Windows
Analysis Report
BagsThroat.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- BagsThroat.exe (PID: 6388 cmdline:
"C:\Users\ user\Deskt op\BagsThr oat.exe" MD5: 3B819D687B2BDE89ADE8EB1AEB4C6C5F) - cmd.exe (PID: 6048 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Su bjects Sub jects.cmd & Subjects .cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 6224 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 1868 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 1124 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 2128 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 4180 cmdline:
cmd /c md 441412 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 3816 cmdline:
extrac32 / Y /E Disco vered MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 7120 cmdline:
findstr /V "Detailed " Eat MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5324 cmdline:
cmd /c cop y /b 44141 2\Noted.co m + Button + Pledge + Ve + Mic hael + Bar ely + Mana gers + Boo lean + Spe eches + He ights + Ti m 441412\N oted.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 6768 cmdline:
cmd /c cop y /b ..\Po rtrait + . .\Colored + ..\Class ic + ..\Ov erseas + . .\Theaters + ..\Play s + ..\Con tinued S MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Noted.com (PID: 1276 cmdline:
Noted.com S MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 4564 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T09:13:23.312130+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:25.381207+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49733 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:27.757910+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49738 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:29.923164+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49744 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:32.201365+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49750 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:34.733711+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49756 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:36.787090+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:39.138807+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49768 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:41.715508+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49779 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T09:13:24.069083+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:26.175399+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49733 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T09:13:24.069083+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T09:13:26.175399+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49733 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T09:13:37.598789+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T09:13:39.142379+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.5 | 49768 | 104.21.80.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 131 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 111 Masquerading | 2 OS Credential Dumping | 22 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 22 Virtualization/Sandbox Evasion | 11 Input Capture | 22 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 35 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
24% | Virustotal | Browse | ||
18% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
crackerdolk.click | 104.21.80.1 | true | true | unknown | |
yHUkiJhYyguIo.yHUkiJhYyguIo | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.80.1 | crackerdolk.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581567 |
Start date and time: | 2024-12-28 09:12:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | BagsThroat.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@26/23@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 2.16.164.105, 2.16.164.72, 20.242.39.171, 13.107.246.63
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
03:12:53 | API Interceptor | |
03:12:58 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.80.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Vidar | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 487086 |
Entropy (8bit): | 7.99964339288111 |
Encrypted: | true |
SSDEEP: | 12288:RtTVjKXTKbjRPFuStuOCxV1HhFD3AA8/bJl7Y:Rt9STGjRYS0PPH7D3cbJl7Y |
MD5: | F11BB6FE0674DB89C1F028537EE8BF79 |
SHA1: | 242C35ABE1C29D5F8F9AF3ED9C6FED7989636DF2 |
SHA-256: | CBCE7E0E3E4758A98B555424349F4AD6DDA6E6D76B5D3102A9587064BCAFD8D6 |
SHA-512: | 2393665F4976F2D014743144D149311E5128561BD8F1C643A6352515B6791BB421CBF3C4B7D333986678E2C2C03D975D0530781051504673A6926F1C9F58FC2B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 6.678076006949304 |
Encrypted: | false |
SSDEEP: | 1536:MJ3RraSXL21rKoUn9r5C03Eq30BcrTrhCX4aVmoJiKwtk2ukL:MBRtNPnj0nEoXnmowS2uq |
MD5: | DAF32A4C4FEFD3D5535967B25263E8BD |
