Windows
Analysis Report
LVDdWBGnVE.exe
Overview
General Information
Sample name: | LVDdWBGnVE.exerenamed because original name is a hash value |
Original sample name: | 5a909c9769920208ed3d4d7279f08de5.exe |
Analysis ID: | 1580297 |
MD5: | 5a909c9769920208ed3d4d7279f08de5 |
SHA1: | 656f447088626150e252cbf7df6f8cd0de596fa0 |
SHA256: | 5f2c26e780639a76f10c549e7dea1421c4f06093c1facbf4dd8cf0a8b2fee8cb |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- LVDdWBGnVE.exe (PID: 3652 cmdline:
"C:\Users\ user\Deskt op\LVDdWBG nVE.exe" MD5: 5A909C9769920208ED3D4D7279F08DE5) - cmd.exe (PID: 5260 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Ca mpbell Cam pbell.cmd & Campbell .cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6544 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 6552 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 4236 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 1488 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 3048 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6636 cmdline:
cmd /c md 370821 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 3052 cmdline:
findstr /V "Anchor" Veterinary MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6196 cmdline:
cmd /c cop y /b ..\Ge nre + ..\M j + ..\Dis cs + ..\Re ceiving + ..\Mysteri ous + ..\A ka w MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Sale.com (PID: 4512 cmdline:
Sale.com w MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 6184 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:58:39.365928+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49812 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:41.351835+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49818 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:43.594426+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49825 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:46.085369+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49832 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:48.258563+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49838 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:50.677704+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49845 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:52.687696+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49852 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:55.054859+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49860 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:57.814441+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49867 | 104.21.63.229 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:58:40.118283+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49812 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:42.110697+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49818 | 104.21.63.229 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:58:40.118283+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49812 | 104.21.63.229 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:58:42.110697+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49818 | 104.21.63.229 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:58:44.625392+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49825 | 104.21.63.229 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 11 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | 11 Input Capture | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
49% | Virustotal | Browse | ||
42% | ReversingLabs | Win32.Ransomware.LummaC |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fannleadyn.click | 104.21.63.229 | true | true | unknown | |
wcCUGXykADNzZuDCbIFIvizjQpm.wcCUGXykADNzZuDCbIFIvizjQpm | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.63.229 | fannleadyn.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580297 |
Start date and time: | 2024-12-24 08:56:55 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | LVDdWBGnVE.exerenamed because original name is a hash value |
Original Sample Name: | 5a909c9769920208ed3d4d7279f08de5.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@22/21@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
02:57:46 | API Interceptor | |
02:58:26 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.63.229 | Get hash | malicious | LummaC, Amadey, LummaC Stealer, RedLine, Stealc | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fannleadyn.click | Get hash | malicious | LummaC, Amadey, LummaC Stealer, RedLine, Stealc | Browse |
| |
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC, Stealc | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, Stealc | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\370821\Sale.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RedLine, Stealc | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 455773 |
