Windows
Analysis Report
pwn.dll.dll
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll64.exe (PID: 7872 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\pwn .dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52) - conhost.exe (PID: 7880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7964 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\pwn .dll.dll", #1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - rundll32.exe (PID: 7988 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\pwn. dll.dll",# 1 MD5: EF3179D498793BF4234F708D3BE28633) - wermgr.exe (PID: 8020 cmdline:
wermgr.exe MD5: 74A0194782E039ACE1F7349544DC1CF4) - rundll32.exe (PID: 7972 cmdline:
rundll32.e xe C:\User s\user\Des ktop\pwn.d ll.dll,LRD CP MD5: EF3179D498793BF4234F708D3BE28633) - wermgr.exe (PID: 8012 cmdline:
wermgr.exe MD5: 74A0194782E039ACE1F7349544DC1CF4) - rundll32.exe (PID: 8176 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\pwn. dll.dll",L RDCP MD5: EF3179D498793BF4234F708D3BE28633) - wermgr.exe (PID: 7172 cmdline:
wermgr.exe MD5: 74A0194782E039ACE1F7349544DC1CF4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Cobalt Strike, CobaltStrike | Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable. |
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 15285, "MaxGetSize": 2101826, "Jitter": 39, "C2Server": "www.service-ad.pro,/sub/ccs/NDNZH1WD1", "HttpPostUri": "/Enable/docs41/VGZ8YK523L2G", "Malleable_C2_Instructions": ["Remove 2052 bytes from the end", "Remove 2614 bytes from the beginning", "NetBIOS decode 'a'", "XOR mask w/ random key"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\DevicePairingWizard.exe", "Spawnto_x64": "%windir%\\sysnative\\Locator.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 666666666, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 9409, "ProcInject_PrependAppend_x86": ["Dx+EAAAAAAAPH0AAUFgPH0AADx+EAAAAAAA=", "Dx+AAAAAAA8fAGaQUFgPH0QAAA8fAA8fRAAADx9AAGaQDx+AAAAAAA8fAA8fRAAADx8A"], "ProcInject_PrependAppend_x64": ["UFgPH0AAZg8fRAAAkGaQZg8fRAAAZpBmkA8fgAAAAAAPH0AADx9AAA8fQAAPHwBmDx+EAAAAAABmDx+EAAAAAAAPH4AAAAAADx9AAA8fgAAAAAA=", "ZpAPHwBmDx9EAABmDx9EAABmkA8fRAAADx+EAAAAAAAPH0QAAGYPH0QAAA8fhAAAAAAAkA=="], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CobaltStrike_3 | Yara detected CobaltStrike | Joe Security | ||
Windows_Trojan_CobaltStrike_b54b94ac | Rule for beacon sleep obfuscation routine | unknown |
| |
JoeSecurity_CobaltStrike_3 | Yara detected CobaltStrike | Joe Security | ||
Windows_Trojan_CobaltStrike_b54b94ac | Rule for beacon sleep obfuscation routine | unknown |
| |
JoeSecurity_CobaltStrike_3 | Yara detected CobaltStrike | Joe Security | ||
Click to see the 31 entries |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 6_3_0000026E033C52AD | |
Source: | Code function: | 6_3_0000026E033C64DF | |
Source: | Code function: | 6_3_0000026E033C4974 | |
Source: | Code function: | 6_2_0000026E03400000 | |
Source: | Code function: | 6_2_0000026E037A201C | |
Source: | Code function: | 6_2_0000026E037A0EE4 | |
Source: | Code function: | 6_2_0000026E037986B0 | |
Source: | Code function: | 6_2_0000026E037A15A8 | |
Source: | Code function: | 6_2_0000026E03796BB8 | |
Source: | Code function: | 6_2_0000026E037ACC70 | |
Source: | Code function: | 6_2_0000026E037AC300 | |
Source: | Code function: | 6_2_0000026E0379F228 | |
Source: | Code function: | 6_2_0000026E037991EF | |
Source: | Code function: | 6_2_0000026E03799297 | |
Source: | Code function: | 7_3_0000015A06FB64DF | |
Source: | Code function: | 7_3_0000015A06FB4974 | |
Source: | Code function: | 7_3_0000015A06FB52AD | |
Source: | Code function: | 7_2_0000015A06FF0000 | |
Source: | Code function: | 7_2_0000015A072F15A8 | |
Source: | Code function: | 7_2_0000015A072FCC70 | |
Source: | Code function: | 7_2_0000015A072E6BB8 | |
Source: | Code function: | 7_2_0000015A072EF228 | |
Source: | Code function: | 7_2_0000015A072E9297 | |
Source: | Code function: | 7_2_0000015A072FC300 | |
Source: | Code function: | 7_2_0000015A072E91EF | |
Source: | Code function: | 7_2_0000015A072F201C | |
Source: | Code function: | 7_2_0000015A072E86B0 | |
Source: | Code function: | 7_2_0000015A072F0EE4 | |
Source: | Code function: | 10_3_000002963CDA4974 | |
Source: | Code function: | 10_3_000002963CDA64DF | |
Source: | Code function: | 10_3_000002963CDA52AD | |
Source: | Code function: | 10_2_000002963D080000 | |
Source: | Code function: | 10_2_000002963D2315A8 | |
Source: | Code function: | 10_2_000002963D23CC70 | |
Source: | Code function: | 10_2_000002963D230EE4 | |
Source: | Code function: | 10_2_000002963D2286B0 | |