SHA1: | 167FEADA002AA0FDE95F5B07DD210DEE233C3EEA |
SHA-256: | AF1A7ED88CDE109A083819CCB9B518C64AE54F23BD8DC479A33538C09B7D2000 |
SHA-512: | D8D5AE48277D1DBD622BA4B58F0D8D3A38EBA8C9122BFC326257CE9CD0469B7124403148F593DACCD561BF69EBEABE06BA51001FCD57B8EB5DCD7B17B9A26724 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 126976 |
Entropy (8bit): | 6.40709763067582 |
Encrypted: | false |
SSDEEP: | 3072:bDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNQ:6O5bLezWWt/Dd314V14ZgP0JaAOz04pC |
MD5: | FDE0B2F5092759C166D9ADF73DAFFC1A |
SHA1: | 4FF851F5BD76377F622BB20BEDBF8B6319337272 |
SHA-256: | 4ECCFFB45EB2D61C23001C2964278D71BEE01564BCEB53EBDF244952F71B0FA6 |
SHA-512: | 916223830CAB7E9275EC5B319D2FB65328EBC2B1B13636F4A971623AECC2B364E6F6019DF129F4D6F99B3D67970E2F0D97DF90808331F6AAC03469CB8638ED32 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 67584 |
Entropy (8bit): | 6.526950976284279 |
Encrypted: | false |
SSDEEP: | 1536:Q1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUp:QZg5PXPeiR6MKkjGWoUlJUp |
MD5: | 5E14DE8FA9A19756C788C622E0EDC1C3 |
SHA1: | D333353E8019085B145EAF35C1F7A177C42A722E |
SHA-256: | 6EBC3AC86AF22FDCCCAC1B35F6B43EEB4B90274567E7914390FCE79735EABBE4 |
SHA-512: | 0459B57B3CDA520D9F269635F20F96322A7D1F21C268140AAF866E212A076757B14E4BDE2D56C7DECCB31FBF9350B3BD798BE6A7E2F95632DF7D10316E2F2E55 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 94208 |
Entropy (8bit): | 7.997921706643346 |
Encrypted: | true |
SSDEEP: | 1536:5X3dDr1Pu9cXpA4d+XBlNjyeUdokigm0BXI+fWzaVMXZm++qAkHZImLYUVa91ovp:5XxFu9cKXadokF1fWza+w+fHZImLYUgU |
MD5: | 3C9D72E13D302192E829854491F1A500 |
SHA1: | 1DFAD70C96FE7064FDC2C13742970B3D3B1FDAED |
SHA-256: | D9EA9FFD874A8DA9B640F8C47499194261813C00DC660B48BDECE3E4D1D66C20 |
SHA-512: | 94BE92932145290E8C9CDD1BED1F0D2EA82EC133182806ABCB2B815491B43EE7885D42583CFDFB4FEDFA506946802DB54BECBE3FA595A2B0D0010CCF7E6BF828 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73728 |
Entropy (8bit): | 7.997730679197705 |
Encrypted: | true |
SSDEEP: | 1536:fk5XgJkNbNRTnUUJu1zaPqltpZWgOa9xC7pxfnyyqFZTsY2C:aXwkNTTne1GKjZHOOgxvyyqFZTr |
MD5: | B7CECE3F1D2BF71379B06ACDB83F059F |
SHA1: | 6D8DCA5DA7B9CF6EEE41A7778BBD07DB19DBA3F5 |
SHA-256: | DE477736DB9C540B2C160D3B7EB77E5165D3C143A9FEECFCE05424279A52C5AB |
SHA-512: | F29013F35FC0EFCEDC0721B926389183CBE9BAAB5ABE50943AFEDB8AB40E92B71F6C459A3E49D7BDE30D84050FDF8934797B16D6CA734E292C5591AFE0FAF653 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15022 |
Entropy (8bit): | 7.9870833060716615 |
Encrypted: | false |
SSDEEP: | 384:Xohr0DChCBOtbstzLR2Ztk71pls/F4Cm8gjNVPp:XsYehOwsVV8tkhE/F4CsX |
MD5: | 5EDF8B76F5259F18AC5B48A9BE7D5A9C |
SHA1: | 9FA0B847524EC85B1F3B9568E755E175A0204E34 |
SHA-256: | B27080EEDFAC5BF6EC956EFAC77A20BC52C95B9FB95AE5F0E29349C260523B35 |
SHA-512: | 235F1ABEBC2DE5B73D6CC8B6EFAE008E2362C8EECF565862070502DF253F1460863219AEBADEF74BD84387ED618820A49E76B0C691C58EBD59FA1A358C7112E1 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 487716 |
Entropy (8bit): | 7.998707506288359 |
Encrypted: | true |
SSDEEP: | 12288:YOlgWJ8WJAxkstcqtqoD9a6EAxHEG1RMEfggIr5BrZhG:YOlgWJ9AnlqoD9NSQythG |
MD5: | 83AEC38FA4C64D2200448897B0627859 |
SHA1: | 10585CDB45E5EA30FFDDF0368047D46768C107C4 |
SHA-256: | F618451D85B98F254DF7F0DEB79E21EBFD30EBD9F53A018BE3AD2BA61738C889 |
SHA-512: | 6AF38129C71DEF5BE13E1778A30C2EA1706A6F475551AE99D53ED43C9B21D2CFCFCCEAE6605B8075AB13EAFC52F9632F15F79283F947210FB122448976E6A20F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 627 |
Entropy (8bit): | 4.281494712266738 |
Encrypted: | false |
SSDEEP: | 12:D2+8yGSG+fCtJfjEvadTfA43k66h1ICdC3v6cl/:Dh8yGS9PvCA433C+sCN/ |
MD5: | 5F4A17BEC8C80C80333C6A4A319E6690 |
SHA1: | 23D9E2E0F30329A75A6AE74761BA07DD77F307E8 |
SHA-256: | B9F971DB06DA104D3BA7C18E733B7D50DA01C2A91BFCCB5F6433BE6B7321E933 |
SHA-512: | A22F4BDD193C9C62CE6BE0E14DE18F8EE12BCA0BC65AE5583227ABD92E400C1A464176127815267519F0552344AFD9A65B399E1906A8CDFAA4668A91AF2CABAD |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60416 |
Entropy (8bit): | 5.097525223660272 |
Encrypted: | false |
SSDEEP: | 768:3OWel3EYr8qcDP8WBosd0bHazf0Tye4Ur2P:35el3EYrDWyu0uZo2P |
MD5: | 9654140FA4C77C63096B201416F1B6A0 |
SHA1: | E26932966D4096D1C3DB68C17BA5ABE7AE6E6F27 |
SHA-256: | 119DDE8D8A2A90FC2C5633C9CAAB0E1230B07CE8C73F24AE5C0D47EE2467AEE2 |
SHA-512: | 4E09EE3E14CE914C73B9DD391B0DDE5F2E48066C8633B0B98CF76217DE4F3BA54D40088D919D89E202B121EA9ACB208ADB6AB702A1771B96FC89DFB70C7C7939 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 132096 |
Entropy (8bit): | 6.599505380219873 |
Encrypted: | false |
SSDEEP: | 3072:mhVOoQ7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLthfhnueoMmOo:p6AUkB0CThp6vmVnjphfhnM |
MD5: | 77A100D004A446BBBEC4DDC74721973A |
SHA1: | 13A1C66DE03F68D2B0FD59976B249921BA928A69 |
SHA-256: | 48866DA93E4A8A20F0CAF75D87820A9E3975736CB52DFF724FCFB9C7F1CB6B7A |
SHA-512: | 276D2047450B656CD5970A0B4E21FBAC515EA12FF0D51A0C1D7B28F07024A699555C781EA74E3EBB6CE36F6B95FB88390F95DD73AE0C167EAD868532EEA0F4F5 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 128000 |