Entropy (8bit): | 7.999611378958578 |
Encrypted: | true |
SSDEEP: | 12288:jxCQzRCdIiSYC3HGWze0kPuJxIv2B6xmDLnd3NBTsKKm:jxCQzcdIi43Hg0ljIu6KLd3Pem |
MD5: | D02F356CC528BF6EAA89051942A0B1BE |
SHA1: | DFECB4AE80274697F0D86E497CD566020EA23739 |
SHA-256: | 5ED7E1F92A6BB08458CA99FDC83236095845F5939C6B9F7E423C6DB70869B95C |
SHA-512: | 91EC78343E91DB20EDF97F39C293A5A8A45851C510AD6499C85B26738DFD9E918EDDA14E8710ECE22D855D51D1417E722F19530CE3979E491C2B0DCCB5198E57 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 43101 |
Entropy (8bit): | 7.995736975425293 |
Encrypted: | true |
SSDEEP: | 768:7UODqTAxIZz/hxqIygfLye2VmpNHQkcrouKgODnfl3KUQXKQ4wnPQkspK:7UODTxIjxqIPye2Vmp5QkuKg6daUu4Zm |
MD5: | 14422967D2C4B9A9A8A90E398B24F500 |
SHA1: | 7031018AF43BCC5550A8B0A55680596D693334DC |
SHA-256: | 93DB8E88945B7DE88E98A7C50D64BFFA8B73C3B002C744C8D62C2EADF767CF6F |
SHA-512: | 4B5795F15774A7768A42AA3A2308B9366F47B30C92BABF688A67D2ABECA0037B63762F3E21154212DC5C8A31BCDD69F029E849E1D4DEF5676A04B64E2AE90C75 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 123904 |
Entropy (8bit): | 6.696121468639712 |
Encrypted: | false |
SSDEEP: | 3072:b2UDQWf05mjccBiqXvpgF4qv+32eOyKODOSpQSAZ:6UDtf0accB3gBmmLsiS+SAZ |
MD5: | C89FD1314A2184D5D7B4A66DE377D5B2 |
SHA1: | F0EBBC2C8C6F9EBADC6ACE713AEC1B06F3F841E8 |
SHA-256: | 9D1E82E2E430B87B28867FF9745A74E53A128671E9D300F111B1904786C2F856 |
SHA-512: | 4B0B16E99D0CACAB0B7AF1D65CBF9226988752D8FA020B955BF54C634D9D64A05BB036EF590FA0D852D513621A84F4C3DC3C341AA8FEFFDF350DD8A5DBC75778 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11619 |
Entropy (8bit): | 5.184884477970318 |
Encrypted: | false |
SSDEEP: | 192:YumLtVRO6Ny6FVAQjj20mdO7VVafUKi4y7WhBom3byypU+3AFcAEif/kRj13J2po:YLrRO6Nv3jmc7/af1o7g2T+3AFX/kRj5 |
MD5: | E7567EC4057933FA6E06322B7C08B72A |
SHA1: | 4E733E77915C7DFB7D25E31738E9D596962D4177 |
SHA-256: | 1896EF25A6223F19F770DA125A4B1BC7C90815CCB682EC7CA780D231A01C28B0 |
SHA-512: | D8A14E5C8225AD8BDBB45317FD41588C12E9E60F1C9FF819D0D15CBC35801B82E7C7981B7DBC815666354950A7F5362FC00765F8A67C9478BD95DC5A31B12C83 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11619 |
Entropy (8bit): | 5.184884477970318 |
Encrypted: | false |
SSDEEP: | 192:YumLtVRO6Ny6FVAQjj20mdO7VVafUKi4y7WhBom3byypU+3AFcAEif/kRj13J2po:YLrRO6Nv3jmc7/af1o7g2T+3AFX/kRj5 |
MD5: | E7567EC4057933FA6E06322B7C08B72A |
SHA1: | 4E733E77915C7DFB7D25E31738E9D596962D4177 |
SHA-256: | 1896EF25A6223F19F770DA125A4B1BC7C90815CCB682EC7CA780D231A01C28B0 |
SHA-512: | D8A14E5C8225AD8BDBB45317FD41588C12E9E60F1C9FF819D0D15CBC35801B82E7C7981B7DBC815666354950A7F5362FC00765F8A67C9478BD95DC5A31B12C83 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 133120 |
Entropy (8bit): | 6.13525351023848 |
Encrypted: | false |
SSDEEP: | 3072:QFfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNbjaAtsD:tt/Dd314V14ZgP0JaAOz04phdyD |
MD5: | 638E7812C5E9C55C5F339CC64D197B28 |
SHA1: | 5EF8A953EF65AB7D0620A5D144F2C410E2A77A2F |
SHA-256: | 347A3459DD74AEA0A6B2F62955D1BC9BDB091BB66CA8A42274F7EBF310527FD8 |
SHA-512: | 194B0D8799A83210968746C4D3E364EE512669E6080C6B3D215D97C141E8EF7F09152EA524691EFCD2276ACB1DC158FFD484E3F595DDF2CCEB690BD1996C8266 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114688 |
Entropy (8bit): | 6.560421732845139 |
Encrypted: | false |
SSDEEP: | 3072:NCThpmESv+AqVnBypIbv18mLthfhnueoMmOqDoioO5bLezW8:NCThp6vmVnjphfhnvO5bLezW8 |
MD5: | D9DAF89D86B32DF3D7DA7EC1CFBF7212 |
SHA1: | 59E1BA3DD32168A3D79A9DA2626C99C52970A53E |
SHA-256: | 06F48747A4ACB2EE437D03A9E8331CCA5C76EE5684E118F491E4FAF7799ADCC4 |
SHA-512: | 24D26B6112417D75915F08562AF53EB1BB7DDEF2E89E779DB52AE0F674EA8CE102984FA2628CEE5588C7DC34DF00A32497E49EE18F7259C51E4D1C855AB69A6C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 7.997344187879081 |
Encrypted: | true |
SSDEEP: | 1536:oirK8ql4kgHb4nGpb4kT8K+AzjGeY7oG7H+L45/orwahlHxU:oieW7IGptgaKo0RoDlHxU |
MD5: | 00646A2066D51D9790F52BAE3C446C87 |
SHA1: | EBDA2B25B5A46CC6D9D5494050CC4B3A0BF81984 |
SHA-256: | 57AFAB1CEC987DA27F5E92BAA6DC21D83F8C83EDF734FC590313102E75844C3A |
SHA-512: | A74C02ED1B704912A8945E60CACC892F7E832E5CF15C87632B0FD3CBF9DDD8F36B01A5BA87FD7EF87D6BECBB297161BB69DC750B8DAC6F952892D45CD95F46F0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3386 |
Entropy (8bit): | 7.608467285191016 |
Encrypted: | false |
SSDEEP: | 96:wIuzfJFFy4EDzHy5Xz+ppo+zAbQ6YhbBwGKGP5h3g:wISVSWMZMQ3rw |
MD5: | 682D77B5A6D22691A869AB4BEA11AD53 |
SHA1: | F56FAB8959A05C77570652F5F8E9E4103489E676 |
SHA-256: | C269725998F8F5ACDAB6A0067457065CC9059326EE0A38FF353C2939A0190C1B |
SHA-512: | C42D04178ED59683FC4597B83496D7B3C61C1A075B4542ABB491C9639531F9737D70AE4172186FD6A3450C26701D794496BD4AE0F5E50DB8A3818CD78ED7FD27 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 151552 |
Entropy (8bit): | 5.143694165278638 |
Encrypted: | false |