Source: | Code function: | 10_2_000002963D23201C | |
Source: | Code function: | 10_2_000002963D23C300 | |
Source: | Code function: | 10_2_000002963D226BB8 | |
Source: | Code function: | 10_2_000002963D2291EF | |
Source: | Code function: | 10_2_000002963D22F228 | |
Source: | Code function: | 10_2_000002963D229297 |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 6_3_0000026E033C47D3 | |
Source: | Code function: | 6_3_0000026E033C1FDD | |
Source: | Code function: | 6_3_0000026E033C6016 | |
Source: | Code function: | 6_3_0000026E033C5457 | |
Source: | Code function: | 6_3_0000026E033C6016 | |
Source: | Code function: | 6_3_0000026E033C15E5 | |
Source: | Code function: | 6_3_0000026E033C2211 | |
Source: | Code function: | 6_3_0000026E033C6602 | |
Source: | Code function: | 6_3_0000026E033C5D73 | |
Source: | Code function: | 6_2_0000026E03799043 | |
Source: | Code function: | 6_2_0000026E0378979F | |
Source: | Code function: | 6_2_0000026E03798646 | |
Source: | Code function: | 6_2_0000026E037995F2 | |
Source: | Code function: | 6_2_0000026E0378ADD9 | |
Source: | Code function: | 6_2_0000026E037893DE | |
Source: | Code function: | 6_2_0000026E037994A6 | |
Source: | Code function: | 6_2_0000026E037994A6 | |
Source: | Code function: | 6_2_0000026E037AA919 | |
Source: | Code function: | 6_2_0000026E037AA8F0 | |
Source: | Code function: | 6_2_0000026E037AA8D0 | |
Source: | Code function: | 6_2_0000026E0378B99D | |
Source: | Code function: | 6_2_0000026E0378F982 | |
Source: | Code function: | 7_3_0000015A06FB5457 | |
Source: | Code function: | 7_3_0000015A06FB2211 | |
Source: | Code function: | 7_3_0000015A06FB6602 | |
Source: | Code function: | 7_3_0000015A06FB15E5 | |
Source: | Code function: | 7_3_0000015A06FB5D73 | |
Source: | Code function: | 7_3_0000015A06FB6016 | |
Source: | Code function: | 7_3_0000015A06FB47D3 | |
Source: | Code function: | 7_3_0000015A06FB1FDD | |
Source: | Code function: | 7_3_0000015A06FB6016 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread created: | Jump to behavior | ||
Source: | Thread created: | Jump to behavior | ||
Source: | Thread created: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 6_2_0000026E03794EA8 |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 311 Process Injection | 11 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 Security Software Discovery | Remote Services | 1 Archive Collected Data | 12 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 311 Process Injection | LSASS Memory | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 Account Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 12 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Rundll32 | NTDS | 1 System Owner/User Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
19% | Virustotal | Browse | ||
47% | ReversingLabs | Win64.Backdoor.Cobeacon |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0035.t-0009.t-msedge.net | 13.107.246.63 | true | false | high | |
www.service-ad.pro | 54.173.64.206 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
54.173.64.206 | www.service-ad.pro | United States | 14618 | AMAZON-AESUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580305 |
Start date and time: | 2024-12-24 09:04:27 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | pwn.dll.dll (renamed file extension from exe to dll) |
Original Sample Name: | pwn.dll.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winDLL@16/0@1/1 |
EGA Information: |
|
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 172.202.163.200
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
03:05:22 | API Interceptor | |
03:06:49 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0035.t-0009.t-msedge.net | Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | HTMLPhisher, TechSupportScam | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-AESUS | Get hash | malicious | LodaRAT | Browse |
| |
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 6.249570982937299 |
TrID: |
|
File name: | pwn.dll.dll |
File size: | 2'961'425 bytes |
MD5: | 2f8dd834b75bbf2ebf0be0b114c77521 |
SHA1: | 32e1a98a551916f1ace9e2ff3018fa065122ba71 |
SHA256: | 31a2bd9b628a18a8e38d0a125bd56d958c9cb097da214d67560f8caae1a84032 |
SHA512: | 498bea3e769f021958f8ec3d397f354bc5374417491b5d5b538f80d2605c5a2676bb2ef4d5e0bcf026acc3ebff17e85f48b5e86ebecad87f536d81697e3bc2e0 |
SSDEEP: | 49152:SiEC6uOSWZ/pFnvkp8rHNClssJn1Q8FXpoEzgf7fA:FbspFnvkp1s4XpoEzgf7fA |
