN | |
2024-12-24 07:18:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49847 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:19:00 UTC | 284 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:00 UTC | 15331 | OUT | |
2024-12-24 07:19:02 UTC | 1132 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.6 | 49859 | 104.21.18.185 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:19:04 UTC | 265 | OUT | |
2024-12-24 07:19:04 UTC | 111 | OUT | |
2024-12-24 07:19:05 UTC | 1127 | IN | |
2024-12-24 07:19:05 UTC | 222 | IN | |
2024-12-24 07:19:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.6 | 49865 | 172.67.169.205 | 443 | 6716 | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:19:06 UTC | 199 | OUT | |
2024-12-24 07:19:10 UTC | 943 | IN | |
2024-12-24 07:19:10 UTC | 15 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 02:18:03 |
Start date: | 24/12/2024 |
Path: | C:\Users\user\Desktop\eMBO6wS1b5.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'325'507 bytes |
MD5 hash: | 73565A0BCDCB7FF5F9CE005A2530E215 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 02:18:03 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 02:18:04 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:18:06 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1f0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 02:18:06 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 02:18:07 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1f0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 02:18:07 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 02:18:08 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 02:18:08 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3f0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 15 |
Start time: | 02:18:09 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 16 |
Start time: | 02:18:09 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 17 |
Start time: | 02:18:09 |
Start date: | 24/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\801291\Historic.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x560000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 18 |
Start time: | 02:18:09 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x440000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 28 |
Start time: | 02:19:09 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x270000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 29 |
Start time: | 02:19:09 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 27 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07491C10 Relevance: .6, Instructions: 583COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CA29F0 Relevance: .2, Instructions: 207COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07491BEF Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CA2B00 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CA4C10 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CA4BD0 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BBD01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02CA4BF0 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BBD006 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07491270 Relevance: 5.5, Strings: 4, Instructions: 474COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|