Windows
Analysis Report
Set-up.exe
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Set-up.exe (PID: 7540 cmdline:
"C:\Users\ user\Deskt op\Set-up. exe" MD5: 91E7814911367EB7CBFA0E57F9BEEAF8) - cmd.exe (PID: 7580 cmdline:
"C:\Window s\System32 \cmd.exe" /c move To ol Tool.cm d & Tool.c md MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7588 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7644 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7652 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7728 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7736 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7772 cmdline:
cmd /c md 8429 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 7788 cmdline:
extrac32 / Y /E Magni ficent MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 7812 cmdline:
findstr /V "Subsidia ry" Sharin g MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7828 cmdline:
cmd /c cop y /b ..\Fa cilitate + ..\Girlfr iend + ..\ Id + ..\Pa id + ..\Se nsor + ..\ Channel + ..\Scroll k MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Functions.com (PID: 7844 cmdline:
Functions. com k MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 7860 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-25T22:44:54.031217+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:55.986825+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:58.268166+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:00.607499+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:02.692006+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:05.173993+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:07.174641+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49751 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:09.433794+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49757 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:12.472873+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49763 | 172.67.158.190 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-25T22:44:54.761975+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:56.793498+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 172.67.158.190 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-25T22:44:54.761975+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.158.190 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-25T22:44:56.793498+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 172.67.158.190 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-25T22:44:59.182411+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 172.67.158.190 | 443 | TCP |
Click to jump to signature section
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 11 Input Capture | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
6% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
locketsashayz.click | 172.67.158.190 | true | true | unknown | |
AmbFabOJkVOtJKbeUCnvdoZI.AmbFabOJkVOtJKbeUCnvdoZI | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.158.190 | locketsashayz.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580747 |
Start date and time: | 2024-12-25 22:43:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 43s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Set-up.exe |
Detection: | MAL |
Classification: | mal96.troj.spyw.evad.winEXE@24/21@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
16:44:07 | API Interceptor | |
16:44:11 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\8429\Functions.com | Get hash | malicious | Vidar | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RedLine, Stealc | Browse | |||
Get hash | malicious | Vidar | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 477405 |
Entropy (8bit): | 7.9996261675374845 |
Encrypted: | true |
SSDEEP: | 6144:0SvcRrMxl2Bnsnz4TcItTD+17JHSGg0rb6Pki2Pj3qIo/2gGyCJt6+FUAD3Y5N:hElszNoGQ822/kw6+mq3O |
MD5: | 78C8E2EC23BA94D7B2A1D79620E97AF7 |
SHA1: | 313AD066888A700427D2E45871E039850DA14131 |
SHA-256: | 81CB5681BC834B296F5C14A9C3D15B1EAFBA1122051372CE8A6BB12C68C886BA |
SHA-512: | FAD8423F2D2446C16525B67148637C058A1C99EB08D4419FEE24A48A3A68ADD41A82A81E69FCC593C9D45B90B3F9E86CBE3FEAFE5E47A74ED72C0CE03BF30BD9 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 42330 |
Entropy (8bit): | 7.118745431703906 |
Encrypted: | false |
SSDEEP: | 768:MGmd9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:MGmdATGODv7xvTphAiPChgZ2kOE6 |
MD5: | 285F6DD5DC5B4C46336504FBA3601E53 |
SHA1: | AF019212787F6509124DDA21AD7CC36B8C9303A4 |
SHA-256: | 93E9D8C181A051BAD1010C93AA6F3992A26882ED84ABFF6A5C89F703D8ABBDEF |
SHA-512: | 4F4781EAF75D03B09A5A76CFBCB66E2EFCA7CDCB9FB90E4EA76A74A03F0A511BEBECB51FDC7CF7E0C8AE2C7CE1749AC4841B8A3646B088497F60B04A45D6F90D |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 94208 |
Entropy (8bit): | 6.57087105915997 |
Encrypted: | false |
SSDEEP: | 1536:0aynB6GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrHL/uDoiouK+r5bLmbZzWr:0VnBypIbv18mLthfhnueoMmOqDoioO57 |
MD5: | B9A650557B6D5C0EE74415C3871D3333 |
SHA1: | 7087863259B57BBF0F4B3DCDE36E2C5286099006 |
SHA-256: | 28BA04A3C0AD62F5AEDE0E77B9ECBCDF0FA085D1C484A1714493D5B84A89ED3D |
SHA-512: | 6B6E9A753C352B5DE7C9E08CAD73D8C99436F13B6E06E8554355335F8F60FB0A8C41E6283D25858E180D30B60856743D056612168CCB666F006B7E549E10FC16 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 67584 |
