Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 7412 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 79D5CC6637E2C1502789C2D7D610916C)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["slipperyloo.lat", "cheapptaxysu.click", "curverpluch.lat", "bashfulacid.lat", "talkynicer.lat", "wordyfindy.lat", "tentabatte.lat", "shapestickyr.lat", "manyrestro.lat"], "Build id": "CZJvss--"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 1 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:11.331807+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:11.989226+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:13.233334+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:25.673943+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:27.091080+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:29.754507+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:31.157538+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:33.471503+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49746 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:11.495156+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:12.457406+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:33.992765+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49746 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:11.495156+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:12.457406+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:11.331807+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:11.989226+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:13.233334+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49737 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:25.673943+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:27.091080+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:29.754507+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:31.157538+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49745 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:33.471503+0100 | 2058541 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49746 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:10.736491+0100 | 2058540 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 61947 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:26.168677+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 172.67.177.88 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121F69 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121DB6 | |
Source: | Code function: | 0_3_03121DB6 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_3_03121728 | |
Source: | Code function: | 0_3_03121728 | |
Source: | Code function: | 0_3_03121728 | |
Source: | Code function: | 0_3_03123CE7 | |
Source: | Code function: | 0_3_03123CE7 | |
Source: | Code function: | 0_3_03123CE7 | |
Source: | Code function: | 0_3_0093C319 | |
Source: | Code function: | 0_3_0093877D | |
Source: | Code function: | 0_3_0093C319 | |
Source: | Code function: | 0_3_0093877D | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_00945F28 | |
Source: | Code function: | 0_3_03121728 | |
Source: | Code function: | 0_3_03121728 | |
Source: | Code function: | 0_3_03121728 | |
Source: | Code function: | 0_3_03123CE7 | |
Source: | Code function: | 0_3_03123CE7 | |
Source: | Code function: | 0_3_03123CE7 | |
Source: | Code function: | 0_3_0093C319 | |
Source: | Code function: | 0_3_0093877D | |
Source: | Code function: | 0_3_00945F28 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 221 Security Software Discovery | Remote Desktop Protocol | 41 Data from Local System | 2 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
53% | ReversingLabs | Win32.Spyware.Lummastealer | ||
100% | Avira | PUA/InstallCore.Gen7 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cheapptaxysu.click | 172.67.177.88 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.177.88 | cheapptaxysu.click | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582556 |
Start date and time: | 2024-12-30 21:28:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/0@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.109.210.53, 20.12.23.50, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Setup.exe, PID 7412 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Setup.exe
Time | Type | Description |
---|---|---|
15:29:10 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.177.88 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | ScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar | Browse | |||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Phisher | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cheapptaxysu.click | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRAT | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | SmokeLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, zgRAT | Browse |
|
File type: | |
Entropy (8bit): | 7.951386087270897 |
TrID: |
|
File name: | Setup.exe |
File size: | 3'317'708 bytes |
MD5: | 79d5cc6637e2c1502789c2d7d610916c |
SHA1: | e8e4f4c2c8edc879da6a157a30215e5c3c0d3562 |
SHA256: | 9ddb77296f5248b63b1499b6d78b8707b083518140b789902e037b69260baeb8 |
SHA512: | c023b4415590409be39d4e0ccfdfd6fba7e30693c001ce044a0ef4b6c2fd9b67253f83c599c2d0dc3aac3d23ae690addfe83f105b10037a2506f5e1ea3672469 |
SSDEEP: | 49152:JLcLx9Fx072FxeBJhCp8bC6BJ5PE072FxeBJhCp8bC6B:FcFaaFxEb4kC0haFxEb4kC |
TLSH: | D3E522C4B1B13F20F4B3A2711195FE36812B5D2E69258C43A3E8DC2F3BB969DDE85161 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 870147476127061f |
Entrypoint: | 0x409c40 |
Entrypoint Section: | CODE |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 1 |
OS Version Minor: | 0 |
File Version Major: | 1 |
File Version Minor: | 0 |
Subsystem Version Major: | 1 |
Subsystem Version Minor: | 0 |
Import Hash: | 884310b1928934402ea6fec1dbd3cf5e |
Signature Valid: | false |
Signature Issuer: | CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | F923D90F58A0DABA233C9E35336C5B42 |
Thumbprint SHA-1: | C7FE6BFD5466557472B379DE462A5BF44735FDC8 |
Thumbprint SHA-256: | B82B866DF2064BE26881225D2E8E201EED634C5039801EE680E1969A9BF06963 |
Serial: | 72AA1D3669C10A617E12E386EC62F7F7 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFC4h |
push ebx |
push esi |
push edi |
xor eax, eax |
mov dword ptr [ebp-10h], eax |
mov dword ptr [ebp-24h], eax |
call 00007F7A4C81E03Bh |
call 00007F7A4C81F242h |
call 00007F7A4C81F4D1h |
call 00007F7A4C821508h |
call 00007F7A4C82154Fh |
call 00007F7A4C823E7Eh |
call 00007F7A4C823FE5h |
xor eax, eax |
push ebp |
push 0040A2FCh |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
xor edx, edx |
push ebp |
push 0040A2C5h |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
mov eax, dword ptr [0040C014h] |
call 00007F7A4C824A4Bh |
call 00007F7A4C82467Eh |
lea edx, dword ptr [ebp-10h] |
xor eax, eax |
call 00007F7A4C821B38h |
mov edx, dword ptr [ebp-10h] |
mov eax, 0040CDE8h |
call 00007F7A4C81E0E7h |
push 00000002h |
push 00000000h |
push 00000001h |
mov ecx, dword ptr [0040CDE8h] |
mov dl, 01h |
mov eax, 0040738Ch |
call 00007F7A4C8223C7h |
mov dword ptr [0040CDECh], eax |
xor edx, edx |
push ebp |
push 0040A27Dh |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
call 00007F7A4C824ABBh |
mov dword ptr [0040CDF4h], eax |
mov eax, dword ptr [0040CDF4h] |
