Windows
Analysis Report
R3nz_Loader.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- R3nz_Loader.exe (PID: 2684 cmdline:
"C:\Users\ user\Deskt op\R3nz_Lo ader.exe" MD5: B43D8ECA7777B170DDC40A824AB10BB6) - conhost.exe (PID: 6716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - aspnet_regiis.exe (PID: 5780 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 2676 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 684 -s 122 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["noisycuttej.shop", "framekgirus.shop", "nearycrepso.shop", "wholersorie.shop", "fancywaxxers.shop", "abruptyopsn.shop", "tirepublicerj.shop", "rabidcowse.shop", "cloudewahsj.shop"], "Build id": "BVnUqo--@youngesstt"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-29T23:36:55.447181+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:56.516425+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:57.936435+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:59.137265+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:00.850104+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49714 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:02.386572+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49715 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:04.357809+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:06.910342+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49717 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-29T23:36:55.916300+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:56.980247+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:07.362321+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49717 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-29T23:36:55.916300+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-29T23:36:56.980247+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-29T23:36:59.618823+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_02775050 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_6CEF4322 |
Source: | Code function: | 0_2_00A706A0 | |
Source: | Code function: | 0_2_00A706A0 | |
Source: | Code function: | 0_2_00A45E50 | |
Source: | Code function: | 0_2_00A71BB0 | |
Source: | Code function: | 0_2_00A71BB0 | |
Source: | Code function: | 0_2_00A38F60 | |
Source: | Code function: | 0_2_00A71960 | |
Source: | Code function: | 3_2_02785A60 | |
Source: | Code function: | 3_2_0276D3E9 | |
Source: | Code function: | 3_2_02775050 | |
Source: | Code function: | 3_2_0279D0CA | |
Source: | Code function: | 3_2_0278A8C6 | |
Source: | Code function: | 3_2_0278208A | |
Source: | Code function: | 3_2_0279B150 | |
Source: | Code function: | 3_2_0279B150 | |
Source: | Code function: | 3_2_02782E78 | |
Source: | Code function: | 3_2_0278BE6E | |
Source: | Code function: | 3_2_027787FE | |
Source: | Code function: | 3_2_0279FFB0 | |
Source: | Code function: | 3_2_0276CFA8 | |
Source: | Code function: | 3_2_0279EC20 | |
Source: | Code function: | 3_2_0279EC20 | |
Source: | Code function: | 3_2_0279ED50 | |
Source: | Code function: | 3_2_0278AD45 | |
Source: | Code function: | 3_2_02769D30 | |
Source: | Code function: | 3_2_0276DDBE | |
Source: | Code function: | 3_2_02785210 | |
Source: | Code function: | 3_2_02787200 | |
Source: | Code function: | 3_2_0279F340 | |
Source: | Code function: | 3_2_027743D0 | |
Source: | Code function: | 3_2_02769390 | |
Source: | Code function: | 3_2_02777828 | |
Source: | Code function: | 3_2_02777828 | |
Source: | Code function: | 3_2_027690B0 | |
Source: | Code function: | 3_2_027950A0 | |
Source: | Code function: | 3_2_02783890 | |
Source: | Code function: | 3_2_02783890 | |
Source: | Code function: | 3_2_02783890 | |
Source: | Code function: | 3_2_02783890 | |
Source: | Code function: | 3_2_02783890 | |
Source: | Code function: | 3_2_02783890 | |
Source: | Code function: | 3_2_02788890 | |
Source: | Code function: | 3_2_02776146 | |
Source: | Code function: | 3_2_02776146 | |
Source: | Code function: | 3_2_027A0130 | |
Source: | Code function: | 3_2_027A0130 | |
Source: | Code function: | 3_2_0277712B | |
Source: | Code function: | 3_2_0278A90B | |
Source: | Code function: | 3_2_0276B909 | |
Source: | Code function: | 3_2_02787E5C | |
Source: | Code function: | 3_2_0277E650 | |
Source: | Code function: | 3_2_02785E00 | |
Source: | Code function: | 3_2_02785E00 | |
Source: | Code function: | 3_2_0279FEE0 | |
Source: | Code function: | 3_2_0276A2B5 | |
Source: | Code function: | 3_2_0277B6CA | |
Source: | Code function: | 3_2_0278B6B5 | |
Source: | Code function: | 3_2_0276A6AA | |
Source: | Code function: | 3_2_0277BE80 | |
Source: | Code function: | 3_2_02798770 | |
Source: | Code function: | 3_2_0278CF71 | |
Source: | Code function: | 3_2_0278CF71 | |
Source: | Code function: | 3_2_02788748 | |
Source: | Code function: | 3_2_02779720 | |
Source: | Code function: | 3_2_0278B710 | |
Source: | Code function: | 3_2_0278B710 | |
Source: | Code function: | 3_2_02776FF0 | |
Source: | Code function: | 3_2_027877F3 | |
Source: | Code function: | 3_2_0279CFD9 | |
Source: | Code function: | 3_2_0279B7C0 | |
Source: | Code function: | 3_2_0279B7C0 | |
Source: | Code function: | 3_2_0278C78B | |
Source: | Code function: | 3_2_0278C78B | |
Source: | Code function: | 3_2_0278C78B | |
Source: | Code function: | 3_2_02787C36 | |
Source: | Code function: | 3_2_0279C42E | |
Source: | Code function: | 3_2_0279C42E | |
Source: | Code function: | 3_2_02783400 | |
Source: | Code function: | 3_2_02789400 | |
Source: | Code function: | 3_2_027984FF | |
Source: | Code function: | 3_2_0279CCFF | |
Source: | Code function: | 3_2_027674E0 | |
Source: | Code function: | 3_2_027815B0 | |
Source: | Code function: | 3_2_027815B0 | |
Source: | Code function: | 3_2_027815B0 | |
Source: | Code function: | 3_2_02776D9A | |
Source: | Code function: | 3_2_0278A586 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_02792590 |
Source: | Code function: | 3_2_04D01000 |