Entropy (8bit): | 7.997158353708972 |
Encrypted: | true |
SSDEEP: | 1536:Nmm6JM0zmZw6hX6hZYeLeFqskA/dPRpvZIWDhWpJxj0Qt44CZp:Nmm6+ymZRUhiDFt/dPRlaxjbt44I |
MD5: | 969EC8528212429FEFE3A915F2A551E8 |
SHA1: | 3D6AAA9FB368AD5672AF58FFEF56A020904F0A44 |
SHA-256: | F1766AA088E7B422B5F207C2FE32A5434CA280EA43A41DE773B64423FDDE0605 |
SHA-512: | 5D096527501C0E8956D8646C46AED3ACA3170A75AF27917F3B5B6FAA3C071C09584C1F961BA54E39F073305A06B67B987A7E053D1F810A96665AD4E74B729E14 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 128000 |
Entropy (8bit): | 6.343581574055236 |
Encrypted: | false |
SSDEEP: | 3072:WZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWfH:WK5vPeDkjGgQaE/loUDtfH |
MD5: | 3C3F22E7E277C8D2C205CFEDFF41B8FE |
SHA1: | A3E9C071EF2331EFB0E577052837DD20CEF89CBF |
SHA-256: | 8B5FDA7049360FCC5919D575781069ABDE1240F5B6CFF58545C9A63A01F73E0D |
SHA-512: | 1616967E38BBB75765BA3B5492CD9C09ADBC1F72A711EBBC78A7A3B281152EE1AE2F49F9EFCD063A73F12007D92421E18730F264107FA5ADD8F74475F26E64BE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 150528 |
Entropy (8bit): | 5.29047018259943 |
Encrypted: | false |
SSDEEP: | 1536:0Kaj6iTcPAsAhxjgarB/5el3EYrDWyu0uZo2+9G:y6whxjgarB/5elDWy4ZND |
MD5: | 05559D6B1F499D4111B14432422CC29D |
SHA1: | 1AD84B14AFFC2837C7D433AE51FD20203609132A |
SHA-256: | E563AF98650D995DF04B32F65099BFB08556565D63035C377ABC87DD22931FF7 |
SHA-512: | 4B0C5F08FD835500C31F480CE71BF4DA6553167A307B95BDE25A12AE53F2DAFC26CEA69D947ED18365E02F2C115C61EC970B88A41805CE4E53CACAB3A96A54DB |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 7.997725415449113 |
Encrypted: | true |
SSDEEP: | 1536:txcJvPCI6nkRjfQbiQNYBbYyeVGVeDA5e5yi:tCZazubQbizRjqU50 |
MD5: | 0CD07A755F492D21E6DD92FDE68B90E3 |
SHA1: | C32B0401B53FA1C073BBB35011BBE88E50A76DED |
SHA-256: | 619B347C4DFB59D260BE87FF2C85F893E91BE2CD8873A8D9A9FA039AFFA824DD |
SHA-512: | BAB86484CBB16BE0C0DDC09BBDFDC335285B5EA22EBFCC2CE5AF6D6BE52844B78E0B4689ADE6E7C9A5FEEADC687A970A3D41E72418EF9D51BEE01B243DF4D584 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.998133460207129 |
Encrypted: | true |
SSDEEP: | 1536:55OPgHz6SzABVU+tSLSnGX1X3R8YR1cJIIsvzkbaOvcW40Gpri2Xj:5w0lABfSGnsRMZSzkb1vcW47/z |
MD5: | 8D26AFE63076864BC647EDCBFC678B5D |
SHA1: | 0C5CFE5FE28D6964861A5A2BB562649BCF80309D |
SHA-256: | E59A7D9C29D65624375BC826D86978292A11D91220E293AFEAD6C8BF9A2F2DFA |
SHA-512: | 30DC632EB4C3A880529FB7BB8047DC8ED74E4F7EF70E0D20C8DA061F677EA71C49A8F0430006F0BA6F0D12BD43E196994D57397BF29A6D1CDF431C83B909F01F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 7.998229039747749 |
Encrypted: | true |
SSDEEP: | 1536:QzipslTjVruE+XN1ryo8RWmro17HpFJY5zGW8HdfKjuvyaYJAi:UiqlTRKE+d1rJ8IF7HpHSzydKuvylqi |
MD5: | 41B538DD3C288C3DB544A32264360D47 |
SHA1: | 578D01376BCCA0E70086688FC8A983A0555F0EFC |
SHA-256: | F1E8E4DB7CB3823F7D1FFE6B2A213549F9213F5206C20FFE64CAA52878CEAB04 |
SHA-512: | 6511E1E2735B41D9D246D64EA61B6092D4AC7C69A1D7F379CCE3CE7FAC5BCB77D0CCECA5DF593BB28830D2169C2B6A95CF22E0F539CD345BD048FC24F99046B7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 486782 |
Entropy (8bit): | 7.998523412958793 |
Encrypted: | true |
SSDEEP: | 12288:IjCVqvNUzsRl8jZjrYrwJpvN4sdTMWDqC62bnkhSh:I1pRGjxYUTFNTPDrjb/ |
MD5: | 945E73107FCC23F03FD38A4877DD7ECE |
SHA1: | BE7D5D744D267C58E1A65C6365CCA3396AD842EA |
SHA-256: | B16A88223BD4281D60BA9B6BA8B489826285F856B5355FE73E10A609E2A23BA4 |
SHA-512: | CD65278F237B4FF210069FC20D8F6CE908869A26F7E0261EE0D43BADB2EF7FC662EC19F70C6375A960C2116AC7698439054D278BA20489F2B193B3EAD5F4A33A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 143360 |
Entropy (8bit): | 6.666702742683981 |
Encrypted: | false |
SSDEEP: | 3072:UBRtNPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+Ap:ONPj0nEo3tb2j6AUkB0CThp6vl |
MD5: | E94B7187CE6D03A3AB982B24B0F98208 |
SHA1: | 19A97463FEC214AFEA0C2356D3E9A645FB25B6BA |
SHA-256: | C4BE3E811093244FA248C37CD7FE7907CEB95AE88487A9E76B87A2C3D94EB2B7 |
SHA-512: | D2EFCB7BE10AE46BCB717074D65B9DAF67A7C0C6FB793C6BD70BACC27E0457DE38987AADD4CAD5143FE57A862913DD96C4A7879B1CF5837E6291FEF1706235AE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 111616 |
Entropy (8bit): | 6.6495311588075 |
Encrypted: | false |
SSDEEP: | 3072:t0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHZ:UbfSCOMVIPPL/sZ7HS3zl |
MD5: | 949D091F3D88FF361359C55D705C3F33 |
SHA1: | AC6B5C3D04484446E0047A94936557112623F17C |
SHA-256: | E0E53D4A23D3AAE49C70CA10B59859E3896262F3B7ACEEB187CBBA4A3D18C0B7 |
SHA-512: | 346A830C7A59C249D3AB96D1645E6631B09FEEA6A4F32DD119244A934D3011C73EEADDB1EA10F9E28684C1F1BEA5957A38F819A7AB702492F445108B925B16A4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86016 |
Entropy (8bit): | 7.997864687063212 |
Encrypted: | true |
SSDEEP: | 1536:S5EdcVrNFyjfgQcGsEecHVqSwjXq12Wzmag7p9C0qXrWi0rupTFrtUV80Casf3m:fcVrNFyTrcGsEeOVqSki2ENg7pjBiIqw |
MD5: | 1FC002A5AB4E21B3141AE28501FF4BB0 |
SHA1: | BB4AEFAB4E32F136F16794C792BDA77138182EFC |
SHA-256: | 75D98D578A104A0750AE46F6122CCAF2A7F936B8212DBE775C5A1C71E9938307 |
SHA-512: | 1113D32E7BBB33A899666C8604E4064B13573D1DCB4FEFFF5B7768BBB0899D85EB7EE8EA384E2E6A5608002126EF68AF05A71626B8F9CCED8EFADE4E71521129 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 147456 |
Entropy (8bit): | 6.0641104409794195 |
Encrypted: | false |