TLSH: | 27D5094369DB0DA5DED677BCA2C35335A778FD35CA291F2BAA08C13129536C4AD1EB00 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Acg.z........& ...*.......................f.............................`........-...`... ............................ |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x366e91292 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x366e90000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE, DLL |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x676341AA [Wed Dec 18 21:42:02 2024 UTC] |
TLS Callbacks: | 0x66e9b560, 0x3, 0x66e9b620, 0x3, 0x66eaa3ee, 0x3 |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 9c0bc9bd0a50ec0d7df40f8d51bcddec |
Instruction |
---|
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 20h |
dec eax |
mov dword ptr [ebp+10h], ecx |
mov dword ptr [ebp+18h], edx |
dec esp |
mov dword ptr [ebp+20h], eax |
dec eax |
mov eax, dword ptr [00114014h] |
mov dword ptr [eax], 00000000h |
dec eax |
mov ecx, dword ptr [ebp+20h] |
mov edx, dword ptr [ebp+18h] |
dec eax |
mov eax, dword ptr [ebp+10h] |
dec ecx |
mov eax, ecx |
dec eax |
mov ecx, eax |
call 00007F6A4CD34A9Bh |
dec eax |
add esp, 20h |
pop ebp |
ret |
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 30h |
dec eax |
mov dword ptr [ebp+10h], ecx |
mov dword ptr [ebp+18h], edx |
dec esp |
mov dword ptr [ebp+20h], eax |
mov dword ptr [ebp-04h], 00000001h |
dec eax |
mov eax, dword ptr [00113FF1h] |
mov edx, dword ptr [ebp+18h] |
mov dword ptr [eax], edx |
cmp dword ptr [ebp+18h], 00000000h |
jne 00007F6A4CD34AA8h |
mov eax, dword ptr [0013FD00h] |
test eax, eax |
jne 00007F6A4CD34A9Eh |
mov dword ptr [ebp-04h], 00000000h |
jmp 00007F6A4CD34BD6h |
call 00007F6A4CD3F5E8h |
cmp dword ptr [ebp+18h], 01h |
je 00007F6A4CD34A98h |
cmp dword ptr [ebp+18h], 02h |
jne 00007F6A4CD34AFBh |
dec eax |
mov ecx, dword ptr [ebp+20h] |
mov edx, dword ptr [ebp+18h] |
dec eax |
mov eax, dword ptr [ebp+10h] |
dec ecx |
mov eax, ecx |
dec eax |
mov ecx, eax |
call 00007F6A4CD3477Bh |
mov dword ptr [ebp-04h], eax |
cmp dword ptr [ebp-04h], 00000000h |
je 00007F6A4CD34B9Ch |
dec eax |
mov ecx, dword ptr [ebp+20h] |
mov edx, dword ptr [ebp+18h] |
dec eax |
mov eax, dword ptr [ebp+10h] |
dec ecx |
mov eax, ecx |
dec eax |
mov ecx, eax |
call 00007F6A4CD4075Bh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x142000 | 0x40 | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x143000 | 0x190c | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x123000 | 0xc12c | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x147000 | 0x1640 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x113cc0 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x143648 | 0x530 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xbea28 | 0xbec00 | 0a9355d24f0e54ef3995145ebeb79915 | False | 0.3478879116153342 | data | 6.139638316650916 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0xc0000 | 0x3080 | 0x3200 | d7d25c99683f900c18ca46358cdaf886 | False | 0.02796875 | dBase III DBT, version number 0, next free block index 1, 1st item "\320-\353f\003" | 0.3744154107590934 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0xc4000 | 0x5d4f0 | 0x5d600 | eab27f141125611bb26524ef6550575b | False | 0.7583171226572959 | data | 7.643759419563151 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
/4 | 0x122000 | 0x4 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x123000 | 0xc12c | 0xc200 | cd7b0492f8a8f1c8f2ebf7a96cc64817 | False | 0.5144772873711341 | data | 5.949220732775683 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.xdata | 0x130000 | 0x10bf0 | 0x10c00 | add6697e8161d4ff7ad3fd3da3f32ae8 | False | 0.18661089085820895 | , SYS \003\001P | 4.886387418702516 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.bss | 0x141000 | 0xd20 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0x142000 | 0x40 | 0x200 | 4b01f7ea2691d093afa17124eeb17546 | False | 0.119140625 | data | 0.6720558129187144 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.idata | 0x143000 | 0x190c | 0x1a00 | 433be6924348010807170ccdcfb26697 | False | 0.3046875 | data | 4.3852150569721156 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0x145000 | 0x60 | 0x200 | 58d7a8c2e21102f787b5225a72e0a126 | False | 0.068359375 | data | 0.345979103835012 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x146000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x147000 | 0x1640 | 0x1800 | a07e6e96b1231be730509c2d725e41dd | False | 0.3894856770833333 | data | 5.325942218419584 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/14 | 0x149000 | 0xd0 | 0x200 | e69c9c5c78c1b91a826abcec04b38c2b | False | 0.158203125 | data | 0.8801018156738997 