Source: | Code function: | 3_2_02792590 |
Source: | Code function: | 3_2_02792700 |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_6CEE8640 | |
Source: | Code function: | 0_2_6CEE6B80 |
Source: | Code function: | 0_2_00A4F4A0 | |
Source: | Code function: | 0_2_00A37CF0 | |
Source: | Code function: | 0_2_00A4ECD0 | |
Source: | Code function: | 0_2_00A69620 | |
Source: | Code function: | 0_2_00A5EC40 | |
Source: | Code function: | 0_2_00A38180 | |
Source: | Code function: | 0_2_00A4E9F0 | |
Source: | Code function: | 0_2_00A40520 | |
Source: | Code function: | 0_2_00A35330 | |
Source: | Code function: | 0_2_00A37330 | |
Source: | Code function: | 0_2_00A34910 | |
Source: | Code function: | 0_2_00A38F60 | |
Source: | Code function: | 0_2_00A43760 | |
Source: | Code function: | 0_2_00A50770 | |
Source: | Code function: | 0_2_00A68D50 | |
Source: | Code function: | 0_2_6CEE8640 | |
Source: | Code function: | 0_2_6CEE6B80 | |
Source: | Code function: | 0_2_6CEE1740 | |
Source: | Code function: | 0_2_6CEE1000 | |
Source: | Code function: | 0_2_6CEE7D90 | |
Source: | Code function: | 0_2_6CEFA2F1 | |
Source: | Code function: | 0_2_6CEF0250 | |
Source: | Code function: | 0_2_6CEE43E0 | |
Source: | Code function: | 3_2_02785A60 | |
Source: | Code function: | 3_2_0276D3E9 | |
Source: | Code function: | 3_2_02797BA0 | |
Source: | Code function: | 3_2_02775050 | |
Source: | Code function: | 3_2_02797810 | |
Source: | Code function: | 3_2_0278208A | |
Source: | Code function: | 3_2_0279B150 | |
Source: | Code function: | 3_2_02782E78 | |
Source: | Code function: | 3_2_0279F670 | |
Source: | Code function: | 3_2_0278BE6E | |
Source: | Code function: | 3_2_0277062F | |
Source: | Code function: | 3_2_027787FE | |
Source: | Code function: | 3_2_02768790 | |
Source: | Code function: | 3_2_0276AC50 | |
Source: | Code function: | 3_2_02771CE0 | |
Source: | Code function: | 3_2_0279ED50 | |
Source: | Code function: | 3_2_02780D80 | |
Source: | Code function: | 3_2_02766270 | |
Source: | Code function: | 3_2_0279E270 | |
Source: | Code function: | 3_2_02764260 | |
Source: | Code function: | 3_2_02774A6F | |
Source: | Code function: | 3_2_0277D250 | |
Source: | Code function: | 3_2_0278B244 | |
Source: | Code function: | 3_2_02774A31 | |
Source: | Code function: | 3_2_02780A35 | |
Source: | Code function: | 3_2_0277DA20 | |
Source: | Code function: | 3_2_0277C22F | |
Source: | Code function: | 3_2_02785210 | |
Source: | Code function: | 3_2_02788A00 | |
Source: | Code function: | 3_2_02787200 | |
Source: | Code function: | 3_2_027972D0 | |
Source: | Code function: | 3_2_0276EAA0 | |
Source: | Code function: | 3_2_0279DA91 | |
Source: | Code function: | 3_2_02784B64 | |
Source: | Code function: | 3_2_0277FB50 | |
Source: | Code function: | 3_2_0279F340 | |
Source: | Code function: | 3_2_02768320 | |
Source: | Code function: | 3_2_0279031D | |
Source: | Code function: | 3_2_0278BBFA | |
Source: | Code function: | 3_2_027743D0 | |
Source: | Code function: | 3_2_02769390 | |
Source: | Code function: | 3_2_02764B90 | |
Source: | Code function: | 3_2_0279E380 | |
Source: | Code function: | 3_2_02797070 | |
Source: | Code function: | 3_2_0279B860 | |
Source: | Code function: | 3_2_0279F050 | |
Source: | Code function: | 3_2_02791847 | |
Source: | Code function: | 3_2_0277A820 | |
Source: | Code function: | 3_2_02777828 | |
Source: | Code function: | 3_2_0278B0DD | |
Source: | Code function: | 3_2_0276B0C0 | |
Source: | Code function: | 3_2_027690B0 | |
Source: | Code function: | 3_2_027638B0 | |
Source: | Code function: | 3_2_027658B0 | |
Source: | Code function: | 3_2_02783890 | |
Source: | Code function: | 3_2_02780090 | |
Source: | Code function: | 3_2_02796081 | |
Source: | Code function: | 3_2_02781950 | |
Source: | Code function: | 3_2_02776146 | |
Source: | Code function: | 3_2_0277712B | |
Source: | Code function: | 3_2_0276B909 | |
Source: | Code function: | 3_2_0278B1EA | |
Source: | Code function: | 3_2_0278D1C0 | |
Source: | Code function: | 3_2_0279E9A0 | |
Source: | Code function: | 3_2_02771196 | |
Source: | Code function: | 3_2_0278EE79 | |
Source: | Code function: | 3_2_02787E5C | |
Source: | Code function: | 3_2_0279E640 | |
Source: | Code function: | 3_2_02785E00 | |
Source: | Code function: | 3_2_02765ED0 | |
Source: | Code function: | 3_2_0277C6B0 | |
Source: | Code function: | 3_2_027836B0 | |
Source: | Code function: | 3_2_02784EB0 | |
Source: | Code function: | 3_2_02762E90 | |
Source: | Code function: | 3_2_0277BE80 | |
Source: | Code function: | 3_2_0277CF70 | |
Source: | Code function: | 3_2_02798770 | |
Source: | Code function: | 3_2_02788748 | |
Source: | Code function: | 3_2_02779720 | |
Source: | Code function: | 3_2_02798F19 | |
Source: | Code function: | 3_2_02766700 | |
Source: | Code function: | 3_2_02776FF0 | |
Source: | Code function: | 3_2_027877F3 | |
Source: | Code function: | 3_2_02778FE7 | |
Source: | Code function: | 3_2_0278DFE9 | |
Source: | Code function: | 3_2_027697D0 | |
Source: | Code function: | 3_2_027957D2 | |
Source: | Code function: | 3_2_027867A1 | |
Source: | Code function: | 3_2_027907A0 | |
Source: | Code function: | 3_2_0278C78B | |
Source: | Code function: | 3_2_02779470 | |
Source: | Code function: | 3_2_02795C69 | |
Source: | Code function: | 3_2_0276DC62 | |
Source: | Code function: | 3_2_02786C53 | |
Source: | Code function: | 3_2_0277DC30 | |
Source: | Code function: | 3_2_02787C36 | |
Source: | Code function: | 3_2_0279C42E | |
Source: | Code function: | 3_2_02783400 | |
Source: | Code function: | 3_2_027984FF | |
Source: | Code function: | 3_2_0277ECF0 | |
Source: | Code function: | 3_2_027674E0 | |
Source: | Code function: | 3_2_0276B49D | |
Source: | Code function: | 3_2_02782D70 | |
Source: | Code function: | 3_2_0279E520 | |
Source: | Code function: | 3_2_02779470 | |
Source: | Code function: | 3_2_027815B0 | |
Source: | Code function: | 3_2_0279E5B0 | |
