Windows
Analysis Report
Mmt4YaKg5u.exe
Overview
General Information
Sample name: | Mmt4YaKg5u.exerenamed because original name is a hash value |
Original sample name: | f36fd6445db562f134623e5bfb23e1d7.exe |
Analysis ID: | 1581198 |
MD5: | f36fd6445db562f134623e5bfb23e1d7 |
SHA1: | dbd3297f34f59ca3ff25bd0c17cc274c9a456808 |
SHA256: | 88c3d3076ef5d30581a94d413b405b5638cec666f6705dee718e5843355e01e5 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Mmt4YaKg5u.exe (PID: 7820 cmdline:
"C:\Users\ user\Deskt op\Mmt4YaK g5u.exe" MD5: F36FD6445DB562F134623E5BFB23E1D7)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFD9A180C39 |
Networking |
---|
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00007FFD9A187B72 | |
Source: | Code function: | 0_2_00007FFD9A186DC6 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFD9A184879 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | WMI Queries: |
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 3 Virtualization/Sandbox Evasion | OS Credential Dumping | 11 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 3 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Software Packing | Security Account Manager | 14 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Timestomp | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 21 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
51% | Virustotal | Browse | ||
74% | ReversingLabs | ByteCode-MSIL.Trojan.Zilla | ||
100% | Joe Sandbox ML |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
107.150.123.235 | unknown | United States | 135377 | UHGL-AS-APUCloudHKHoldingsGroupLimitedHK | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581198 |
Start date and time: | 2024-12-27 08:22:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Mmt4YaKg5u.exerenamed because original name is a hash value |
Original Sample Name: | f36fd6445db562f134623e5bfb23e1d7.exe |
Detection: | MAL |
Classification: | mal64.troj.evad.winEXE@1/0@0/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 23.32.238.234, 23.32.238.242, 23.32.238.218, 23.32.238.225, 23.32.238.203, 23.32.238.235, 23.32.238.179, 23.32.238.217, 23.32.238.210, 20.189.173.20, 172.202.163.200, 13.107.246.63
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
- Execution Graph export aborted for target Mmt4YaKg5u.exe, PID 7820 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtReadVirtualMemory calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
UHGL-AS-APUCloudHKHoldingsGroupLimitedHK | Get hash | malicious | Metasploit | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | ConnectBack | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | ConnectBack | Browse |
|
File type: | |
Entropy (8bit): | 5.658923810062706 |
TrID: |
|
File name: | Mmt4YaKg5u.exe |
File size: | 54'784 bytes |
MD5: | f36fd6445db562f134623e5bfb23e1d7 |
SHA1: | dbd3297f34f59ca3ff25bd0c17cc274c9a456808 |
SHA256: | 88c3d3076ef5d30581a94d413b405b5638cec666f6705dee718e5843355e01e5 |
SHA512: | a9ce556ec8f85e9bc2a676412fff03460e42d16367144d0ef7e252d2f6b2fe41890fd159ea646269d810ad989efa2478fee4e8ba5b21ce8af73868c38ec002ff |
SSDEEP: | 768:ruJLpsh0OUdOBcsiMPiR4aZrZeg8bS5V0AOTDNYcEYugWK:K9iQdOBc7oi6oZeg8bqV0AMMgWK |
TLSH: | 55334B057B685B35DABC07FD9873621443B0A2075842E76D6DDC60EE2B73BC58602EE7 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...."............"...0.............>.... ........@.. ....................... ............@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40de3e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xD39922A3 [Tue Jun 30 07:00:51 2082 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xdde4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0x1131 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xbe44 | 0xc000 | a38fbcf82d6caca8e469502fdfb09d49 | False | 0.4766438802083333 | data | 5.614371783120636 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0x1131 | 0x1200 | 53aa7ff26945a39569560537d942fde6 | False | 0.4249131944444444 | data | 5.637202652920777 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 47f7822536ff157957978a4670ecae9f | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2f4 | data | 0.42857142857142855 | ||
RT_MANIFEST | 0xe394 | 0xd9d | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators | 0.45652797704447634 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 27, 2024 08:23:03.876687050 CET | 49736 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:03.996305943 CET | 56234 | 49736 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:03.996639013 CET | 49736 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:04.828257084 CET | 49736 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:04.947877884 CET | 56234 | 49736 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:06.599842072 CET | 56234 | 49736 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:06.600019932 CET | 49736 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:09.632401943 CET | 49736 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:09.932440042 CET | 49736 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:10.225155115 CET | 56234 | 49736 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:10.225172997 CET | 56234 | 49736 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:10.225276947 CET | 49736 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:10.479557037 CET | 49737 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:10.599783897 CET | 36428 | 49737 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:10.599940062 CET | 49737 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:11.526913881 CET | 49737 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:11.646676064 CET | 36428 | 49737 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:13.141891003 CET | 36428 | 49737 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:13.141997099 CET | 49737 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:16.151431084 CET | 49737 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:16.271125078 CET | 36428 | 49737 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:18.901479959 CET | 49739 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:19.021434069 CET | 36428 | 49739 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:19.021532059 CET | 49739 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:19.479578972 CET | 49739 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:19.599231958 