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/29 | 0x14a000 | 0x46f9 | 0x4800 | d77bfc4f43021a61a2ec944cc68856c3 | False | 0.3791775173611111 | Matlab v4 mat-file (little endian) f\003, rows 134283269, columns 0, imaginary | 5.867887116880315 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/41 | 0x14f000 | 0x8a5 | 0xa00 | 8c412e1ec809bc2d22840ac0c0dd9436 | False | 0.326953125 | data | 4.517567710861818 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/55 | 0x150000 | 0x97f | 0xa00 | d285d6cd0db463fcb80331454a301ba0 | False | 0.541015625 | data | 4.818092440198135 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/67 | 0x151000 | 0x498 | 0x600 | 05aaae4054744240010da927faed8496 | False | 0.3470052083333333 | data | 3.2931908827991117 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/80 | 0x152000 | 0xce | 0x200 | 292217cd9caa0647d900f44faf753dd5 | False | 0.34375 | data | 2.8722615854557496 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/91 | 0x153000 | 0x461 | 0x600 | 75a450f8317627827fe1cca60ebb0ae6 | False | 0.181640625 | data | 4.17072784657899 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/107 | 0x154000 | 0x88b | 0xa00 | fb732459dfa7f47d77bcbc5dc4c8ca68 | False | 0.399609375 | data | 4.243449352096334 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/123 | 0x155000 | 0x108 | 0x200 | d2c23f33ed4b9902afd81a6cb72499db | False | 0.291015625 | data | 2.5304828581562533 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
KERNEL32.dll | AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateProcessA, CreateRemoteThread, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FormatMessageA, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetHandleInformation, GetLastError, GetModuleHandleA, GetProcAddress, GetProcessAffinityMask, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount64, InitializeCriticalSection, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, RaiseException, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, Sleep, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAllocEx, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte, WriteProcessMemory, __C_specific_handler |
api-ms-win-crt-convert-l1-1-0.dll | _ultoa, mbrtowc, strtoul, wcrtomb |
api-ms-win-crt-environment-l1-1-0.dll | __p__environ, __p__wenviron, getenv |
api-ms-win-crt-filesystem-l1-1-0.dll | _fstat64 |
api-ms-win-crt-heap-l1-1-0.dll | _set_new_mode, calloc, free, malloc, realloc |
api-ms-win-crt-locale-l1-1-0.dll | ___lc_codepage_func, ___mb_cur_max_func, localeconv, setlocale |
api-ms-win-crt-math-l1-1-0.dll | _fdopen |
api-ms-win-crt-private-l1-1-0.dll | __intrinsic_setjmpex, longjmp, memchr, memcmp, memcpy, memmove, strchr |
api-ms-win-crt-runtime-l1-1-0.dll | __p___argc, __p___argv, __p___wargv, _beginthreadex, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _endthreadex, _errno, _execute_onexit_table, _exit, _initialize_narrow_environment, _initialize_onexit_table, _initialize_wide_environment, _initterm, _register_onexit_function, abort, exit, signal, strerror |
api-ms-win-crt-stdio-l1-1-0.dll | __acrt_iob_func, __stdio_common_vfprintf, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vswprintf, _fileno, _fseeki64, _ftelli64, _lseeki64, _read, _wfopen, _write, fclose, fflush, fgetwc, fopen, fputc, fputs, fread, fwrite, getc, getwc, putc, putwc, setvbuf, ungetc, ungetwc |
api-ms-win-crt-string-l1-1-0.dll | _strdup, iswctype, memset, strcmp, strcoll, strlen, strncmp, strxfrm, towlower, towupper, wcscoll, wcslen, wcsxfrm |
api-ms-win-crt-time-l1-1-0.dll | __daylight, __timezone, __tzname, _tzset, strftime, wcsftime |
api-ms-win-crt-utility-l1-1-0.dll | rand_s |
Name | Ordinal | Address |
---|---|---|
LRDCP | 1 | 0x366e915a0 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 09:05:22.564690113 CET | 49717 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:22.564724922 CET | 443 | 49717 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:05:22.564836025 CET | 49717 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:22.565562010 CET | 49718 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:22.565607071 CET | 443 | 49718 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:05:22.565671921 CET | 49718 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:22.597518921 CET | 49717 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:22.597536087 CET | 443 | 49717 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:05:22.597542048 CET | 49718 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:22.597558975 CET | 443 | 49718 