SSDEEP: | 1536:TdKaj6iTcPAsAhxjgarB/5el3EYrDWyu0uF:Th6whxjgarB/5elDWy4F |
MD5: | 2E9E29F8ED97F2DE8EBB1652BDBD545A |
SHA1: | 5577D360B25DAFFA0AF907FC5D852894B784F81D |
SHA-256: | AEB399054CFF321F752D4F93143815FF1A2CC2398668C2E1110065A2C6F502F1 |
SHA-512: | F4F925DAF3F576441D2B7A0E250A51400B23E714D76870A640734912DA783D83AC113586F121161D96D7F06EB70B8D89EB4E0524D591232B0B2A342063E8BCB6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114688 |
Entropy (8bit): | 6.675787508464099 |
Encrypted: | false |
SSDEEP: | 3072:9nVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnj0nE0:9VIPPL/sZ7HS3zcNPj0nE0 |
MD5: | 42FB34DDB94507C5A125BF02C2983904 |
SHA1: | 4E400C020121235E3DE490F5CBB38C4A25E686DC |
SHA-256: | D59EFEA25D1E316B8A9248F52081AB14113C97603F3E90D533F4F373F743B3C7 |
SHA-512: | 639D90CD1CD451EBCB9E5E1C165F7EEBB62B30D6BF24C596990CA40E08BCE5D0B5864E7A4F0A83624C7CF9AC4EC5C1E7385F59602B206F3346554D62721CD71D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 90112 |
Entropy (8bit): | 7.997966981425173 |
Encrypted: | true |
SSDEEP: | 1536:ju/rDNkncHkrP9rRrANgBdCQYqZ7yhjYP/G9ye4nMRuU/DpFracF+l72Jxj6tU:jANkncHA9NpCQzeencyjFUrpFracC2F |
MD5: | 5CE4409C4AAA9FD5A27EC4974734F1DF |
SHA1: | BF7EE5465EF96EE0186388B5B0685AD727ED9493 |
SHA-256: | A401B4CD0AFBAEE57D8025BF4FCE12583C825CBC2E3D3F308EB0627CD5BBA412 |
SHA-512: | 1155B1C58221BA1C809D9D60CD440EBD8788DCD3169EE87BDA72FB7061B1E2F849F8BC79AC7053DF5DE8BC7955DB088DF778AF66900D6F303BDE6D61925014E6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 6.7675117089438706 |
Encrypted: | false |
SSDEEP: | 1536:To2+9BGmdATGODv7xvTphAiPChgZ2kOEb:TNoGmROL7F1G7ho2kO6 |
MD5: | D830821FE60D6CD810FB9EC7102838F3 |
SHA1: | 9264B78903FA373E0A1B697CC056DECC1DFAFB5F |
SHA-256: | 00A96AC0E8600A9FA0A00EF1F939B58BE93618C4FE4E3BE9D0BFAB0A4A0FF57D |
SHA-512: | 2A8E2BB9D599964CA112AACBB0FDA37C01466898A7AF5D7C8543013949B0BC6E5665402692A1072845B1A72211D350963C608A81A7C3450C19A56A948CED5D4D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 99328 |
Entropy (8bit): | 7.998576390696709 |
Encrypted: | true |
SSDEEP: | 1536:cD6KkwPhsASDYs8rp/KWY8Xr1OWgxQFn/LbctRaCiUO7QOZg2hc9nW0iH:c+KVhtSQzY8713n/H+O7rGW0K |
MD5: | FF77A17E4CADE79760F0F8B87C857C6C |
SHA1: | B05075D65229AF0063E6E85DA14AB940062818DD |
SHA-256: | CC8A9523B67F764E447CD5042751E1DE77B04FFC5664E6F5C41D1C3CCE0EC60D |
SHA-512: | 6DF97DCB14736D2F0CE9762B7246050B488E054375C78F42294119D80CACEDCF53F4B3868B7A4C948DD7B1F9545B4135F5BD5ED69611424129CAE63A372994D0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 91136 |
Entropy (8bit): | 7.998131058926633 |
Encrypted: | true |
SSDEEP: | 1536:2Ifwsyt1Vj+tpNuEroTuyisZj6b3nlPw2gIPNBcYxZA+eGth3WQjR7:LIDDctDt/jsZAn1w23NB/dJWKR |
MD5: | BEEF30C9A0C6A41985E081CD4FF23049 |
SHA1: | 4E09FFAF608BAF3A98CD94794CB7CC23E41C3086 |
SHA-256: | FC64F325CDD473ADB5B7C15221F7B2773A064395612EFF9AD1C76FA973A6738A |
SHA-512: | EC71CDB716B684B241A2FA2BCA84CBCED9AA86BA0954009DC003EF1F80640C01D49911EC6E031E9F8E8139D30BF5A77D7A79EE38F66B8FD43A6E4F957CB8E1CA |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 6.689808554469509 |
Encrypted: | false |
SSDEEP: | 1536:xI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneAJu7Y:e4CE0Imbi80PtCZEk |
MD5: | AA4D881EA35979E4EAB13C982D3D0898 |
SHA1: | CF301086D6E43E603571762FBC7D754F0246FB74 |
SHA-256: | 31D85BEBE7949C9B7B40AF007FBBE61C8CD6C25F8E4FC7DCFE9B7DCD8A1D79E7 |
SHA-512: | F64491753F2CF57B72740CA91F10C2BD677219BC89BF86D2476A8567CF83955F986A481C92D19BEF9C466438AF97D071686EA2FC496C5E477C900568F129B5F6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 7.9971672365789415 |
Encrypted: | true |
SSDEEP: | 768:ttBffnhuy/kWZ4KmEvLGxvyj85XqOlWChh7diY+BChE2u0W5zqirJebuswzA:ttBHnhuyXNwvouXqO93diTn2u0NOeizA |
MD5: | 8D5CF0056A8BE7CA1485969FC23F72A5 |
SHA1: | 5727BC17CD958D06B1E7D52C8D38A761A1AE2BF2 |
SHA-256: | BD1B00DEA1CDDB3345443A35AE3B71883443722EDBB48016F829AC500F5F505B |
SHA-512: | B0F5FB69A565FC9690F307175C606CE9F9484BC309AC00B8A359CB6B77D19A938052EC584919A256FDB7C0B1557E155B414090B771432ACB9419102F794B61EC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 107520 |
Entropy (8bit): | 6.2684070117846975 |
Encrypted: | false |
SSDEEP: | 3072:pg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laG:a5vPeDkjGgQaE/lx |
MD5: | 2FADD2BF6F3CDC055416BAA1528652E9 |
SHA1: | 342D96C7CE7B431E76C15C9A7386C2A75E3DC511 |
SHA-256: | 8DF18D17C715E689B9CB222BEB699120B592464460FD407DBB14F59CCEC5FDB3 |
SHA-512: | 08BC19703DAD1441E1DA8FB011C42241A4C90D8355575B7F41D465E3E84D797ECAC7D6BF9AF6163E6F4EF506CD98561F62D06446F861AEBA2D7644BEB7F6ABB8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 63488 |
Entropy (8bit): | 6.678836431320186 |
Encrypted: | false |
SSDEEP: | 1536:ECX4aVmoJiKwtk2ukC5HRu+OoQjz7nts/M26N7oKzYkBvRmLOy:fXnmowS2u5hVOoQ7t8T6pUkBJRy |
MD5: | 9E4FE1F2538C08F75AE16A3E349C9EF2 |