CET | 36428 | 49739 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:21.614828110 CET | 36428 | 49739 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:21.614909887 CET | 49739 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:24.619951010 CET | 49739 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:24.739800930 CET | 36428 | 49739 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:26.135675907 CET | 49740 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:26.255578995 CET | 36428 | 49740 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:26.255682945 CET | 49740 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:26.916982889 CET | 49740 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:27.036894083 CET | 36428 | 49740 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:28.856498003 CET | 36428 | 49740 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:28.856563091 CET | 49740 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:31.869812965 CET | 49740 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:31.989525080 CET | 36428 | 49740 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:32.744915009 CET | 49741 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:32.864686966 CET | 56234 | 49741 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:32.864778996 CET | 49741 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:33.666970968 CET | 49741 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:33.786767960 CET | 56234 | 49741 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:35.444216013 CET | 56234 | 49741 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:35.444451094 CET | 49741 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:38.448056936 CET | 49741 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:38.567819118 CET | 56234 | 49741 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:39.854357004 CET | 49742 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:39.974150896 CET | 15694 | 49742 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:39.974339962 CET | 49742 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:40.463789940 CET | 49742 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:40.583659887 CET | 15694 | 49742 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:42.657584906 CET | 15694 | 49742 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:42.657783031 CET | 49742 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:45.666778088 CET | 49742 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:45.786613941 CET | 15694 | 49742 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:48.010530949 CET | 49743 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:48.130511999 CET | 36428 | 49743 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:48.130593061 CET | 49743 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:48.276216984 CET | 49743 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:48.396008015 CET | 36428 | 49743 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:50.722783089 CET | 36428 | 49743 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:50.722893000 CET | 49743 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:53.729155064 CET | 49743 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:53.848793030 CET | 36428 | 49743 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:54.073215008 CET | 49746 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:54.193028927 CET | 15694 | 49746 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:54.193273067 CET | 49746 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:54.901211023 CET | 49746 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:55.020948887 CET | 15694 | 49746 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:56.734297991 CET | 15694 | 49746 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:23:56.734369040 CET | 49746 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:59.744746923 CET | 49746 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:23:59.864682913 CET | 15694 | 49746 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:01.150928974 CET | 49758 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:01.270380974 CET | 56234 | 49758 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:01.270461082 CET | 49758 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:01.604231119 CET | 49758 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:01.723793983 CET | 56234 | 49758 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:03.825113058 CET | 56234 | 49758 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:03.825349092 CET | 49758 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:06.838469982 CET | 49758 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:06.957971096 CET | 56234 | 49758 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:07.354089022 CET | 49773 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:07.473690987 CET | 15694 | 49773 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:07.473810911 CET | 49773 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:08.135337114 CET | 49773 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:08.254749060 CET | 15694 | 49773 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:10.016412020 CET | 15694 | 49773 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:10.016602039 CET | 49773 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:13.025834084 CET | 49773 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:13.146029949 CET | 15694 | 49773 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:14.791510105 CET | 49792 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:14.911300898 CET | 36428 | 49792 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:14.911370993 CET | 49792 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:15.385759115 CET | 49792 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:15.505228996 CET | 36428 | 49792 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:17.452208996 CET | 36428 | 49792 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:17.454916954 CET | 49792 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:20.463206053 CET | 49792 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:20.582776070 CET | 36428 | 49792 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:22.901027918 