cmp dword ptr [eax+0Ch], 01h |
jne 00007F7A4C824BFAh |
mov eax, dword ptr [0040CDF4h] |
mov edx, 00000028h |
call 00007F7A4C8227C8h |
mov edx, dword ptr [000000F4h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xd000 | 0x950 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x11000 | 0x66e00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x3270bc | 0x2f10 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0x0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xf000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x9364 | 0x9400 | 872cf326ad19dd48caa30dae9776ac00 | False | 0.6585726351351351 | data | 6.740438152404276 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0xb000 | 0x24c | 0x400 | e8f82382eefca31b62f6a8c8a52ff421 | False | 0.3154296875 | data | 2.753482278202086 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0xc000 | 0xe4c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xd000 | 0x950 | 0xa00 | bb5485bf968b970e5ea81292af2acdba | False | 0.414453125 | data | 4.430733069799036 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xe000 | 0x8 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0xf000 | 0x18 | 0x200 | 9ba824905bf9c7922b6fc87a38b74366 | False | 0.052734375 | data | 0.2044881574398449 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0x8b4 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0x11000 | 0x66e00 | 0x66e00 | 376eee8d3246c33a580505df008975a6 | False | 0.5722039223876063 | data | 6.927095623177584 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x112cc | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 30236 x 30236 px/m | English | United States | 0.09360582041878623 |
RT_STRING | 0x21af4 | 0x2f2 | data | 0.35543766578249336 | ||
RT_STRING | 0x21de8 | 0x30c | data | 0.3871794871794872 | ||
RT_STRING | 0x220f4 | 0x2ce | data | 0.42618384401114207 | ||
RT_STRING | 0x223c4 | 0x68 | data | 0.75 | ||
RT_STRING | 0x2242c | 0xb4 | data | 0.6277777777777778 | ||
RT_STRING | 0x224e0 | 0xae | data | 0.5344827586206896 | ||
RT_RCDATA | 0x22590 | 0x2c | data | 1.1818181818181819 | ||
RT_GROUP_ICON | 0x225bc | 0x14 | data | English | United States | 1.15 |
RT_VERSION | 0x225d0 | 0x4b8 | COM executable for DOS | English | United States | 0.3344370860927152 |
RT_MANIFEST | 0x22a88 | 0x560 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.4251453488372093 |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle |
user32.dll | MessageBoxA |
oleaut32.dll | VariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA |
kernel32.dll | WriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle |
user32.dll | TranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA |
comctl32.dll | InitCommonControls |
advapi32.dll | AdjustTokenPrivileges |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T21:29:10.736491+0100 | 2058540 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cheapptaxysu .click) | 1 | 192.168.2.4 | 61947 | 1.1.1.1 | 53 | UDP |
2024-12-30T21:29:11.331807+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:11.331807+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:11.495156+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:11.495156+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:11.989226+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:11.989226+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:12.457406+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:12.457406+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:13.233334+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49737 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:13.233334+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:25.673943+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49742 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:25.673943+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:26.168677+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49742 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:27.091080+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:27.091080+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:29.754507+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:29.754507+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:31.157538+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49745 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:31.157538+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:33.471503+0100 | 2058541 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cheapptaxysu .click in TLS SNI) | 1 | 192.168.2.4 | 49746 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:33.471503+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49746 | 172.67.177.88 | 443 | TCP |
2024-12-30T21:29:33.992765+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49746 | 172.67.177.88 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 21:29:10.767904997 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:10.767932892 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:10.767997980 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:10.770870924 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:10.770894051 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.331634045 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.331806898 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.334856033 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.334876060 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.335216045 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.377749920 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.384895086 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.384895086 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.385387897 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.495181084 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.495229959 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.495338917 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.495352030 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.502118111 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.502176046 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.502182007 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.502211094 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.502383947 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.502882957 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.502892971 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.503197908 CET | 49733 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.503202915 CET | 443 | 49733 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.531568050 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.531605959 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.531672001 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.532022953 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.532037973 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.989156961 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.989226103 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.993660927 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.993671894 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.993902922 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:11.995476007 