SSDEEP: | 3072:mde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNbjaAtsPE:md314V14ZgP0JaAOz04phdys |
MD5: | FC7DE2747566FFE429E758B1D7503D9D |
SHA1: | C75D37BDA5E7535888720B599568A81326AAF3E9 |
SHA-256: | 4F0E3AB854F8A3A11FAE4C33D82E22C2468CC0C7BA36E6211C1262E3A6382C8E |
SHA-512: | B047D46FACD90662F5E00F43C25CB2853D4970E0FE1BB7AF6282812DB34F58E141EBA695E4DD48882127DFA6C2052FC77B6EA352197E3F7B2F10C21F7E2E6C90 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2269 |
Entropy (8bit): | 7.928033904786583 |
Encrypted: | false |
SSDEEP: | 48:6c9xsYRC1WoUfdJARzQYfqebH7CXE0BRfMHE6n2TN4cHCctEMcHYNA7u90:riuCWtARz9NHmXEifi2CctEMUc7i |
MD5: | D8E19D94F4301DB815991F36B4FF3564 |
SHA1: | F92AF4FBACB433B0AC699B9594FC33C3EDBA9D18 |
SHA-256: | BCFBFE88AE3C2F3021FF0B6C342144D73FAA7D1E68500DBA46FF78930D52BAAE |
SHA-512: | 62D267CAB6E5479B5502BE42A385C04C274036A936FDB33123521B7767DF6D48D0C430451BB63B89830C97FBC0777A821FDA1D19F924A7D8EEB4921B92F25DB6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.997341384759921 |
Encrypted: | true |
SSDEEP: | 1536:Zz9lP9uttJQJnUVpT1yNhOUWdCLemGwpQYMh7MR+y:XbwJQJnopGWdCPs4 |
MD5: | B241CF18A38F91C89560DB8B15B13B99 |
SHA1: | 6B3DD4A1E2268B9E2D0D890CB9FCCB6ED5782EE6 |
SHA-256: | F778B71D7F9863A3C01CDBF8EF975FB23306E47A966C4D00525BBB2B8C3D4DCA |
SHA-512: | 1EA80EAA676E3ED025E797231157FC01E163AFCE55245D64886283D1053197E392C1186AEAC9C3410F5C587365C9299D555CF1D83282F88E202FD8DDE3862C5C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 776 |
Entropy (8bit): | 3.988783141312099 |
Encrypted: | false |
SSDEEP: | 12:2jOyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1:26yGS9PvCA433C+sCNC1 |
MD5: | 498D5797F011D1FB08D92FF83A0697C9 |
SHA1: | DB13942EF1A85C6CFF292C0F8DE6CB5A0EA07C4E |
SHA-256: | C10F235E3F488A6CA6DB40202837453E85028F1FF8FF89FB3CDA8D1ADB3EFF12 |
SHA-512: | 6AD082B4926B56586701CD8F5A52A07E535277644B44052AF2A21D040676A0A0C0423A61853A2D5CDF40C9DFC7185BF8887E14AD51FB9713CECB642BFF1FB46B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 129024 |
Entropy (8bit): | 6.700002454778713 |
Encrypted: | false |
SSDEEP: | 3072:U5mjccBiqXvpgF4qv+32eOyKODOSpQSAU4C0:UaccB3gBmmLsiS+SAhC0 |
MD5: | 9A5D257F7B1AFB7A5B05C7FA0DCAD762 |
SHA1: | C657A574D01279D2FA0ECA913CA4900481CDD3AE |
SHA-256: | 393F698E4815E394E86F7C6BDAF0E04BEDBFBBA4162D988229B8BB54D3BCCF42 |
SHA-512: | 8C6D411ADDE1C64F2350D4F68B3278375D7A486ABD138EB87E46CA3D837181EB3016670D4534CB49544018737C50F054C8B0E1F5E1EBF333EC6230CB5D8F92E0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Set-up.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11635 |
Entropy (8bit): | 5.177172642553435 |
Encrypted: | false |
SSDEEP: | 192:SQ6NqdAd7NUxg5sn5JwUZ636j0esvbWvipGqVK1GvTIya50XK6M/Byi:8NeAPUxSsn562tjnSWvibK1BR0HM/BD |
MD5: | 09A8EA9FF64DB95A2E1583FD12D1766B |
SHA1: | 9545B9928EBB260CC62C7B904343B4D9DA7DBB89 |
SHA-256: | DAFAB4E1C26837AEF449DD6B291CFEB09FF7F54601A1D0043CBAFDD7A0057874 |
SHA-512: | 23346350C5BCF53CFC4AF4AA06036765C30E584E7087743BB26E236A70F300F131122F24C6AD68A01DAD0FE3AA89D82D8C938C58CD6BE84BABDA83696AC02E72 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11635 |
Entropy (8bit): | 5.177172642553435 |
Encrypted: | false |
SSDEEP: | 192:SQ6NqdAd7NUxg5sn5JwUZ636j0esvbWvipGqVK1GvTIya50XK6M/Byi:8NeAPUxSsn562tjnSWvibK1BR0HM/BD |
MD5: | 09A8EA9FF64DB95A2E1583FD12D1766B |
SHA1: | 9545B9928EBB260CC62C7B904343B4D9DA7DBB89 |
SHA-256: | DAFAB4E1C26837AEF449DD6B291CFEB09FF7F54601A1D0043CBAFDD7A0057874 |
SHA-512: | 23346350C5BCF53CFC4AF4AA06036765C30E584E7087743BB26E236A70F300F131122F24C6AD68A01DAD0FE3AA89D82D8C938C58CD6BE84BABDA83696AC02E72 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.523481259499741 |
TrID: |
|
File name: | Set-up.exe |
File size: | 73'414'381 bytes |
MD5: | 91e7814911367eb7cbfa0e57f9beeaf8 |
SHA1: | 8c36ea6c6a191d819f20af8c12528fa0cb634295 |
SHA256: | f49d0fd4dc1336729d23a5fdd9e30ec2c48b70adb526761cc5a7954def28a4f1 |
SHA512: | 5165314b70ee0f46f301e9da83f0e6191912cc2a58d40480e9d24f7fc9273cad10dfc8e77686e456aab287eaf47a894dd9a65e878c1f82534ec8729a27b4bdb0 |
SSDEEP: | 12288:l0gyuZ66+m63dsJNhk2/mlbuTYl+7vXVFvN/zsvISpatYinfvN4s5TMWDqn62bgv:Cert6tiNR/TTavVyhfFJTPDwjby |
TLSH: | FDF79277E575222071F3583540A41EFBBFBD6A4251AC829272481B0E06CEE3B765FC6E |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8..... |
Icon Hash: | 1970e0eafaec7843 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | D5D66EA7AE498CF896CF422DE5426590 |
Thumbprint SHA-1: | 232E8A3F99CB8B202BE4DD8A235590F838B29038 |
Thumbprint SHA-256: | 9B04FC852CDCBDA62D870E4112459D2A2A30586909E0E76B77AFA5DDF6FBA631 |
Serial: | 5600D74B2CE1156218EEA30D |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F4BB908C5ABh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F4BB908C28Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F4BB908C27Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F4BB9089B7Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F4BB908BF51h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F4BB9089C03h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F4BB9089B7Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x3d0e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x4600005 | 0x36e8 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x3d0e | 0x3e00 | 00b1383237c7828bbb22dbf15a98e09b | False | 0.8068926411290323 | data | 6.975611251543485 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x104000 | 0xfd6 | 0x1000 | 7ce66dc4d1a2dca35f86de64e024e002 | False | 0.5693359375 | data | 5.318500909597628 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x100208 | 0x21b9 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0012741804702885 |