Source: | Code function: | 3_2_02776D9A |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_02797BA0 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00A15846 | |
Source: | Code function: | 0_2_00A13B00 | |
Source: | Code function: | 0_2_00A15846 | |
Source: | Code function: | 0_2_00A15846 | |
Source: | Code function: | 0_2_00A16A01 | |
Source: | Code function: | 0_2_00A1646B | |
Source: | Code function: | 0_2_00A15846 | |
Source: | Code function: | 0_2_00A14283 | |
Source: | Code function: | 0_2_00A15846 | |
Source: | Code function: | 0_2_00A15846 | |
Source: | Code function: | 0_2_00A127B5 | |
Source: | Code function: | 0_2_00A15736 | |
Source: | Code function: | 0_2_00A15736 | |
Source: | Code function: | 0_2_00A1251A | |
Source: | Code function: | 0_2_00A15846 | |
Source: | Code function: | 3_2_0279E222 |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_6CEF4322 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_3-14378 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_0279CCA0 |
Source: | Code function: | 0_2_6CEF3C6A |
Source: | Code function: | 0_2_6CEF3C39 | |
Source: | Code function: | 0_2_6CEF2A65 |
Source: | Code function: | 0_2_6CEF584C |
Source: | Code function: | 0_2_6CEF3C6A | |
Source: | Code function: | 0_2_6CEF12DA | |
Source: | Code function: | 0_2_6CEF0E01 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_6CEF14A8 |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_6CEF0F23 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 311 Process Injection | 11 Deobfuscate/Decode Files or Information | LSASS Memory | 11 File and Directory Discovery | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 4 Obfuscated Files or Information | Security Account Manager | 33 System Information Discovery | SMB/Windows Admin Shares | 1 Screen Capture | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Software Packing | NTDS | 251 Security Software Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 23 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Masquerading | Cached Domain Credentials | 1 Process Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 23 Virtualization/Sandbox Evasion | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 311 Process Injection | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Win32.Dropper.Genie | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.32.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.32.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582077 |
Start date and time: | 2024-12-29 23:36:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | R3nz_Loader.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/7@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.160.20, 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: R3nz_Loader.exe
Time | Type | Description |
---|---|---|
17:36:54 | API Interceptor | |
17:37:14 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.32.1 | Get hash | malicious | CMSBrute | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Python Stealer, Creal Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Nitol, Zegost | Browse |
| ||
Get hash | malicious | Nitol, Zegost | Browse |
| ||
Get hash | malicious | Nitol, Zegost | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Ades Stealer, BlackGuard, NitroStealer, VEGA Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_R3nz_Loader.exe_bec9dbe1b9e61d8d1e53ea540fa1a964513b9dc_3ffa48ab_8809308f-a3f2-4ba9-9fed-4b6a65262092\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9915220411873568 |
Encrypted: | false |
SSDEEP: | 192:VOR2G+psXkd0BU/KaGtizuiFVZ24IO8qnf5:VfS0eBU/KaRzuiFVY4IO8qnf |
MD5: | 582C73688AD6120B54A0A15490D44491 |
SHA1: | 86DE991BC7B118A29A6F1EA8F480A3B9B04BE2C5 |
SHA-256: | 22B8D6486860A06E0B0684D4D70540AA7C39113AD190B5326CF459D4101578E8 |
SHA-512: | A5ECD95443D1E6FEE88705DB5E8731E282C4530185A5A4FCA1B7E81B6ADDF6BDDD236E568FE000D03EB8627C391850508DF9CF65FAC328F84FE2637913D09B9C |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 199358 |
Entropy (8bit): | 3.3540321673380293 |
Encrypted: | false |
SSDEEP: | 1536:NRkOrXpN4uE2aO2oLTg/nI+OcGK/yCDwSeCq:NRhT4uEqZLTgvZOcjBwSZ |
MD5: | EB370DF60B9F703129EA6D66425032F2 |
SHA1: | 49CB1A6A4803AB3658ED4921BC13D1214AB327B6 |
SHA-256: | F6C0016BFDC41508E32BB32765651371054AFE58575EADE5EDE8554C804BBA81 |
SHA-512: | 3F7B6E1C013D9C4A3E6E83B14678692A928D43C55FE05811229458CC436169E96EB8B3BCE0BC6F0416198242687D082F8469FC4501541693A827ECD619E05CEA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8420 |
Entropy (8bit): | 3.7043608808146935 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJyk6HPT6YEIsSULrcGgmfZRY0prj89bSbsfX8Gm:R6lXJh6HPT6YEDSULAGgmffY1Sgf0 |
MD5: | CA53712F30600D7B9BF2DAAB56485E80 |
SHA1: | 597D3117EBAAC0708A2F22636A9AF4FBCED75A68 |
SHA-256: | 965953693DB98818DB8EBAF44386F73BF404E60D82B0A9EB089ED947FD29CF53 |
SHA-512: | 4525BCEFF966C799C88D551A679F423671744CAE479132F1173B8230AE9A30B4241FA706AF86437FFF47DF5A17BC2CD73805A8FD5BB60921EC0748D8E31030A8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4786 |
Entropy (8bit): | 4.525371893539953 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsbJg77aI9zQWpW8VY+Ym8M4JB2FW7+q8vkUHV1v4dd:uIjf1I7Jp7V2JR7KJHV1v0d |
MD5: | B2987132B120B907905FA11AEE242C93 |
SHA1: | A6F6868D8C23A7DE9434BE44329608AC3ED64D5A |
SHA-256: | D6AE230A4E8A02DA4F55F7522F6FD248577A3C32285589D001F6F6579F319D40 |
SHA-512: | A8EDC5DD73860628853D5FB9BEACC547F12600658ECA64D96327EEF534624D78DBD5496EB110473F64026C6C8D3C017B112DA1ACE0337115B97824BBF1E4B1E7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\R3nz_Loader.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 443392 |
Entropy (8bit): | 7.128674977243316 |
Encrypted: | false |
SSDEEP: | 6144:+EQUaPo0tMBs/8d7+OUbY79SXh61wICBqrH9TmXCf5OthEVriynomZG:qPoY/srM+4o1w+LcXlExi4lZG |
MD5: | 747539CEFB1EF3C38AD756A2F5305097 |
SHA1: | 6F5CE5B9D430931164E4B3E57DF4C98EA0F82C34 |
SHA-256: | 05512CA3A16E8D0FB965DE8F20E9A9F0B046F3D3384D89D767C4D875182BDA3F |