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.995513916 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:11.996516943 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.457401991 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.457442999 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.457469940 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.457499027 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.457530975 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.457598925 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.457619905 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.457663059 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.457899094 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.458122015 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.458167076 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.458173037 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.462152004 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.462182999 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.462201118 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.462208986 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.462253094 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.544085979 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.544151068 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.544187069 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.544229031 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.544244051 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.544271946 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.544306040 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.544337034 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.544471979 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.544483900 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.544493914 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.544498920 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.764971018 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.765011072 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:12.765125036 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.765631914 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:12.765645981 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:13.233266115 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:13.233334064 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:13.234493971 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:13.234500885 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:13.234718084 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:13.235696077 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:13.235819101 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:13.235847950 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:13.236821890 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:13.236829996 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.054500103 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.054586887 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.054661989 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.054922104 CET | 49737 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.054938078 CET | 443 | 49737 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.201844931 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.201883078 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.201994896 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.202375889 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.202389956 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.673870087 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.673943043 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.676167965 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.676179886 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.676417112 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:25.689651012 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.689814091 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:25.689842939 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:26.168667078 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:26.168771982 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:26.168963909 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:26.169107914 CET | 49742 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:26.169130087 CET | 443 | 49742 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:26.616434097 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:26.616471052 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:26.616604090 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:26.616934061 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:26.616950035 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:27.091010094 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:27.091079950 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:27.098546028 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:27.098555088 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:27.098799944 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:27.100564003 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:27.100821972 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:27.100852013 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:27.100924015 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:27.100933075 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:28.947272062 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:28.947412968 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:28.947571993 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:28.947642088 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:28.947658062 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:29.294193029 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:29.294228077 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:29.294317007 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:29.294696093 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:29.294711113 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:29.754425049 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:29.754507065 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:29.774203062 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:29.774218082 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:29.774545908 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:29.786139965 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:29.786315918 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:29.786320925 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:30.233836889 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:30.233942986 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:30.234008074 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:30.234127998 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:30.234143019 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:30.680083036 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:30.680136919 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:30.680358887 