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:05:23.599489927 CET | 49719 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:23.599529028 CET | 443 | 49719 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:05:23.599647045 CET | 49719 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:23.610647917 CET | 49719 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:05:23.610663891 CET | 443 | 49719 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.634749889 CET | 443 | 49718 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.634751081 CET | 443 | 49717 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.634865999 CET | 49717 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.635004997 CET | 49717 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.635010958 CET | 49718 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.635010958 CET | 49718 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.635021925 CET | 443 | 49717 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.644053936 CET | 49817 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.644088984 CET | 443 | 49817 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.644155025 CET | 49817 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.644490004 CET | 49817 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.644499063 CET | 443 | 49817 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.651016951 CET | 49818 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.651071072 CET | 443 | 49818 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.651158094 CET | 49818 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.651364088 CET | 49818 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.651385069 CET | 443 | 49818 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:06.940416098 CET | 49718 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:06.940460920 CET | 443 | 49718 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:07.648211002 CET | 443 | 49719 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:07.648300886 CET | 49719 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:07.648426056 CET | 49719 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:07.648446083 CET | 443 | 49719 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:07.667735100 CET | 49823 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:07.667781115 CET | 443 | 49823 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:07.667897940 CET | 49823 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:07.668205976 CET | 49823 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:07.668224096 CET | 443 | 49823 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.664397955 CET | 443 | 49818 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.667525053 CET | 49818 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.667622089 CET | 49818 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.667634964 CET | 443 | 49818 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.673118114 CET | 49921 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.673150063 CET | 443 | 49921 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.673216105 CET | 49921 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.673273087 CET | 49921 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.673299074 CET | 443 | 49921 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.673603058 CET | 49921 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.695779085 CET | 443 | 49817 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.695847034 CET | 49817 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.695924997 CET | 49817 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.695936918 CET | 443 | 49817 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.712044954 CET | 49922 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.712074041 CET | 443 | 49922 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.712142944 CET | 49922 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.712177992 CET | 49922 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.712229013 CET | 443 | 49922 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.712460995 CET | 49922 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.801861048 CET | 49923 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.801923037 CET | 443 | 49923 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.802051067 CET | 49923 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.802333117 CET | 49923 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.802347898 