RT_ICON | 0x1023c4 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.5983606557377049 |
RT_DIALOG | 0x1034ec | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x1035ec | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x103708 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x103768 | 0x22 | data | English | United States | 0.9411764705882353 |
RT_VERSION | 0x10378c | 0x2ac | data | English | United States | 0.5146198830409356 |
RT_MANIFEST | 0x103a38 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-25T22:44:54.031217+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:54.761975+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49738 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:54.761975+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:55.986825+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:56.793498+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49739 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:56.793498+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49739 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:58.268166+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:44:59.182411+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49740 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:00.607499+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:02.692006+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:05.173993+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:07.174641+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49751 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:09.433794+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49757 | 172.67.158.190 | 443 | TCP |
2024-12-25T22:45:12.472873+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49763 | 172.67.158.190 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 25, 2024 22:44:52.809797049 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:52.809891939 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:52.809967995 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:52.813132048 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:52.813163996 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.031028032 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.031217098 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.035938978 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.035958052 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.036197901 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.081906080 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.089975119 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.090013027 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.090042114 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.761960030 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.762058020 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.762111902 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.764034986 CET | 49738 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.764053106 CET | 443 | 49738 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.771308899 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.771373034 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:54.771450043 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.771760941 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:54.771775007 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:55.986602068 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:55.986824989 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:55.988092899 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:55.988122940 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:55.988372087 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:55.989998102 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:55.990036011 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:55.990082979 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.793488026 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.793544054 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.793565035 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.793603897 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.793603897 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.793673992 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.793716908 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.802500963 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.802583933 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.802611113 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.847537041 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.913137913 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.917078018 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.917141914 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.917156935 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.956928968 