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:30.680744886 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:30.680758953 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.157263994 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.157537937 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.158742905 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.158756018 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.158958912 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.160173893 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.160953045 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.160985947 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.161210060 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.161243916 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.161379099 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.161427975 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.161580086 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.161611080 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.161772013 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.161811113 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.162097931 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.162112951 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.162126064 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.162138939 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.162262917 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.162285089 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.162307024 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.162437916 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.162470102 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.171351910 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.171593904 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.171622992 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:31.171649933 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.171685934 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.171770096 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:31.176222086 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:32.993088007 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:32.993197918 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:32.993360043 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:32.993400097 CET | 49745 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:32.993417025 CET | 443 | 49745 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.002473116 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.002512932 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.002593994 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.002938032 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.002949953 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.471332073 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.471503019 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.474924088 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.474930048 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.475131035 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.476110935 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.476131916 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.476175070 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.992764950 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.992856979 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.992908955 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.993036985 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.993053913 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Dec 30, 2024 21:29:33.993062973 CET | 49746 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 30, 2024 21:29:33.993069887 CET | 443 | 49746 | 172.67.177.88 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 21:29:10.736490965 CET | 61947 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 30, 2024 21:29:10.762279034 CET | 53 | 61947 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 30, 2024 21:29:10.736490965 CET | 192.168.2.4 | 1.1.1.1 | 0x75a1 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 30, 2024 21:29:10.762279034 CET | 1.1.1.1 | 192.168.2.4 | 0x75a1 | No error (0) | 172.67.177.88 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 21:29:10.762279034 CET | 1.1.1.1 | 192.168.2.4 | 0x75a1 | No error (0) | 104.21.67.146 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49733 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:11 UTC | 265 | OUT | |
2024-12-30 20:29:11 UTC | 8 | OUT | |
2024-12-30 20:29:11 UTC | 560 | IN | |
2024-12-30 20:29:11 UTC | 809 | IN | |
2024-12-30 20:29:11 UTC | 1369 | IN | |
2024-12-30 20:29:11 UTC | 1369 | IN | |
2024-12-30 20:29:11 UTC | 1009 | IN | |
2024-12-30 20:29:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:11 UTC | 355 | OUT | |
2024-12-30 20:29:11 UTC | 42 | OUT | |
2024-12-30 20:29:12 UTC | 1132 | IN | |
2024-12-30 20:29:12 UTC | 237 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN | |
2024-12-30 20:29:12 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49737 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:13 UTC | 373 | OUT | |
2024-12-30 20:29:13 UTC | 15331 | OUT | |
2024-12-30 20:29:13 UTC | 2827 | OUT | |
2024-12-30 20:29:25 UTC | 1129 | IN | |
2024-12-30 20:29:25 UTC | 20 | IN | |
2024-12-30 20:29:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49742 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:25 UTC | 364 | OUT | |
2024-12-30 20:29:25 UTC | 8731 | OUT | |
2024-12-30 20:29:26 UTC | 1133 | IN | |
2024-12-30 20:29:26 UTC | 20 | IN | |
2024-12-30 20:29:26 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:27 UTC | 374 | OUT | |
2024-12-30 20:29:27 UTC | 15331 | OUT | |
2024-12-30 20:29:27 UTC | 5107 | OUT | |
2024-12-30 20:29:28 UTC | 1132 | IN | |
2024-12-30 20:29:28 UTC | 20 | IN | |
2024-12-30 20:29:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:29 UTC | 369 | OUT | |
2024-12-30 20:29:29 UTC | 1232 | OUT | |
2024-12-30 20:29:30 UTC | 1128 | IN | |
2024-12-30 20:29:30 UTC | 20 | IN | |
2024-12-30 20:29:30 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49745 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:31 UTC | 365 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:31 UTC | 15331 | OUT | |
2024-12-30 20:29:32 UTC | 1137 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49746 | 172.67.177.88 | 443 | 7412 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 20:29:33 UTC | 355 | OUT | |
2024-12-30 20:29:33 UTC | 77 | OUT | |
2024-12-30 20:29:33 UTC | 1130 | IN | |
2024-12-30 20:29:33 UTC | 54 | IN | |
2024-12-30 20:29:33 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 15:28:54 |
Start date: | 30/12/2024 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'317'708 bytes |
MD5 hash: | 79D5CC6637E2C1502789C2D7D610916C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Function 03121DB6 Relevance: 2.0, Strings: 1, Instructions: 765COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03121F69 Relevance: 1.7, Strings: 1, Instructions: 495COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|