CET | 443 | 49923 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.833062887 CET | 49924 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.833122015 CET | 443 | 49924 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:50.833235979 CET | 49924 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.833554029 CET | 49924 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:50.833568096 CET | 443 | 49924 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:51.727015018 CET | 443 | 49823 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:51.727106094 CET | 49823 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.727207899 CET | 49823 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.727229118 CET | 443 | 49823 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:51.730047941 CET | 49927 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.730156898 CET | 443 | 49927 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:51.730249882 CET | 49927 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.730320930 CET | 49927 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.730391026 CET | 443 | 49927 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:51.730442047 CET | 49927 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.849788904 CET | 49928 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.849809885 CET | 443 | 49928 | 54.173.64.206 | 192.168.2.9 |
Dec 24, 2024 09:06:51.849865913 CET | 49928 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.850275040 CET | 49928 | 443 | 192.168.2.9 | 54.173.64.206 |
Dec 24, 2024 09:06:51.850282907 CET | 443 | 49928 | 54.173.64.206 | 192.168.2.9 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 09:05:22.212398052 CET | 58175 | 53 | 192.168.2.9 | 1.1.1.1 |
Dec 24, 2024 09:05:22.547111988 CET | 53 | 58175 | 1.1.1.1 | 192.168.2.9 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 09:05:22.212398052 CET | 192.168.2.9 | 1.1.1.1 | 0xa9e6 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 09:05:16.384417057 CET | 1.1.1.1 | 192.168.2.9 | 0xe39f | No error (0) | s-part-0035.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 24, 2024 09:05:16.384417057 CET | 1.1.1.1 | 192.168.2.9 | 0xe39f | No error (0) | 13.107.246.63 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 09:05:22.547111988 CET | 1.1.1.1 | 192.168.2.9 | 0xa9e6 | No error (0) | 54.173.64.206 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 03:05:18 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff607b70000 |
File size: | 165'888 bytes |
MD5 hash: | 763455F9DCB24DFEECC2B9D9F8D46D52 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 03:05:19 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70f010000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:05:19 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff656220000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 03:05:19 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff752900000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:05:19 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff752900000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:05:19 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\wermgr.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff61efb0000 |
File size: | 229'728 bytes |
MD5 hash: | 74A0194782E039ACE1F7349544DC1CF4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 7 |
Start time: | 03:05:19 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\wermgr.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff61efb0000 |
File size: | 229'728 bytes |
MD5 hash: | 74A0194782E039ACE1F7349544DC1CF4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 9 |
Start time: | 03:05:22 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff752900000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 03:05:22 |
Start date: | 24/12/2024 |
Path: | C:\Windows\System32\wermgr.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff61efb0000 |
File size: | 229'728 bytes |
MD5 hash: | 74A0194782E039ACE1F7349544DC1CF4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |
Execution Graph
Execution Coverage: | 1.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 7.1% |
Total number of Nodes: | 563 |
Total number of Limit Nodes: | 29 |
Graph