SHA1: | 559879228568B2F405400B34DFB19E59F139FA2C |
SHA-256: | 22CE756672ACA3A4BA015903B4C36E7667E15C73157759E5A2212E7D4E727CC0 |
SHA-512: | A1F6BF183C590CC62000DDDB0FEA63BAE2BDC30FCE8EBFA24286B9FB8B2415C67B2363F739D36B32CC7B477E608397EFBE45173173AA3F27ED44E9B75448B9EC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2852 |
Entropy (8bit): | 5.490446063863794 |
Encrypted: | false |
SSDEEP: | 48:I9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+MAyKnFHbgk:0SEA5O5W+MfH5S1CqlVJcI6mlb/ |
MD5: | 6F07C56590CB57E03B68F9E2F994390C |
SHA1: | AEE254034B1F3394A97304C8DFBAE1911440E2C0 |
SHA-256: | 1772CFD25C5DEB74DACC6FC88AA8793A74C89A81452B27E886CA49557BA32D84 |
SHA-512: | 0AF18E6D07C161A5088CEC9A56654C9F661AC003F0E22B68B6DBFE2920BB344F4D9A1326C261957C2309BB44DCB39453630F33068A057A1A6C2960EDFBD39001 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.975817752785393 |
TrID: |
|
File name: | LVDdWBGnVE.exe |
File size: | 1'294'445 bytes |
MD5: | 5a909c9769920208ed3d4d7279f08de5 |
SHA1: | 656f447088626150e252cbf7df6f8cd0de596fa0 |
SHA256: | 5f2c26e780639a76f10c549e7dea1421c4f06093c1facbf4dd8cf0a8b2fee8cb |
SHA512: | c6038048bd09c8f704246a6ba176ea63b1c8d23f2e127600c50bac50f3032c1b751ea8e405a2fe1ea707f75f21cf6516447345a84751bc677d94874d4b91090b |
SSDEEP: | 24576:ovHavrNGiB7Ld0Pbd04XWxCQkcMeiPoHe/wh1b2BcGtF4GFx6w:gA59BMdxXoTMYCwsFhJ |
TLSH: | BE5523872AFA6063FBE20FB985F51C0349AAF5271CF89A0F59114E8978993C1DC5D70B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...v...B...8..... |
Icon Hash: | 70ec9eb233f8f070 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | D5D66EA7AE498CF896CF422DE5426590 |
Thumbprint SHA-1: | 232E8A3F99CB8B202BE4DD8A235590F838B29038 |
Thumbprint SHA-256: | 9B04FC852CDCBDA62D870E4112459D2A2A30586909E0E76B77AFA5DDF6FBA631 |
Serial: | 5600D74B2CE1156218EEA30D |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007FA5C4DAD75Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007FA5C4DAD43Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007FA5C4DAD42Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007FA5C4DAAD2Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007FA5C4DAD101h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FA5C4DAADB3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FA5C4DAAD2Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x4059a | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x138985 | 0x36e8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x4059a | 0x40600 | f7e3176c83cba6181bbff15d7cb4ca53 | False | 0.9838971480582525 | data | 7.8943783332487945 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x141000 | 0xfd6 | 0x1000 | bacc409253667486bbf5d7dd9f0fd370 | False | 0.597412109375 | data | 5.5866043665988805 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1001c0 | 0x3f9f9 | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.9884344265754929 |
RT_ICON | 0x13fbbc | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7730496453900709 |
RT_DIALOG | 0x140024 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x140124 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x140240 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x1402a0 | 0x22 | data | English | United States | 0.9705882352941176 |
RT_MANIFEST | 0x1402c4 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T08:58:39.365928+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49812 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:40.118283+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49812 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:40.118283+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49812 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:41.351835+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49818 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:42.110697+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49818 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:42.110697+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49818 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:43.594426+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49825 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:44.625392+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49825 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:46.085369+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49832 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:48.258563+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49838 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:50.677704+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49845 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:52.687696+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49852 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:55.054859+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49860 | 104.21.63.229 | 443 | TCP |