SHA-512: | 4A9934BD7A2F8BFEC4DDFA0A7E9D24DBDFCEE864163804D9B3B726AB16209F1DE43A3CBD3E003531758C5C2A68AC21549C3A4DF7B6EE1E373D9A0DD8C1F209C6 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.421673815632608 |
Encrypted: | false |
SSDEEP: | 6144:lSvfpi6ceLP/9skLmb0OToWSPHaJG8nAgeMZMMhA2fX4WABlEnNi0uhiTw:svloToW+EZMM6DFy003w |
MD5: | 7D7FBE8A69395F920AEBE7ECB0E7677B |
SHA1: | 30B5A3BA9C05015EE4D4CFA78EA2EB442D898F40 |
SHA-256: | 5BD44443F8ED2E008509ACE20BCA32BCEB158A164B43D855D358B3E289C5EC17 |
SHA-512: | B3B91C3BB0FDEAC91C88FD3E39F4C253FD8C317A91237841076C4733DE3C1CAD75C6C05ADE914E545AD617A7BB2EFA9A49219AF961B7B4268246FCF195F724D1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\R3nz_Loader.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1415 |
Entropy (8bit): | 4.541407831894227 |
Encrypted: | false |
SSDEEP: | 24:7v74Nu5MvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4cMff2p8p14nrPKktp |
MD5: | 1F8E54DB13948BF2759E2DE1AEF4FF27 |
SHA1: | 147E07C6B98CFF68D51C34CF30E338A8A17C156B |
SHA-256: | 3D638F789F4CC5B75D505F12DFF02DEA7FB8B7CF3D91DE35B56BA98C1CA038AF |
SHA-512: | CC73D243D70EE2E26E1858E074B26DDF2F02CB06970D6B78E7E9EC9C449334FBA86FC7337073D80025EE15E34F7EC22026957B9E1D6A05DC6795D2CECD0F6442 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.737994793682443 |
TrID: |
|
File name: | R3nz_Loader.exe |
File size: | 706'048 bytes |
MD5: | b43d8eca7777b170ddc40a824ab10bb6 |
SHA1: | a7da0bbde621a7df3489b394ee4e5cea963225e6 |
SHA256: | 1db1a4c253278293c863dff9759c6577f1b6b5b8f69ac0c612338453eeea96d9 |
SHA512: | 54c6ec0681b7e67782c4d142450f84bef5129c4cfa4dfbd70edc63bd3385d8cc9277cdfbcf2c3a8f6c5cb49b9252eb8c46984a65164164886b805e084e6bbb55 |
SSDEEP: | 12288:ENvwXTkEVI9HBoDWupxGsFITxLmIJpCbp4/MLq/xgtQS7iBDgCL+ZNNzloh3LouP:ENoXQEV2hozxG0c0bp2Y4oQSW |
TLSH: | EFE47B9C726072DFC867D472DEA82C68FA9174BB871F4217A02716AD9E0D897CF150F2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....qg..............0..............@....... ....@.. .......................`............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4b400a |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6771CD0F [Sun Dec 29 22:28:31 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [004B4000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8e780 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb0000 | 0x640 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xb2000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb4000 | 0x8 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x8e000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
^]tBD;I | 0x2000 | 0x8a8cc | 0x8aa00 | 4aba24cfb364dff8e98778b6d82a69fd | False | 1.0003187697249774 | data | 7.999688407134414 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.text | 0x8e000 | 0x20b48 | 0x20c00 | f53637936f05b21a5b09ae51f5f57bac | False | 0.3313976025763359 | data | 4.688971111396578 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xb0000 | 0x640 | 0x800 | d018ee0af29c98b01b7fd3895a878684 | False | 0.36279296875 | data | 3.5529147255674487 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xb2000 | 0xc | 0x200 | 49ba7a9e1e9d0fde8dd025f5fdb99dfe | False | 0.044921875 | data | 0.09800417566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
0xb4000 | 0x10 | 0x200 | 45934a465f9653459a1ea07b453b8625 | False | 0.044921875 | data | 0.14263576814887827 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xb00a0 | 0x3b4 | data | 0.45675105485232065 | ||
RT_MANIFEST | 0xb0454 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-29T23:36:55.447181+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:55.916300+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:55.916300+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:56.516425+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:56.980247+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:56.980247+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:57.936435+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:59.137265+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:36:59.618823+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:00.850104+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49714 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:02.386572+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49715 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:04.357809+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:06.910342+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49717 | 104.21.32.1 | 443 | TCP |
2024-12-29T23:37:07.362321+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49717 | 104.21.32.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 29, 2024 23:36:54.999418974 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:54.999465942 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:54.999543905 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.000592947 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.000606060 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.447102070 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.447180986 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.450963974 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.450973988 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.451217890 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.503643036 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.517797947 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.517813921 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.517884970 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.916250944 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.916343927 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.916409969 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.983843088 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.983897924 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:55.983916044 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:55.983922958 