Entropy (8bit): | 6.657700906171978 |
Encrypted: | false |
SSDEEP: | 3072:H4CE0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHR:YClbfSCOMVIPPL/sZ7HS3zt |
MD5: | 42C917242AE3AE7A388678F5C63ADADE |
SHA1: | 6613748AD771CACAE32BC8FAF98898EC1D943602 |
SHA-256: | CDCADA29E45A10FA53C557BB96613A119EB893648B24B4C243027DAFD637DCD2 |
SHA-512: | 3989C2E516EFFD9D18F71E6FFC5B62778AE31C37EBFA0AA23A4792505158D8D6D1EA93D5AB82B3E9477546F03FEC6B600F4B9F49082BE452BC520004866E8BDE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 84992 |
Entropy (8bit): | 7.998170672421689 |
Encrypted: | true |
SSDEEP: | 1536:/V/BDE7gSBN9z33cRA87hNwvOTO41OAClKfCArXtH2r:/V1E8SBncNhWgDyalU |
MD5: | DAB5EB163EC9C442B8A3EF70CDA26541 |
SHA1: | 401436FF0C3B3E635FDE5F4830E6769ADC5E487E |
SHA-256: | D831091383DA89B8572C3B1846C69004415A0669581897551F65B40BBAAD8C1E |
SHA-512: | 31E4C2C9003F925523EDD4C95EF7E6198954AE899B6464FF82280F4CD7993A1C223073253972D90243CA1335E4E6E6DC02EA8E9B17A7A3D82DC28B3A28CFF3E3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 7.997100423038379 |
Encrypted: | true |
SSDEEP: | 1536:6E9aDkoEzjten+vPfTECrWiFwes9SY5En6Md4:6UtFLJCS7gf5O4 |
MD5: | 9EEBCFD7BA6BA817EE8B455814E9DEC9 |
SHA1: | 0A043727E47F66D6B163A826828C77AFB96284FA |
SHA-256: | 8A605DE35B83BE5823D1A971D126F0E3B1B4B768BB6F57D883D498F293EDA272 |
SHA-512: | 0B6ADA25CCDFEA37130E220B9A9C02AB49E077F35FA4442CC16B8AED6D65007B4AD0AF28F4A520511B1098872BAB477DA24E63564E6B6CCE791BBE50193E971C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 94208 |
Entropy (8bit): | 6.334063566470479 |
Encrypted: | false |
SSDEEP: | 1536:5dlDfFgQa8BpDzdZPp7HE+tKA3QkvyNf7Xw2U0pkzUWBh2zGc/xv5mjKu2IwNnPh:BdgQa8Bp/LxyA3laW2UDQWf05mjccBiX |
MD5: | 7495F417AB14F339A275C91E4AE3B32D |
SHA1: | EF2B55D2044BC272B2162B6476AA8CF34E7D6372 |
SHA-256: | F675F15DF6F29F8DEE34C8C9581C88F87DB72606C78DDCB17DCF658158C47E79 |
SHA-512: | EB96B6D8C5D752E4D8C8D076D795E3FC0F385B60D22F1D8AE1142F728C790E2BEB13C59DC2C0D941C1F2E6DA56BC6DFD0BD609EC71A0E13D9AFA9785C16AE476 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 99328 |
Entropy (8bit): | 7.998121313681826 |
Encrypted: | true |
SSDEEP: | 3072:RZ2w0kQ1ORookGPUSSDQko2hgyQzOxLx+gfe:RtEMVkGPU/QkhlxLsgfe |
MD5: | 6244CF9E0B1F9729B1C027B6B26F6010 |
SHA1: | 133A9E92565C0C9CB00D9F942DF95E43BDFC1911 |
SHA-256: | FC30514EB57F4693E5D719075AC7AD673C74E55612ED9F4597AF9E31B85F01D1 |
SHA-512: | ED1E1C228C8F2E847FAE2BCAE998501D249E856A60068188DFF69E6A6DC123BB129F67580C502EBF2C09A9EB0CB093773BE61BF66DA3AFEE184650149523E076 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 134144 |
Entropy (8bit): | 5.353600638693791 |
Encrypted: | false |
SSDEEP: | 768:2U7aI4kCD9vmPukxhSaAwuXc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtV+:himuzaAwusPdKaj6iTcPAsAhxjgarB |
MD5: | 89FA596A7CD363C2C2F82CE727082FAD |
SHA1: | C789493A3D4106A038270A050A40B4E27A15A1DB |
SHA-256: | BE4A5C0BAECD0DA597E797A87A98A8E58D8DCDF1B65CDC593932645CC0FA2706 |
SHA-512: | 1F17A8BCE01308C80234E03AC89B31538E8FAA688D29797EFA8757DC25992EB3CB83699B029CF4C062C21899C709DE54BF965DDCB9F11DF0377E52825AA22FE0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24638 |
Entropy (8bit): | 5.1033772566503774 |
Encrypted: | false |
SSDEEP: | 768:i0Qhr+8ApRCzth0szdtSSg3YpG81Mk576kow:i5hrSUth0szdiy1Mk576kow |
MD5: | 9FE8970AD0AAD8E6887EC92CB186112A |
SHA1: | 4A440BAA4D53611E675B1D7F917CAEEE81CE3E33 |
SHA-256: | F259A1C6D1E9D0E2C7B68CABD9080B0F42A0F95B2043DD52346EDA6A6DF9816C |
SHA-512: | 7C1FC3D142E9DBD0CD6E2B1862EA6847A82AD18E91284FD9C9A2B1DD4193FAB0929F7BF9982EF8D63745C759E803C518D1305D61B700BBFE6E15FB946AFAD3EE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24638 |
Entropy (8bit): | 5.1033772566503774 |
Encrypted: | false |
SSDEEP: | 768:i0Qhr+8ApRCzth0szdtSSg3YpG81Mk576kow:i5hrSUth0szdiy1Mk576kow |
MD5: | 9FE8970AD0AAD8E6887EC92CB186112A |
SHA1: | 4A440BAA4D53611E675B1D7F917CAEEE81CE3E33 |
SHA-256: | F259A1C6D1E9D0E2C7B68CABD9080B0F42A0F95B2043DD52346EDA6A6DF9816C |
SHA-512: | 7C1FC3D142E9DBD0CD6E2B1862EA6847A82AD18E91284FD9C9A2B1DD4193FAB0929F7BF9982EF8D63745C759E803C518D1305D61B700BBFE6E15FB946AFAD3EE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BagsThroat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60416 |
Entropy (8bit): | 7.997114737997307 |
Encrypted: | true |
SSDEEP: | 768:600vcxnlAKkulAtgFr/RZDY8NuLAK1hhDbn5vlAJf7kiqVxGuTF/Gjp9DbwLJ8:6ZvcTblAtCnDR8EKT6l+/bB/atbw8 |
MD5: | 9B0C2C035ACAEB06132AB40F45EEA335 |
SHA1: | B103F8FC5D703990E588D21A798BF6572B841B64 |
SHA-256: | 335153E166D777C3CF61F3B52EA12D26C2EACDB22307CD0A72321844D959FB96 |
SHA-512: | F655E4EABAC5354F73B59E445DF22DC8078C9110AA2443CF85441EB38DAF7F9999FF7CD9FADC9E946CAD5362948DDC9D3990726E270C59066BB7A7924DC0F897 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 48621 |
Entropy (8bit): | 7.036578405079938 |
Encrypted: | false |