2024-12-24T08:58:57.814441+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49867 | 104.21.63.229 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 08:58:38.138048887 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:38.138091087 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:38.138360023 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:38.143354893 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:38.143368006 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:39.365823984 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:39.365927935 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:39.383068085 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:39.383081913 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:39.384306908 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:39.437066078 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:39.437092066 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:39.437355042 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:40.118380070 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:40.118668079 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:40.118855953 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:40.121012926 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:40.121037006 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:40.121049881 CET | 49812 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:40.121057987 CET | 443 | 49812 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:40.128664970 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:40.128710032 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:40.128793001 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:40.129101992 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:40.129117012 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:41.351663113 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:41.351835012 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:41.356969118 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:41.356981993 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:41.357323885 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:41.358472109 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:41.358491898 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:41.358566046 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.110774040 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.110955954 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.111033916 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.111052990 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.111080885 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.111133099 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.111181974 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.111393929 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.111442089 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.111453056 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.116197109 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.116254091 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.116281986 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.124795914 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.124857903 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.124866962 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.173496962 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.173511028 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.220494032 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.230365038 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.282955885 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.302145004 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.306472063 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.306541920 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.306555986 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.313651085 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.313716888 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.313724995 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.313926935 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.316399097 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.316399097 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.316399097 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.374296904 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.374342918 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.374432087 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.374702930 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.374717951 