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.078555107 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.078612089 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.078800917 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.079494953 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.079514980 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.516278028 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.516424894 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.531290054 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.531310081 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.531528950 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.538446903 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.538561106 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.538580894 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980240107 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980283022 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980309963 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980329990 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.980339050 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980349064 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980391026 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.980400085 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980424881 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980437994 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.980443001 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980477095 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980487108 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.980490923 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:56.980550051 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:56.980714083 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.036166906 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.036180973 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.063210964 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.063239098 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.063256979 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.063261986 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.063271046 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.063339949 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.063342094 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.063384056 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.111373901 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.111397028 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.111407042 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.111413002 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.500977039 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.501008034 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.501081944 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.501516104 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.501527071 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.936269045 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.936434984 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.937896013 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.937902927 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.938141108 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:57.939714909 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.939714909 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:57.939752102 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:58.540867090 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:58.540949106 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:58.541117907 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:58.541474104 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:58.541488886 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:58.677575111 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:58.677637100 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:58.677927971 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:58.678314924 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:58.678333998 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.137181044 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.137264967 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:59.138648033 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:59.138659000 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.138880014 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.151302099 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:59.155493975 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:59.155536890 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.155590057 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:59.203349113 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.618834972 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.618921995 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:36:59.619013071 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:59.629853010 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:36:59.629877090 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:00.406337976 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.406363964 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:00.406461000 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.406888008 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.406897068 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:00.850033045 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:00.850104094 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.851615906 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.851624012 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:00.851855993 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:00.853910923 