SSDEEP: | 768:W9BGmd9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:W9BGmdATGODv7xvTphAiPChgZ2kOE6 |
MD5: | 2587810530100D2C69B7FD1FFB61A892 |
SHA1: | FA5AD55CE6DED5648F6EDB6AA18ECB2927908927 |
SHA-256: | 76C61344973C451508B682AC19423A5C82D2A31A0807969C439FA7C739608E4A |
SHA-512: | B90585691C8DEAD0C65B2CE2DC993CDFD5FC27E1E3EFCF58FBB306FE3E4DBBC73B166CD607038EB213710AFE2C1ABA9C3D2DAC86F0F8F9A115820956DA4A5C7E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 6.677457463606737 |
Encrypted: | false |
SSDEEP: | 1536:c/UXT6TvY464qvI932eOypvcLSDOSpZ+Sh+I+FrbCyIL:cgF4qv+32eOyKODOSpQSAM |
MD5: | 6FFCF91F67AA7CB557BD6C15179997C2 |
SHA1: | 004E56785762CCD06A3301832B2DEFE529195E60 |
SHA-256: | B4E8423BE7458A19EC3A50A5EA1029359766CA702F9A1C391E2DD00F14677516 |
SHA-512: | 071AB42A94563CE04EC7D90FC103CC83658D0018B4DB74D119CEBF3A0375271E74425065B4A4B3FFE914C94C8342EFC0165988E8AF484883B693F4D647906344 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.965679971225888 |
TrID: |
|
File name: | BagsThroat.exe |
File size: | 1'112'940 bytes |
MD5: | 3b819d687b2bde89ade8eb1aeb4c6c5f |
SHA1: | e77057a1143c44eaf281e5f1a65ddc19c0a7cb98 |
SHA256: | 0158aa426fceb64ed638b0abddbb6e26dc0806938ad34246db7ff0088668a7ee |
SHA512: | bd2d6f16863a3b18383ddfe255a74d7982ecef145c8235238a7ac54f75291a095b0f3bd8e876413ee8d18e2b8c31d95c86fd8291e5b7c8381e038fd900e45412 |
SSDEEP: | 24576:yRUORgU9hMlqoD9peQJsAS7TPK7DG2bJ27ETvj/4tW/:OUO2U0qsrDsAq7Vec7ETDOW/ |
TLSH: | 2C353342DEA4DC2AE9940D3224F99A219E3C3F216D77D65F0314CACF6D72781AD44BE2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...8...B...8..... |
Icon Hash: | 2970d080e070b248 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 0D637B42FF0AB3019673C4243305BD25 |
Thumbprint SHA-1: | 777A41024CF413CCB49B3434565545C0D78D80E9 |
Thumbprint SHA-256: | 3A0A9BD3CBF08E350DACBFCB54C53F00113D929DAD01AF4C9D5BFE37ACF9F352 |
Serial: | 062EE3FD7CDC52097C1DA6AFA87C745E |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F0280C5E39Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F0280C5E07Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F0280C5E06Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F0280C5B96Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F0280C5DD41h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F0280C5B9F3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F0280C5B96Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0xca6e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x10cc3c | 0x2f30 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0xca6e | 0xcc00 | 569ff95b5331009a26662c9b5ac1038a | False | 0.8082490808823529 | data | 7.091824152592848 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10d000 | 0xfd6 | 0x1000 | cef0a100e30ec9765bca61f09a3e76d1 | False | 0.569580078125 | data | 5.3244841607782325 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x100298 | 0x6502 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0006187640188724 |
RT_ICON | 0x10679c | 0x1e44 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0014197212183789 |
RT_ICON | 0x1085e0 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.45779088689991865 |
RT_ICON | 0x10ac48 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.4972677595628415 |
RT_ICON | 0x10bd70 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.5815602836879432 |
RT_DIALOG | 0x10c1d8 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x10c2d8 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x10c3f4 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x10c454 | 0x4c | data | English | United States | 0.8026315789473685 |
RT_VERSION | 0x10c4a0 | 0x2f8 | data | English | United States | 0.45 |
RT_MANIFEST | 0x10c798 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T09:13:23.312130+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:24.069083+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:24.069083+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:25.381207+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49733 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:26.175399+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49733 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:26.175399+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49733 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:27.757910+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49738 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:29.923164+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49744 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:32.201365+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49750 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:34.733711+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49756 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:36.787090+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:37.598789+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:39.138807+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49768 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:39.142379+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.5 | 49768 | 104.21.80.1 | 443 | TCP |