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.956958055 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.985354900 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.985413074 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.985423088 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.988801956 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.988842964 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.988851070 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.994532108 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.994573116 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.994580984 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.994615078 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.994653940 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.994736910 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.994756937 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:56.994770050 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:56.994776964 CET | 443 | 49739 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:57.054949999 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:57.054994106 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:57.055103064 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:57.055397987 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:57.055417061 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:58.267962933 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:58.268166065 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:58.269428968 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:58.269459963 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:58.269706011 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:58.270876884 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:58.270996094 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:58.271044970 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:58.271192074 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:58.271208048 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:59.182420969 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:59.182540894 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:59.182610035 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:59.351113081 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:59.351161003 CET | 443 | 49740 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:59.392561913 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:59.392627001 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:44:59.392698050 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:59.393254995 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:44:59.393270016 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:00.607435942 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:00.607498884 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:00.608772039 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:00.608782053 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:00.608999014 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:00.610189915 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:00.610323906 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:00.610338926 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:01.409858942 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:01.409960985 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:01.410065889 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:01.410238028 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:01.410260916 CET | 443 | 49741 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:01.477997065 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:01.478095055 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:01.478188992 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:01.478535891 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:01.478569984 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:02.691920042 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:02.692006111 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:02.693262100 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:02.693299055 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:02.693555117 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:02.694943905 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:02.695086956 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:02.695148945 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:02.695216894 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:02.695235014 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:03.624808073 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:03.624900103 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:03.624964952 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:03.625159025 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:03.625180006 CET | 443 | 49742 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:03.960032940 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:03.960097075 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:03.960195065 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:03.960534096 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:03.960547924 