CET | 49810 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:23.020761013 CET | 15694 | 49810 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:23.021142960 CET | 49810 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:23.979072094 CET | 49810 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:24.098591089 CET | 15694 | 49810 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:25.823568106 CET | 15694 | 49810 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:25.823678017 CET | 49810 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:28.838237047 CET | 49810 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:28.957897902 CET | 15694 | 49810 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:30.431978941 CET | 49826 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:30.552515984 CET | 56234 | 49826 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:30.552649975 CET | 49826 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:30.822698116 CET | 49826 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:30.942290068 CET | 56234 | 49826 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:33.148199081 CET | 56234 | 49826 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:33.148329973 CET | 49826 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:36.150774956 CET | 49826 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:36.270392895 CET | 56234 | 49826 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:38.479011059 CET | 49847 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:38.598644018 CET | 15694 | 49847 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:38.598872900 CET | 49847 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:39.264794111 CET | 49847 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:39.384283066 CET | 15694 | 49847 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:41.436872959 CET | 15694 | 49847 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:41.436990976 CET | 49847 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:44.447627068 CET | 49847 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:44.568037033 CET | 15694 | 49847 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:45.985161066 CET | 49863 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:46.104734898 CET | 56234 | 49863 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:46.104820967 CET | 49863 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:46.791651964 CET | 49863 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:46.911426067 CET | 56234 | 49863 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:48.695147038 CET | 56234 | 49863 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:48.695250988 CET | 49863 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:51.712522030 CET | 49863 | 56234 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:51.832087994 CET | 56234 | 49863 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:53.854211092 CET | 49883 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:53.973758936 CET | 36428 | 49883 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:53.973880053 CET | 49883 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:54.588285923 CET | 49883 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:54.707969904 CET | 36428 | 49883 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:56.551189899 CET | 36428 | 49883 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:24:56.551429033 CET | 49883 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:59.556832075 CET | 49883 | 36428 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:24:59.676635981 CET | 36428 | 49883 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:25:00.588067055 CET | 49895 | 15694 | 192.168.2.4 | 107.150.123.235 |
Dec 27, 2024 08:25:00.707593918 CET | 15694 | 49895 | 107.150.123.235 | 192.168.2.4 |
Dec 27, 2024 08:25:00.707672119 CET | 49895 | 15694 | 192.168.2.4 | 107.150.123.235 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 02:22:54 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\Desktop\Mmt4YaKg5u.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xe30000 |
File size: | 54'784 bytes |
MD5 hash: | F36FD6445DB562F134623E5BFB23E1D7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Function 00007FFD9A186DC6 Relevance: .5, Instructions: 472COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A187B72 Relevance: .5, Instructions: 458COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A180C39 Relevance: .2, Instructions: 185COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A188801 Relevance: .4, Instructions: 444COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A187786 Relevance: .3, Instructions: 332COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A182DE9 Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A181B5C Relevance: .3, Instructions: 263COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1817FA Relevance: .3, Instructions: 253COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A188CD7 Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A18212D Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1842AC Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A182376 Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A181648 Relevance: .2, Instructions: 168COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1804D3 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A18257D Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A180788 Relevance: .1, Instructions: 128COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A182A61 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A18105E Relevance: .1, Instructions: 99COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A182E79 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1805B8 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1805A0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1826EE Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A18113E Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1805B0 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A182D28 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A1815A8 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A18924A Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A180971 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9A18253B Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|