2024-12-28T09:13:41.715508+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49779 | 104.21.80.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2024 09:13:22.049202919 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:22.049249887 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:22.049314022 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:22.050545931 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:22.050559044 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:23.311991930 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:23.312129974 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:23.315656900 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:23.315665007 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:23.315874100 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:23.355601072 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:23.361685038 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:23.361685038 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:23.361753941 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:24.069089890 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:24.069183111 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:24.069515944 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:24.070949078 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:24.070974112 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:24.070985079 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:24.070991993 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:24.076992989 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:24.077027082 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:24.077096939 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:24.077359915 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:24.077374935 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:25.381004095 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:25.381206989 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:25.382304907 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:25.382316113 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:25.382546902 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:25.383697033 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:25.383725882 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:25.383769035 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.175409079 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.175476074 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.175523996 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.175558090 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.175760984 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.175777912 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.175802946 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.176465988 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.176517963 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.176527023 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.194794893 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.194825888 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.194919109 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.194927931 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.195101023 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.295003891 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.340012074 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.340023994 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.386846066 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.386852980 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.389352083 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.389543056 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.389554024 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.397382975 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.397469997 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.397470951 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.397525072 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.397713900 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.397731066 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.397759914 CET | 49733 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.397767067 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.453488111 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.453531027 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:26.453645945 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.453928947 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:26.453946114 