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.173917055 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.173993111 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.175215006 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.175230026 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.175443888 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.176553965 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.176682949 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.176706076 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.948879957 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.948973894 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.949063063 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.949151993 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.949176073 CET | 443 | 49744 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.961709976 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.961767912 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:05.961901903 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.962371111 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:05.962382078 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:07.174539089 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:07.174640894 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:07.176053047 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:07.176086903 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:07.176306963 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:07.177326918 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:07.177443981 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:07.177472115 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:07.923629045 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:07.923731089 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:07.923829079 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:07.923968077 CET | 49751 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:07.923990011 CET | 443 | 49751 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:08.220910072 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:08.220998049 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:08.221087933 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:08.221379042 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:08.221411943 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.433712959 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.433794022 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.435008049 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.435038090 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.435286045 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.436316967 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.436853886 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.436899900 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.437041998 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.437088966 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.437228918 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.437271118 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.437427044 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.437474966 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.437674046 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.437726021 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.437946081 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.438004017 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.438026905 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.438040018 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.438091040 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.438107014 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.438261986 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.438301086 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.438339949 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.438441992 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.438492060 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.483335972 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.483612061 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.483655930 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.483706951 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.483731031 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:09.483786106 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:09.483810902 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:11.813188076 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:11.813292980 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:11.813352108 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:11.813559055 CET | 49757 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:11.813601971 CET | 443 | 49757 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:11.816742897 CET | 49763 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:11.816777945 CET | 443 | 49763 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:11.816852093 CET | 49763 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:11.817136049 CET | 49763 | 443 | 192.168.2.4 | 172.67.158.190 |