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.854064941 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.854093075 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:00.854161978 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:00.854168892 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:01.482786894 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:01.482889891 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:01.483012915 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:01.483130932 CET | 49714 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:01.483145952 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:01.951387882 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:01.951427937 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:01.951500893 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:01.951843977 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:01.951860905 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:02.386473894 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:02.386571884 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:02.388111115 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:02.388122082 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:02.388326883 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:02.399676085 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:02.399799109 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:02.399806976 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:03.086950064 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:03.087037086 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:03.087120056 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:03.089245081 CET | 49715 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:03.089262962 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:03.901685953 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:03.901731014 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:03.901957035 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:03.902357101 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:03.902374029 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.357731104 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.357809067 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.359880924 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.359893084 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.360223055 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.388480902 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.389606953 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.389648914 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.389833927 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.389870882 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.390022993 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.390052080 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.390197992 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.390229940 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.390388012 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.390419960 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.390594006 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.390625954 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.390635014 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.390649080 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.390794039 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.390821934 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.390839100 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.390991926 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.391030073 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.400046110 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.400217056 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.400264025 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.400269985 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.400299072 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.400312901 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:04.400419950 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:04.405297041 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.465044975 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.465157986 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.465221882 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.465459108 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.465466976 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.475269079 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.475318909 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.475580931 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.476093054 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.476109028 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.910254002 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.910341978 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.911601067 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.911613941 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.911840916 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:06.913155079 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.913247108 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:06.913269997 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362348080 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362412930 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362468004 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362498045 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362503052 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.362560987 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362601995 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.362718105 