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:27.757800102 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:27.757910013 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:27.759018898 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:27.759026051 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:27.759252071 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:27.760304928 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:27.760431051 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:27.760462999 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:28.693898916 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:28.694001913 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:28.694108009 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:28.694276094 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:28.694295883 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:28.711224079 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:28.711277962 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:28.711355925 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:28.711620092 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:28.711632967 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:29.923058033 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:29.923163891 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:29.924220085 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:29.924230099 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:29.924455881 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:29.925574064 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:29.925698996 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:29.925729990 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:29.925784111 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:29.967344046 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:30.854028940 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:30.854178905 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:30.854254961 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:30.854327917 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:30.854346037 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:30.942693949 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:30.942739964 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:30.942805052 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:30.943077087 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:30.943093061 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:32.201239109 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:32.201364994 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:32.202878952 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:32.202892065 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:32.203217030 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:32.213318110 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:32.213510036 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:32.213553905 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:32.213620901 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:32.213629961 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:33.165182114 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:33.165313005 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:33.165457010 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:33.165798903 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:33.165812969 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:33.474611998 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:33.474647999 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:33.474730015 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:33.475090981 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:33.475107908 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:34.733628988 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:34.733711004 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:34.734874964 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:34.734885931 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:34.735209942 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:34.736654997 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:34.736767054 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:34.736799955 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:35.510503054 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:35.510597944 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:35.510660887 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:35.510823011 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:35.510838032 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:35.529443026 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:35.529488087 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:35.529570103 