Edit tour
Windows
Analysis Report
Canvas of Kings_N6xC-S2.exe
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Compliance
Score: | 48 |
Range: | 0 - 100 |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Checks if browser processes are running
Checks if the current machine is a virtual machine (disk enumeration)
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to infect the boot sector
Creates an undocumented autostart registry key
Found stalling execution ending in API Sleep call
Modifies the windows firewall
Possible COM Object hijacking
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Writes many files with high entropy
Yara detected QueryWinSAT ClassID
AV process strings found (often used to terminate AV products)
Changes image file execution options
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Disables exception chain validation (SEHOP)
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file contains strange resources
PE file does not import any functions
PE file overlay found
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
query blbeacon for getting browser version
Classification
- System is w10x64
- Canvas of Kings_N6xC-S2.exe (PID: 6796 cmdline:
"C:\Users\ user\Deskt op\Canvas of Kings_N 6xC-S2.exe " MD5: AF45BC08A07F1BA16ABE59F29072EBCC) - Canvas of Kings_N6xC-S2.tmp (PID: 6836 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-8UD BG.tmp\Can vas of Kin gs_N6xC-S2 .tmp" /SL5 ="$20416,1 3566766,78 0800,C:\Us ers\user\D esktop\Can vas of Kin gs_N6xC-S2 .exe" MD5: 49312C19FA9B298CA2AE71E14F07CCF3) - saBSI.exe (PID: 3844 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-JAV 1C.tmp\pro d0_extract \saBSI.exe " /affid 9 1088 PaidD istributio n=true Cou ntryCode=U S MD5: 143255618462A577DE27286A272584E1) - avg_antivirus_free_setup.exe (PID: 6032 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-JAV 1C.tmp\pro d1_extract \avg_antiv irus_free_ setup.exe" /silent / ws /psh:92 pTu5hwBbM7 D8YdixE5Hh ZyLyta7SFj WzBoCRk5kn OtfwaHxtSx 8W5YVAbWE4 FqjuMlqeXq a53IPQ MD5: 26816AF65F2A3F1C61FB44C682510C97) - avg_antivirus_free_online_setup.exe (PID: 2124 cmdline:
"C:\Window s\Temp\asw .d8c2b19fc 2277941\av g_antiviru s_free_onl ine_setup. exe" /sile nt /ws /ps h:92pTu5hw BbM7D8Ydix E5HhZyLyta 7SFjWzBoCR k5knOtfwaH xtSx8W5YVA bWE4FqjuMl qeXqa53IPQ /cookie:m mm_irs_ppi _902_451_o /ga_clien tid:729de4 ae-763f-4d f7-a043-56 59222e822a /edat_dir :C:\Window s\Temp\asw .d8c2b19fc 2277941 MD5: 6EBB043BC04784DBC6DF3F4C52391CD0) - icarus.exe (PID: 7032 cmdline:
C:\Windows \Temp\asw- d762e71a-c 8aa-44ab-9 66e-2c9540 294724\com mon\icarus .exe /icar us-info-pa th:C:\Wind ows\Temp\a sw-d762e71 a-c8aa-44a b-966e-2c9 540294724\ icarus-inf o.xml /ins tall /sile nt /ws /ps h:92pTu5hw BbM7D8Ydix E5HhZyLyta 7SFjWzBoCR k5knOtfwaH xtSx8W5YVA bWE4FqjuMl qeXqa53IPQ /cookie:m mm_irs_ppi _902_451_o /edat_dir :C:\Window s\Temp\asw .d8c2b19fc 2277941 /t rack-guid: 729de4ae-7 63f-4df7-a 043-565922 2e822a MD5: A1FFFE3E9589CCFE629EB653F704A659) - norton_secure_browser_setup.exe (PID: 2724 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-JAV 1C.tmp\pro d2_extract \norton_se cure_brows er_setup.e xe" /s /ma ke-default /run_sour ce="norton _ppi_is" MD5: F269C5140CBC0E376CC7354A801DDD16) - NortonBrowserUpdateSetup.exe (PID: 1544 cmdline:
NortonBrow serUpdateS etup.exe / silent /in stall "bun dlename=No rton Priva te Browser &appguid={ 3A3642E6-D E46-4F68-9 887-AA017E EFE426}&ap pname=Nort on Private Browser&n eedsadmin= true&lang= en-GB&bran d=29239&in stallargs= --no-creat e-user-sho rtcuts --m ake-chrome -default - -force-def ault-win10 --auto-im port-data% 3Dchrome - -import-co okies --au to-launch- chrome" MD5: 2B07E26D3C33CD96FA825695823BBFA7) - NortonBrowserUpdate.exe (PID: 3060 cmdline:
"C:\Progra m Files (x 86)\GUMC55 7.tmp\Nort onBrowserU pdate.exe" /silent / install "b undlename= Norton Pri vate Brows er&appguid ={3A3642E6 -DE46-4F68 -9887-AA01 7EEFE426}& appname=No rton Priva te Browser &needsadmi n=true&lan g=en-GB&br and=29239& installarg s=--no-cre ate-user-s hortcuts - -make-chro me-default --force-d efault-win 10 --auto- import-dat a%3Dchrome --import- cookies -- auto-launc h-chrome" MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 5268 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /regsvc MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 1184 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /regserve r MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdateComRegisterShell64.exe (PID: 5808 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser UpdateComR egisterShe ll64.exe" MD5: 35BDDD897E9CF97CF4074A930F78E496) - NortonBrowserUpdateComRegisterShell64.exe (PID: 5168 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser UpdateComR egisterShe ll64.exe" MD5: 35BDDD897E9CF97CF4074A930F78E496) - NortonBrowserUpdateComRegisterShell64.exe (PID: 5632 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser UpdateComR egisterShe ll64.exe" MD5: 35BDDD897E9CF97CF4074A930F78E496) - NortonBrowserUpdate.exe (PID: 1344 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /ping PD9 4bWwgdmVyc 2lvbj0iMS4 wIiBlbmNvZ GluZz0iVVR GLTgiPz48c mVxdWVzdCB wcm90b2Nvb D0iMy4wIiB 1cGRhdGVyP SJPbWFoYSI gb21haGFpZ D0iezU4Mzd CMUE1LUI3M kEtNDU2QS1 CMDlGLUY2O DBFOUFCNUU wMn0iIHVwZ GF0ZXJ2ZXJ zaW9uPSIxL jguMTY0OS4 1IiBzaGVsb F92ZXJzaW9 uPSIxLjguM TY0OS41IiB pc21hY2hpb mU9IjEiIGl zX29tYWhhN jRiaXQ9IjA iIGlzX29zN jRiaXQ9IjE iIHNlc3Npb 25pZD0ie0N DMDExQUU3L UFBRTUtNDU 0My04NERCL UU0RDQ4MTM 1ODMzRH0iI HVzZXJpZD0 iezA4MDIwM kM2LTAzOTE tNDM2MC04O UUxLUMzQjg 2Nzc2RDEyN X0iIHVzZXJ pZF9kYXRlP SIyMDI0MTI yNCIgbWFja GluZWlkPSJ 7MDAwMEE1Q kYtREU0OC1 DNDM5LTg3R jAtNkQ4MTJ BQUJFMDk3f SIgbWFjaGl uZWlkX2Rhd GU9IjIwMjQ xMjI0IiBpb nN0YWxsc29 1cmNlPSJvd Ghlcmluc3R hbGxjbWQiI HRlc3Rzb3V yY2U9ImF1d G8iIHJlcXV lc3RpZD0ie 0JBMTMwMjR FLUQ1QUYtN DgxNi05OTQ 1LTA4Mzk0N zkxMEY5Rn0 iIGRlZHVwP SJjciIgZG9 tYWluam9pb mVkPSIwIj4 8aHcgcGh5c 21lbW9yeT0 iOCIgc3NlP SIxIiBzc2U yPSIxIiBzc 2UzPSIxIiB zc3NlMz0iM SIgc3NlNDE 9IjEiIHNzZ TQyPSIxIiB hdng9IjEiL z48b3MgcGx hdGZvcm09I ndpbiIgdmV yc2lvbj0iM TAuMC4xOTA 0NS4yMDA2I iBzcD0iIiB hcmNoPSJ4N jQiLz48YXB wIGFwcGlkP SJ7NTgzN0I xQTUtQjcyQ S00NTZBLUI wOUYtRjY4M EU5QUI1RTA yfSIgdmVyc 2lvbj0iIiB uZXh0dmVyc 2lvbj0iMS4 4LjE2NDkuN SIgbGFuZz0 iZW4tR0IiI GJyYW5kPSI yOTIzOSIgY 2xpZW50PSI iPjxldmVud CBldmVudHR 5cGU9IjIiI GV2ZW50cmV zdWx0PSIxI iBlcnJvcmN vZGU9IjAiI GV4dHJhY29 kZTE9IjAiI Gluc3RhbGx fdGltZV9tc z0iNjA5NCI vPjwvYXBwP jwvcmVxdWV zdD4 MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 5824 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /handoff "bundlenam e=Norton P rivate Bro wser&appgu id={3A3642 E6-DE46-4F 68-9887-AA 017EEFE426 }&appname= Norton Pri vate Brows er&needsad min=true&l ang=en-GB& brand=2923 9&installa rgs=--no-c reate-user -shortcuts --make-ch rome-defau lt --force -default-w in10 --aut o-import-d ata%3Dchro me --impor t-cookies --auto-lau nch-chrome " /install source oth erinstallc md /sessio nid "{CC01 1AE7-AAE5- 4543-84DB- E4D4813583 3D}" /sile nt MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - netsh.exe (PID: 3164 cmdline:
"netsh" fi rewall add allowedpr ogramC:\Us ers\user\A ppData\Loc al\Temp\is -JAV1C.tmp \qbittorre nt.exe "qB ittorrent" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - conhost.exe (PID: 6572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - qbittorrent.exe (PID: 4900 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-JAV 1C.tmp\qbi ttorrent.e xe" magnet :?xt=urn:b tih:BFF18A F5608F9196 CF05BF0C1F 0B54A18C3F 0A77 MD5: 22A34900ADA67EAD7E634EB693BD3095) - WerFault.exe (PID: 4444 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 836 -s 251 6 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 6752 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 836 -s 251 6 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 4336 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- svchost.exe (PID: 6196 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - WerFault.exe (PID: 3344 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 432 -p 68 36 -ip 683 6 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 6744 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 576 -p 68 36 -ip 683 6 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- NortonBrowserUpdate.exe (PID: 7084 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /c MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 2448 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /cr MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserCrashHandler.exe (PID: 5576 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser CrashHandl er.exe" MD5: 1694092D5DE0E0DAEF4C5EA13EA84CAB) - NortonBrowserCrashHandler64.exe (PID: 5544 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser CrashHandl er64.exe" MD5: 09621280025727AB4CB39BD6F6B2C69E)