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362744093 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362792015 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.362807989 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.362858057 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.367031097 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.367089987 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.367117882 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.367155075 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.367171049 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.367197037 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.367225885 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.367253065 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.369889021 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.369925976 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Dec 29, 2024 23:37:07.369951010 CET | 49717 | 443 | 192.168.2.5 | 104.21.32.1 |
Dec 29, 2024 23:37:07.369966030 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 29, 2024 23:36:54.981925964 CET | 65484 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 29, 2024 23:36:54.993448973 CET | 53 | 65484 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 29, 2024 23:36:54.981925964 CET | 192.168.2.5 | 1.1.1.1 | 0xd6a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 29, 2024 23:36:54.993448973 CET | 1.1.1.1 | 192.168.2.5 | 0xd6a | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Dec 29, 2024 23:36:54.993448973 CET | 1.1.1.1 | 192.168.2.5 | 0xd6a | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Dec 29, 2024 23:36:54.993448973 CET | 1.1.1.1 | 192.168.2.5 | 0xd6a | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 29, 2024 23:36:54.993448973 CET | 1.1.1.1 | 192.168.2.5 | 0xd6a | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 29, 2024 23:36:54.993448973 CET | 1.1.1.1 | 192.168.2.5 | 0xd6a | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 29, 2024 23:36:54.993448973 CET | 1.1.1.1 | 192.168.2.5 | 0xd6a | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 29, 2024 23:36:54.993448973 CET | 1.1.1.1 | 192.168.2.5 | 0xd6a | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:36:55 UTC | 264 | OUT | |
2024-12-29 22:36:55 UTC | 8 | OUT | |
2024-12-29 22:36:55 UTC | 1129 | IN | |
2024-12-29 22:36:55 UTC | 7 | IN | |
2024-12-29 22:36:55 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:36:56 UTC | 265 | OUT | |
2024-12-29 22:36:56 UTC | 53 | OUT | |
2024-12-29 22:36:56 UTC | 1129 | IN | |
2024-12-29 22:36:56 UTC | 240 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN | |
2024-12-29 22:36:56 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:36:57 UTC | 280 | OUT | |
2024-12-29 22:36:57 UTC | 12823 | OUT | |
2024-12-29 22:36:58 UTC | 1140 | IN | |
2024-12-29 22:36:58 UTC | 20 | IN | |
2024-12-29 22:36:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:36:59 UTC | 278 | OUT | |
2024-12-29 22:36:59 UTC | 15053 | OUT | |
2024-12-29 22:36:59 UTC | 1140 | IN | |
2024-12-29 22:36:59 UTC | 20 | IN | |
2024-12-29 22:36:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49714 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:37:00 UTC | 279 | OUT | |
2024-12-29 22:37:00 UTC | 15331 | OUT | |
2024-12-29 22:37:00 UTC | 5218 | OUT | |
2024-12-29 22:37:01 UTC | 1131 | IN | |
2024-12-29 22:37:01 UTC | 20 | IN | |
2024-12-29 22:37:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49715 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:37:02 UTC | 280 | OUT | |
2024-12-29 22:37:02 UTC | 1280 | OUT | |
2024-12-29 22:37:03 UTC | 1132 | IN | |
2024-12-29 22:37:03 UTC | 20 | IN | |
2024-12-29 22:37:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:37:04 UTC | 283 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:04 UTC | 15331 | OUT | |
2024-12-29 22:37:06 UTC | 1136 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49717 | 104.21.32.1 | 443 | 5780 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-29 22:37:06 UTC | 265 | OUT | |
2024-12-29 22:37:06 UTC | 88 | OUT | |
2024-12-29 22:37:07 UTC | 1124 | IN | |
2024-12-29 22:37:07 UTC | 245 | IN | |
2024-12-29 22:37:07 UTC | 929 | IN | |
2024-12-29 22:37:07 UTC | 1369 | IN | |
2024-12-29 22:37:07 UTC | 1369 | IN | |
2024-12-29 22:37:07 UTC | 1369 | IN | |
2024-12-29 22:37:07 UTC | 1369 | IN | |
2024-12-29 22:37:07 UTC | 1369 | IN | |
2024-12-29 22:37:07 UTC | 1369 | IN | |
2024-12-29 22:37:07 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 17:36:53 |
Start date: | 29/12/2024 |
Path: | C:\Users\user\Desktop\R3nz_Loader.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa10000 |
File size: | 706'048 bytes |
MD5 hash: | B43D8ECA7777B170DDC40A824AB10BB6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 17:36:53 |
Start date: | 29/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 17:36:53 |
Start date: | 29/12/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2e0000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 6 |
Start time: | 17:36:54 |
Start date: | 29/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3f0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 13.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 7.2% |
Total number of Nodes: | 1480 |
Total number of Limit Nodes: | 22 |
Graph