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:35.529932976 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:35.529946089 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:36.786998987 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:36.787090063 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:36.788096905 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:36.788101912 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:36.788291931 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:36.789310932 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:36.789397001 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:36.789402008 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:37.598790884 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:37.598889112 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:37.598938942 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:37.599080086 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:37.599096060 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:37.882941961 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:37.882972956 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:37.883140087 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:37.883373976 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:37.883384943 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.138679028 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.138807058 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.140012026 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.140017986 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.140238047 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.141329050 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.141980886 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142011881 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.142093897 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142122030 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.142211914 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142261028 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.142357111 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142385960 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.142487049 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142512083 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.142621994 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142647028 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.142658949 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142760992 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.142790079 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.187330008 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.187473059 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.187511921 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.187524080 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.231333971 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.231472969 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.231513977 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.231539965 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.275330067 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.275413036 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:39.319371939 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:39.382823944 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:41.609818935 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:41.609914064 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:41.609967947 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:41.610251904 CET | 49768 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:41.610269070 CET | 443 | 49768 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:41.612906933 CET | 49779 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:41.612942934 CET | 443 | 49779 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:41.613019943 CET | 49779 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:41.613302946 CET | 49779 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 28, 2024 09:13:41.613312960 CET | 443 | 49779 | 104.21.80.1 | 192.168.2.5 |
Dec 28, 2024 09:13:41.715507984 CET | 49779 | 443 | 192.168.2.5 | 104.21.80.1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2024 09:12:58.816972971 CET | 51855 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 28, 2024 09:12:59.041115046 CET | 53 | 51855 | 1.1.1.1 | 192.168.2.5 |