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:42.610975027 CET | 49818 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:42.611007929 CET | 443 | 49818 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:43.594175100 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:43.594425917 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:43.595638990 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:43.595659018 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:43.596605062 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:43.601511002 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:43.601633072 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:43.601710081 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:44.625468969 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:44.625777960 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:44.625967026 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:44.661663055 CET | 49825 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:44.661739111 CET | 443 | 49825 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:44.865886927 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:44.865902901 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:44.865963936 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:44.866394043 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:44.866406918 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.085279942 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.085369110 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:46.086824894 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:46.086874962 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.087136984 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.090497017 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:46.090653896 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:46.090713978 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.090781927 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:46.135318995 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.958066940 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.958345890 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:46.958462000 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:46.958636999 CET | 49832 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:46.958655119 CET | 443 | 49832 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:47.038697004 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:47.038747072 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:47.038836002 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:47.039170027 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:47.039189100 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:48.258399963 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:48.258563042 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:48.259860992 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:48.259870052 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:48.260222912 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:48.261920929 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:48.262069941 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:48.262104988 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:48.262198925 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:48.262207985 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:49.194869041 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:49.195113897 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:49.195286036 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:49.195348978 CET | 49838 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:49.195372105 CET | 443 | 49838 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:49.464438915 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:49.464490891 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:49.464584112 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:49.464955091 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:49.464973927 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:50.677618980 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:50.677704096 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:50.679426908 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:50.679436922 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:50.679816008 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:50.681766033 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:50.681925058 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:50.681961060 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:51.444278002 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:51.444591045 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:51.444695950 