- NortonBrowserUpdate.exe (PID: 4856 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /ua /inst allsource scheduler MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 1856 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /register msihelper MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 6188 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /uninstal l MD5: BF8FE62DBCD949547AF37EEE4ECE61FC)
- msiexec.exe (PID: 2312 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077)
- NortonBrowserUpdate.exe (PID: 2908 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /svc MD5: BF8FE62DBCD949547AF37EEE4ECE61FC)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
PlugXStrings | PlugX Identifying Strings | Seth Hardy |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_QueryWinSATClassID | Yara detected QueryWinSAT ClassID | Joe Security | ||
JoeSecurity_QueryWinSATClassID | Yara detected QueryWinSAT ClassID | Joe Security | ||
JoeSecurity_QueryWinSATClassID | Yara detected QueryWinSAT ClassID | Joe Security | ||
PlugXStrings | PlugX Identifying Strings | Seth Hardy |
|
System Summary |
---|
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T12:05:07.412675+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:10.931298+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:13.316916+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:15.044082+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:17.934719+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:20.603691+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:37.502033+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:41.070960+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49746 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:05:43.974596+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:06:02.333608+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49755 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:06:03.135653+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49756 | 44.228.210.164 | 443 | TCP |
2024-12-24T12:06:05.321072+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49762 | 65.9.108.223 | 443 | TCP |
2024-12-24T12:06:05.668153+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49763 | 44.228.210.164 | 443 | TCP |
2024-12-24T12:06:08.293482+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49772 | 65.9.108.105 | 443 | TCP |
2024-12-24T12:06:10.938967+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49783 | 34.117.223.223 | 443 | TCP |
2024-12-24T12:06:12.737133+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49786 | 44.228.210.164 | 443 | TCP |
2024-12-24T12:06:12.767531+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49792 | 34.117.223.223 | 443 | TCP |
2024-12-24T12:06:13.851146+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49794 | 65.9.108.105 | 443 | TCP |
2024-12-24T12:06:28.531857+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49846 | 104.20.86.8 | 443 | TCP |
2024-12-24T12:06:28.967250+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49845 | 44.228.210.164 | 443 | TCP |
2024-12-24T12:06:48.949653+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49907 | 34.117.223.223 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Code function: | 5_2_00085870 | |
Source: | Code function: | 5_2_00086220 | |
Source: | Code function: | 5_2_000867B0 | |
Source: | Code function: | 6_2_0047B0E0 | |
Source: | Code function: | 6_2_00479250 | |
Source: | Code function: | 6_2_004782F0 | |
Source: | Code function: | 6_2_00479450 | |
Source: | Code function: | 6_2_00478DC0 | |
Source: | Code function: | 6_2_00479020 | |
Source: | Code function: | 6_2_00478260 | |
Source: | Code function: | 6_2_00479340 | |
Source: | Code function: | 6_2_004794D0 | |
Source: | Code function: | 6_2_00492660 | |
Source: | Code function: | 6_2_00478EF0 | |
Source: | Code function: | 7_2_6AF1617F | |
Source: | Code function: | 8_2_008309E0 | |
Source: | Code function: | 8_2_007FDF30 |
Source: | Binary or memory string: | memstr_0e0360d0-9 |
Compliance |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | Code function: | 7_2_00405B6C | |
Source: | Code function: | 7_2_004028D5 | |
Source: | Code function: | 7_2_0040679D | |
Source: | Code function: | 7_2_6B0B7010 | |
Source: | Code function: | 8_2_007F6F60 | |
Source: | Code function: | 8_2_007EE180 | |
Source: | Code function: | 8_2_007F4590 | |
Source: | Code function: | 8_2_00820AC0 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 7_2_6B0B91E0 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: |