Function 0000026E03794EA8 Relevance: 4.7, APIs: 3, Instructions: 190stringCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0378E094 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 103networkCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0378DAC8 Relevance: 3.2, APIs: 2, Instructions: 159networkCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0379C36C Relevance: 1.3, APIs: 1, Instructions: 75COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A201C Relevance: 30.8, APIs: 15, Strings: 2, Instructions: 1030COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A15A8 Relevance: 29.0, APIs: 15, Strings: 1, Instructions: 1022COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E03796BB8 Relevance: 13.3, APIs: 10, Instructions: 790COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0379F228 Relevance: 1.8, APIs: 1, Instructions: 304COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037ACC70 Relevance: .8, Instructions: 783COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037AC300 Relevance: .8, Instructions: 761COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E033C64DF Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E033C52AD Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037986B0 Relevance: .1, Instructions: 115COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037991EF Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A5E9C Relevance: 16.6, APIs: 11, Instructions: 108COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A6C88 Relevance: 15.1, APIs: 10, Instructions: 93COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A6B10 Relevance: 15.1, APIs: 10, Instructions: 89COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A54B4 Relevance: 13.6, APIs: 9, Instructions: 89COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A4CD8 Relevance: 13.6, APIs: 9, Instructions: 71COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0379EFEC Relevance: 12.6, APIs: 10, Instructions: 116COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0378368C Relevance: 11.6, APIs: 9, Instructions: 305COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0379EE90 Relevance: 10.6, APIs: 7, Instructions: 107COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A97BC Relevance: 10.6, APIs: 7, Instructions: 78COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0379FB90 Relevance: 9.3, APIs: 6, Instructions: 257COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E03792274 Relevance: 9.0, APIs: 7, Instructions: 264stringCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037831F0 Relevance: 8.9, APIs: 7, Instructions: 181COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0378BAF4 Relevance: 7.9, APIs: 6, Instructions: 411COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E03784570 Relevance: 7.7, APIs: 6, Instructions: 175COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A141C Relevance: 7.6, APIs: 5, Instructions: 149COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E037A966C Relevance: 7.5, APIs: 5, Instructions: 41COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0378DC84 Relevance: 6.5, APIs: 5, Instructions: 254COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0379F6AC Relevance: 6.2, APIs: 4, Instructions: 194COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E03780150 Relevance: 6.1, APIs: 4, Instructions: 90COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E0379E8E0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E03799DC4 Relevance: 5.2, APIs: 4, Instructions: 226COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000026E03783380 Relevance: 5.2, APIs: 4, Instructions: 179COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 1.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 562 |
Total number of Limit Nodes: | 29 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072E4EA8 Relevance: 4.7, APIs: 3, Instructions: 190stringCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072DE094 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 103networkCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072DDAC8 Relevance: 3.2, APIs: 2, Instructions: 159networkCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072EC36C Relevance: 1.3, APIs: 1, Instructions: 75COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F5E9C Relevance: 16.6, APIs: 11, Instructions: 108COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F6C88 Relevance: 15.1, APIs: 10, Instructions: 93COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F6B10 Relevance: 15.1, APIs: 10, Instructions: 88COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F54B4 Relevance: 13.6, APIs: 9, Instructions: 89COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F4CD8 Relevance: 13.6, APIs: 9, Instructions: 71COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072EEFEC Relevance: 12.6, APIs: 10, Instructions: 116COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072D368C Relevance: 11.6, APIs: 9, Instructions: 305COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072EEE90 Relevance: 10.6, APIs: 7, Instructions: 107COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F97BC Relevance: 10.6, APIs: 7, Instructions: 78COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072EFB90 Relevance: 9.3, APIs: 6, Instructions: 257COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072E2274 Relevance: 9.0, APIs: 7, Instructions: 264stringCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072D31F0 Relevance: 8.9, APIs: 7, Instructions: 181COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072DBAF4 Relevance: 7.9, APIs: 6, Instructions: 411COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072D4570 Relevance: 7.7, APIs: 6, Instructions: 175COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F141C Relevance: 7.6, APIs: 5, Instructions: 149COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072F966C Relevance: 7.5, APIs: 5, Instructions: 41COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072DDC84 Relevance: 6.5, APIs: 5, Instructions: 254COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072EF6AC Relevance: 6.2, APIs: 4, Instructions: 194COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072D0150 Relevance: 6.1, APIs: 4, Instructions: 90COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072EE8E0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072E9DC4 Relevance: 5.2, APIs: 4, Instructions: 226COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000015A072D3380 Relevance: 5.2, APIs: 4, Instructions: 179COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 1.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 563 |
Total number of Limit Nodes: | 29 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D224EA8 Relevance: 4.7, APIs: 3, Instructions: 190stringCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D21E094 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 103networkCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D21DAC8 Relevance: 3.2, APIs: 2, Instructions: 159networkCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D22C36C Relevance: 1.3, APIs: 1, Instructions: 75COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D235E9C Relevance: 16.6, APIs: 11, Instructions: 108COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D236C88 Relevance: 15.1, APIs: 10, Instructions: 93COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D236B10 Relevance: 15.1, APIs: 10, Instructions: 88COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D2354B4 Relevance: 13.6, APIs: 9, Instructions: 89COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D234CD8 Relevance: 13.6, APIs: 9, Instructions: 71COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D22EFEC Relevance: 12.6, APIs: 10, Instructions: 116COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D21368C Relevance: 11.6, APIs: 9, Instructions: 305COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D22EE90 Relevance: 10.6, APIs: 7, Instructions: 107COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D2397BC Relevance: 10.6, APIs: 7, Instructions: 78COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D22FB90 Relevance: 9.3, APIs: 6, Instructions: 257COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D222274 Relevance: 9.0, APIs: 7, Instructions: 264stringCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D2131F0 Relevance: 8.9, APIs: 7, Instructions: 181COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D21BAF4 Relevance: 7.9, APIs: 6, Instructions: 411COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D214570 Relevance: 7.7, APIs: 6, Instructions: 175COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D23141C Relevance: 7.6, APIs: 5, Instructions: 149COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D23966C Relevance: 7.5, APIs: 5, Instructions: 41COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D21DC84 Relevance: 6.5, APIs: 5, Instructions: 254COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D22F6AC Relevance: 6.2, APIs: 4, Instructions: 194COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D210150 Relevance: 6.1, APIs: 4, Instructions: 90COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D22E8E0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D229DC4 Relevance: 5.2, APIs: 4, Instructions: 226COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002963D213380 Relevance: 5.2, APIs: 4, Instructions: 179COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|