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:51.444850922 CET | 49845 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:51.444869041 CET | 443 | 49845 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:51.466309071 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:51.466423988 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:51.466582060 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:51.467044115 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:51.467072010 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:52.687508106 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:52.687695980 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:52.688918114 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:52.688937902 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:52.689361095 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:52.690500975 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:52.690588951 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:52.690598965 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:53.475756884 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:53.475964069 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:53.476052999 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:53.476303101 CET | 49852 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:53.476325989 CET | 443 | 49852 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:53.839082003 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:53.839118958 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:53.839207888 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:53.839632988 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:53.839643955 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.054713011 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.054858923 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.056412935 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.056427002 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.056759119 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.058974028 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.058974028 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.059027910 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.062486887 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.062539101 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.062688112 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.062742949 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.064253092 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.064301968 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.064855099 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.064892054 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.065057039 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.065092087 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.065097094 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.065109015 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.065243006 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.065275908 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.065298080 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.065529108 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.065573931 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.111330032 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.113595963 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.113632917 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.113648891 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.113667011 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.113691092 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.113706112 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:55.113759041 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:55.113785982 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:57.467057943 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:57.467344046 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:57.467526913 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:57.467626095 CET | 49860 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:57.467644930 CET | 443 | 49860 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:57.474546909 CET | 49867 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:57.474664927 CET | 443 | 49867 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:57.474777937 CET | 49867 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:57.475137949 CET | 49867 | 443 | 192.168.2.6 | 104.21.63.229 |
Dec 24, 2024 08:58:57.475173950 CET | 443 | 49867 | 104.21.63.229 | 192.168.2.6 |