Dec 25, 2024 22:45:11.817152977 CET | 443 | 49763 | 172.67.158.190 | 192.168.2.4 |
Dec 25, 2024 22:45:12.472872972 CET | 49763 | 443 | 192.168.2.4 | 172.67.158.190 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 25, 2024 22:44:11.819041967 CET | 53415 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 25, 2024 22:44:12.039561033 CET | 53 | 53415 | 1.1.1.1 | 192.168.2.4 |
Dec 25, 2024 22:44:52.490230083 CET | 62384 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 25, 2024 22:44:52.802828074 CET | 53 | 62384 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 25, 2024 22:44:11.819041967 CET | 192.168.2.4 | 1.1.1.1 | 0x3e24 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 25, 2024 22:44:52.490230083 CET | 192.168.2.4 | 1.1.1.1 | 0x96a2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 25, 2024 22:44:12.039561033 CET | 1.1.1.1 | 192.168.2.4 | 0x3e24 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 25, 2024 22:44:52.802828074 CET | 1.1.1.1 | 192.168.2.4 | 0x96a2 | No error (0) | 172.67.158.190 | A (IP address) | IN (0x0001) | false | ||
Dec 25, 2024 22:44:52.802828074 CET | 1.1.1.1 | 192.168.2.4 | 0x96a2 | No error (0) | 104.21.57.27 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49738 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:44:54 UTC | 266 | OUT | |
2024-12-25 21:44:54 UTC | 8 | OUT | |
2024-12-25 21:44:54 UTC | 1131 | IN | |
2024-12-25 21:44:54 UTC | 7 | IN | |
2024-12-25 21:44:54 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49739 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:44:55 UTC | 267 | OUT | |
2024-12-25 21:44:55 UTC | 78 | OUT | |
2024-12-25 21:44:56 UTC | 1131 | IN | |
2024-12-25 21:44:56 UTC | 238 | IN | |
2024-12-25 21:44:56 UTC | 900 | IN | |
2024-12-25 21:44:56 UTC | 1369 | IN | |
2024-12-25 21:44:56 UTC | 1369 | IN | |
2024-12-25 21:44:56 UTC | 1369 | IN | |
2024-12-25 21:44:56 UTC | 1369 | IN | |
2024-12-25 21:44:56 UTC | 1369 | IN | |
2024-12-25 21:44:56 UTC | 1369 | IN | |
2024-12-25 21:44:56 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:44:58 UTC | 275 | OUT | |
2024-12-25 21:44:58 UTC | 15331 | OUT | |
2024-12-25 21:44:58 UTC | 2771 | OUT | |
2024-12-25 21:44:59 UTC | 1141 | IN | |
2024-12-25 21:44:59 UTC | 20 | IN | |
2024-12-25 21:44:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49741 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:45:00 UTC | 281 | OUT | |
2024-12-25 21:45:00 UTC | 8765 | OUT | |
2024-12-25 21:45:01 UTC | 1127 | IN | |
2024-12-25 21:45:01 UTC | 20 | IN | |
2024-12-25 21:45:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49742 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:45:02 UTC | 279 | OUT | |
2024-12-25 21:45:02 UTC | 15331 | OUT | |
2024-12-25 21:45:02 UTC | 5069 | OUT | |
2024-12-25 21:45:03 UTC | 1133 | IN | |
2024-12-25 21:45:03 UTC | 20 | IN | |
2024-12-25 21:45:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49744 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:45:05 UTC | 283 | OUT | |
2024-12-25 21:45:05 UTC | 7129 | OUT | |
2024-12-25 21:45:05 UTC | 1129 | IN | |
2024-12-25 21:45:05 UTC | 20 | IN | |
2024-12-25 21:45:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49751 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:45:07 UTC | 279 | OUT | |
2024-12-25 21:45:07 UTC | 1226 | OUT | |
2024-12-25 21:45:07 UTC | 1128 | IN | |
2024-12-25 21:45:07 UTC | 20 | IN | |
2024-12-25 21:45:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49757 | 172.67.158.190 | 443 | 7844 | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-25 21:45:09 UTC | 284 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:09 UTC | 15331 | OUT | |
2024-12-25 21:45:11 UTC | 1133 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 16:44:06 |
Start date: | 25/12/2024 |
Path: | C:\Users\user\Desktop\Set-up.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 73'414'381 bytes |
MD5 hash: | 91E7814911367EB7CBFA0E57F9BEEAF8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 16:44:07 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 16:44:07 |
Start date: | 25/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 16:44:08 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5c0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 16:44:08 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd90000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 16:44:09 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5c0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 16:44:09 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd90000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 16:44:09 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 16:44:09 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 16:44:10 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd90000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 16:44:10 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 16:44:10 |
Start date: | 25/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\8429\Functions.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 12 |
Start time: | 16:44:10 |
Start date: | 25/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x90000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 25 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|