Function 6CEE8640 Relevance: 100.9, APIs: 28, Strings: 25, Instructions: 8115nativethreadmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEE1740 Relevance: 46.6, APIs: 22, Strings: 3, Instructions: 2893filememoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF0AF1 Relevance: 3.1, APIs: 2, Instructions: 76COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF591D Relevance: 3.1, APIs: 2, Instructions: 67COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF6180 Relevance: 3.1, APIs: 2, Instructions: 66COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF3EE6 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEE43E0 Relevance: 7.7, Strings: 4, Instructions: 2656COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF3C6A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 77COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEE7D90 Relevance: 5.6, Strings: 4, Instructions: 646COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A43760 Relevance: 5.0, Strings: 2, Instructions: 2539COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A40520 Relevance: 3.9, Strings: 3, Instructions: 183COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A69620 Relevance: 3.3, Strings: 2, Instructions: 756COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A5EC40 Relevance: 1.8, Strings: 1, Instructions: 582COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEE1000 Relevance: 1.8, Strings: 1, Instructions: 556COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF14A8 Relevance: 1.6, APIs: 1, Instructions: 144COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF4322 Relevance: 1.6, APIs: 1, Instructions: 140COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A4E9F0 Relevance: 1.5, Strings: 1, Instructions: 264COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A706A0 Relevance: 1.4, Strings: 1, Instructions: 102COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF584C Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A34910 Relevance: .7, Instructions: 670COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A38180 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A38F60 Relevance: .6, Instructions: 627COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A35330 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A50770 Relevance: .6, Instructions: 577COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF0250 Relevance: .6, Instructions: 566COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A37330 Relevance: .5, Instructions: 539COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A4ECD0 Relevance: .3, Instructions: 345COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A45E50 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A37CF0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A68D50 Relevance: .3, Instructions: 295COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A4F4A0 Relevance: .2, Instructions: 184COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A71BB0 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A71960 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF3C39 Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A65480 Relevance: 46.4, Strings: 37, Instructions: 142COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A62550 Relevance: 43.9, Strings: 35, Instructions: 119COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF3803 Relevance: 15.1, APIs: 10, Instructions: 69COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF546A Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 77COMMONLIBRARYCODE
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF22B7 Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF2433 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 62COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF2AEA Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 30libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF7107 Relevance: 7.7, APIs: 5, Instructions: 199COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF807C Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 170fileCOMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A52290 Relevance: 6.3, Strings: 5, Instructions: 38COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF4047 Relevance: 6.1, APIs: 4, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF3274 Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 6CEF76F0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 47COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 11.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 28.2% |
Total number of Nodes: | 305 |
Total number of Limit Nodes: | 29 |
Graph
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02797BA0 Relevance: 23.5, APIs: 11, Strings: 2, Instructions: 756memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04D01000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02775050 Relevance: 16.7, APIs: 1, Strings: 8, Instructions: 939encryptionCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02768790 Relevance: 7.7, APIs: 5, Instructions: 219threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0278BE6E Relevance: 2.1, APIs: 1, Instructions: 629COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0278A90B Relevance: 1.6, APIs: 1, Instructions: 70COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0278A8C6 Relevance: 1.6, APIs: 1, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0279CCA0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0276CD76 Relevance: 3.1, APIs: 2, Instructions: 122COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0276CF3D Relevance: 3.0, APIs: 2, Instructions: 37COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02769F18 Relevance: 1.6, APIs: 1, Instructions: 61libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0279CEC2 Relevance: 1.6, APIs: 1, Instructions: 51COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027966D0 Relevance: 1.5, APIs: 1, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0279CC10 Relevance: 1.5, APIs: 1, Instructions: 44memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02791726 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0278DEF0 Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0279B120 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0279B100 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02792590 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 104clipboardCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02791E96 Relevance: 77.1, APIs: 1, Strings: 43, Instructions: 147memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|