Dec 24, 2024 08:58:57.814440966 CET | 49867 | 443 | 192.168.2.6 | 104.21.63.229 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 08:57:51.271648884 CET | 60474 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 08:57:51.494652033 CET | 53 | 60474 | 1.1.1.1 | 192.168.2.6 |
Dec 24, 2024 08:58:37.837393045 CET | 49945 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 24, 2024 08:58:38.130964994 CET | 53 | 49945 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 08:57:51.271648884 CET | 192.168.2.6 | 1.1.1.1 | 0x9db7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 08:58:37.837393045 CET | 192.168.2.6 | 1.1.1.1 | 0x337f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 08:57:51.494652033 CET | 1.1.1.1 | 192.168.2.6 | 0x9db7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 08:58:38.130964994 CET | 1.1.1.1 | 192.168.2.6 | 0x337f | No error (0) | 104.21.63.229 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 08:58:38.130964994 CET | 1.1.1.1 | 192.168.2.6 | 0x337f | No error (0) | 172.67.172.94 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49812 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:39 UTC | 263 | OUT | |
2024-12-24 07:58:39 UTC | 8 | OUT | |
2024-12-24 07:58:40 UTC | 1121 | IN | |
2024-12-24 07:58:40 UTC | 7 | IN | |
2024-12-24 07:58:40 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49818 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:41 UTC | 264 | OUT | |
2024-12-24 07:58:41 UTC | 76 | OUT | |
2024-12-24 07:58:42 UTC | 1121 | IN | |
2024-12-24 07:58:42 UTC | 248 | IN | |
2024-12-24 07:58:42 UTC | 1369 | IN | |
2024-12-24 07:58:42 UTC | 1369 | IN | |
2024-12-24 07:58:42 UTC | 1369 | IN | |
2024-12-24 07:58:42 UTC | 1369 | IN | |
2024-12-24 07:58:42 UTC | 1369 | IN | |
2024-12-24 07:58:42 UTC | 270 | IN | |
2024-12-24 07:58:42 UTC | 1369 | IN | |
2024-12-24 07:58:42 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49825 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:43 UTC | 279 | OUT | |
2024-12-24 07:58:43 UTC | 12838 | OUT | |
2024-12-24 07:58:44 UTC | 1133 | IN | |
2024-12-24 07:58:44 UTC | 20 | IN | |
2024-12-24 07:58:44 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49832 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:46 UTC | 277 | OUT | |
2024-12-24 07:58:46 UTC | 15072 | OUT | |
2024-12-24 07:58:46 UTC | 1119 | IN | |
2024-12-24 07:58:46 UTC | 20 | IN | |
2024-12-24 07:58:46 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49838 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:48 UTC | 281 | OUT | |
2024-12-24 07:58:48 UTC | 15331 | OUT | |
2024-12-24 07:58:48 UTC | 4623 | OUT | |
2024-12-24 07:58:49 UTC | 1127 | IN | |
2024-12-24 07:58:49 UTC | 20 | IN | |
2024-12-24 07:58:49 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49845 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:50 UTC | 282 | OUT | |
2024-12-24 07:58:50 UTC | 5479 | OUT | |
2024-12-24 07:58:51 UTC | 1123 | IN | |
2024-12-24 07:58:51 UTC | 20 | IN | |
2024-12-24 07:58:51 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49852 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:52 UTC | 279 | OUT | |
2024-12-24 07:58:52 UTC | 1204 | OUT | |
2024-12-24 07:58:53 UTC | 1130 | IN | |
2024-12-24 07:58:53 UTC | 20 | IN | |
2024-12-24 07:58:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49860 | 104.21.63.229 | 443 | 4512 | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 07:58:55 UTC | 276 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:55 UTC | 15331 | OUT | |
2024-12-24 07:58:57 UTC | 1125 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:57:45 |
Start date: | 24/12/2024 |
Path: | C:\Users\user\Desktop\LVDdWBGnVE.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'294'445 bytes |
MD5 hash: | 5A909C9769920208ED3D4D7279F08DE5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 02:57:46 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 02:57:46 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 02:57:47 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa70000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:57:47 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 02:57:48 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa70000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 02:57:48 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 02:57:48 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 02:57:48 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 02:57:48 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 11 |
Start time: | 02:57:49 |
Start date: | 24/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7f0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 12 |
Start time: | 02:57:49 |
Start date: | 24/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcb0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 26 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|