Dec 28, 2024 09:13:21.723227024 CET | 54623 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 28, 2024 09:13:22.042922020 CET | 53 | 54623 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 28, 2024 09:12:58.816972971 CET | 192.168.2.5 | 1.1.1.1 | 0x36d6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 09:13:21.723227024 CET | 192.168.2.5 | 1.1.1.1 | 0xfd3c | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 28, 2024 09:12:59.041115046 CET | 1.1.1.1 | 192.168.2.5 | 0x36d6 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 09:13:22.042922020 CET | 1.1.1.1 | 192.168.2.5 | 0xfd3c | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 09:13:22.042922020 CET | 1.1.1.1 | 192.168.2.5 | 0xfd3c | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 09:13:22.042922020 CET | 1.1.1.1 | 192.168.2.5 | 0xfd3c | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 09:13:22.042922020 CET | 1.1.1.1 | 192.168.2.5 | 0xfd3c | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 09:13:22.042922020 CET | 1.1.1.1 | 192.168.2.5 | 0xfd3c | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 09:13:22.042922020 CET | 1.1.1.1 | 192.168.2.5 | 0xfd3c | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 09:13:22.042922020 CET | 1.1.1.1 | 192.168.2.5 | 0xfd3c | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:23 UTC | 264 | OUT | |
2024-12-28 08:13:23 UTC | 8 | OUT | |
2024-12-28 08:13:24 UTC | 1135 | IN | |
2024-12-28 08:13:24 UTC | 7 | IN | |
2024-12-28 08:13:24 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49733 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:25 UTC | 265 | OUT | |
2024-12-28 08:13:25 UTC | 76 | OUT | |
2024-12-28 08:13:26 UTC | 1131 | IN | |
2024-12-28 08:13:26 UTC | 238 | IN | |
2024-12-28 08:13:26 UTC | 1369 | IN | |
2024-12-28 08:13:26 UTC | 1369 | IN | |
2024-12-28 08:13:26 UTC | 1369 | IN | |
2024-12-28 08:13:26 UTC | 913 | IN | |
2024-12-28 08:13:26 UTC | 1369 | IN | |
2024-12-28 08:13:26 UTC | 1369 | IN | |
2024-12-28 08:13:26 UTC | 1369 | IN | |
2024-12-28 08:13:26 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49738 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:27 UTC | 278 | OUT | |
2024-12-28 08:13:27 UTC | 12802 | OUT | |
2024-12-28 08:13:28 UTC | 1127 | IN | |
2024-12-28 08:13:28 UTC | 20 | IN | |
2024-12-28 08:13:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49744 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:29 UTC | 279 | OUT | |
2024-12-28 08:13:29 UTC | 15050 | OUT | |
2024-12-28 08:13:30 UTC | 1131 | IN | |
2024-12-28 08:13:30 UTC | 20 | IN | |
2024-12-28 08:13:30 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49750 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:32 UTC | 273 | OUT | |
2024-12-28 08:13:32 UTC | 15331 | OUT | |
2024-12-28 08:13:32 UTC | 5173 | OUT | |
2024-12-28 08:13:33 UTC | 1137 | IN | |
2024-12-28 08:13:33 UTC | 20 | IN | |
2024-12-28 08:13:33 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49756 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:34 UTC | 282 | OUT | |
2024-12-28 08:13:34 UTC | 5473 | OUT | |
2024-12-28 08:13:35 UTC | 1131 | IN | |
2024-12-28 08:13:35 UTC | 20 | IN | |
2024-12-28 08:13:35 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:36 UTC | 272 | OUT | |
2024-12-28 08:13:36 UTC | 1201 | OUT | |
2024-12-28 08:13:37 UTC | 1136 | IN | |
2024-12-28 08:13:37 UTC | 20 | IN | |
2024-12-28 08:13:37 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49768 | 104.21.80.1 | 443 | 1276 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 08:13:39 UTC | 274 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:39 UTC | 15331 | OUT | |
2024-12-28 08:13:41 UTC | 1143 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:12:52 |
Start date: | 28/12/2024 |
Path: | C:\Users\user\Desktop\BagsThroat.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'112'940 bytes |
MD5 hash: | 3B819D687B2BDE89ADE8EB1AEB4C6C5F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 03:12:53 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:12:53 |
Start date: | 28/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 03:12:55 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb60000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:12:55 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:12:56 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb60000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 03:12:56 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 03:12:56 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 03:12:56 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfc0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 03:12:56 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 03:12:56 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 03:12:57 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 03:12:57 |
Start date: | 28/12/2024 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\441412\Noted.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8b0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 03:12:57 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb50000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.9% |
Total number of Nodes: | 1481 |
Total number of Limit Nodes: | 24 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|