Windows
Analysis Report
Delta.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Delta.exe (PID: 7332 cmdline:
"C:\Users\ user\Deskt op\Delta.e xe" MD5: 24A858EBB9FC24D58BB3615386CE0F43) - conhost.exe (PID: 7340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Delta.exe (PID: 7396 cmdline:
"C:\Users\ user\Deskt op\Delta.e xe" MD5: 24A858EBB9FC24D58BB3615386CE0F43)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["fancywaxxers.shop", "abruptyopsn.shop", "wholersorie.shop", "cloudewahsj.shop", "tirepublicerj.shop", "noisycuttej.shop", "framekgirus.shop", "rabidcowse.shop", "nearycrepso.shop"], "Build id": "yau6Na--914510980"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:14.939261+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:15.933780+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:17.121915+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:18.350782+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:19.635018+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:21.084859+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:22.466515+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:24.584267+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:15.444803+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:16.398944+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:25.028327+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:15.444803+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:16.398944+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:14.939261+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:15.933780+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:17.121915+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49732 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:18.350782+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:19.635018+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49734 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:21.084859+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49735 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:22.466515+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49736 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:24.584267+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:14.445250+0100 | 2058656 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 59757 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:17.787374+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.21.96.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_005FB6E8 | |
Source: | Code function: | 0_2_005FB799 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_005FEA8E | |
Source: | Code function: | 0_2_005F3440 | |
Source: | Code function: | 0_2_00600502 | |
Source: | Code function: | 0_2_005EDDE2 | |
Source: | Code function: | 0_2_005E96DB |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Command line argument: | 0_2_005F5440 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_005E9DBD | |
Source: | Code function: | 2_3_02C31B7E | |
Source: | Code function: | 2_3_02C31B7E | |
Source: | Code function: | 2_3_02C31B7E | |
Source: | Code function: | 2_3_02C31B7E | |
Source: | Code function: | 2_3_02C31B7E | |
Source: | Code function: | 2_3_02C31A5A | |
Source: | Code function: | 2_3_02C31A5A | |
Source: | Code function: | 2_3_02C31A5A | |
Source: | Code function: | 2_3_02C31A5A | |
Source: | Code function: | 2_3_02C31A5A | |
Source: | Code function: | 2_3_02C3536A | |
Source: | Code function: | 2_3_02C3536A | |
Source: | Code function: | 2_3_02C3536A | |
Source: | Code function: | 2_3_02C3536A | |
Source: | Code function: | 2_3_02C3536A | |
Source: | Code function: | 2_3_02C350C6 | |
Source: | Code function: | 2_3_02C350C6 | |
Source: | Code function: | 2_3_02C350C6 | |
Source: | Code function: | 2_3_02C350C6 | |
Source: | Code function: | 2_3_02C350C6 | |
Source: | Code function: | 2_3_02C390FA | |
Source: | Code function: | 2_3_02C390FA | |
Source: | Code function: | 2_3_02C390FA | |
Source: | Code function: | 2_3_02C390FA | |
Source: | Code function: | 2_3_02C390FA | |
Source: | Code function: | 2_3_02C350CA | |
Source: | Code function: | 2_3_02C350CA | |
Source: | Code function: | 2_3_02C350CA | |
Source: | Code function: | 2_3_02C350CA | |
Source: | Code function: | 2_3_02C350CA |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Code function: | 2_3_02C3FA4A |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_005FB6E8 | |
Source: | Code function: | 0_2_005FB799 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_005E9A73 |
Source: | Code function: | 0_2_0061019E | |
Source: | Code function: | 0_2_005E1BA0 |
Source: | Code function: | 0_2_005F7020 |
Source: | Code function: | 0_2_005E9A73 | |
Source: | Code function: | 0_2_005E9A67 | |
Source: | Code function: | 0_2_005F1A60 | |
Source: | Code function: | 0_2_005E96B3 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_0061019E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_005FB0C5 | |
Source: | Code function: | 0_2_005F68FD | |
Source: | Code function: | 0_2_005FB110 | |
Source: | Code function: | 0_2_005FB1B7 | |
Source: | Code function: | 0_2_005FAA37 | |
Source: | Code function: | 0_2_005FB2BD | |
Source: | Code function: | 0_2_005F63F5 | |
Source: | Code function: | 0_2_005FAC88 | |
Source: | Code function: | 0_2_005FAD30 | |
Source: | Code function: | 0_2_005FAFF0 | |
Source: | Code function: | 0_2_005FAF83 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_005EA335 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 22 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 241 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | 22 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 11 File and Directory Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 33 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.96.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.96.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582864 |
Start date and time: | 2024-12-31 17:20:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Delta.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Delta.exe, PID 7396 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Delta.exe
Time | Type | Description |
---|---|---|
11:21:14 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.96.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Babadeda, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 7.820899716469667 |
TrID: |
|
File name: | Delta.exe |
File size: | 813'568 bytes |
MD5: | 24a858ebb9fc24d58bb3615386ce0f43 |
SHA1: | eaf287a3846ac77a908d4ec4468a49fedc207963 |
SHA256: | ddd1e3c7b4d8a8670e7c6d9a3bbd7e30d1c5658ed38e41a20efdee201b5239f7 |
SHA512: | 492eb513fa4c6f65ec8bac9b5e08a2aa616beace8e6552469370f352b7491f4ea08b5f6c3e4dd6fdd5dda16c9b74c3d2364b71335e1780074b23f1df7a8f26e9 |
SSDEEP: | 12288:r3K1Pp+lMeB8BQIzbjh22SbjqPVRc5ga0VQIzbjh22SbjqPVRc5ga0J:TK1PSMZWIzbtpSfqmgaIzbtpSfqmgZ |
TLSH: | FC050251B981C072CD63253364F5DFBA462EF9200B125ADF57C80BB9DF252D28E31B6A |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....sg.................H........................@.......................................@.....................................(.. |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40a2e0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6773E4A4 [Tue Dec 31 12:33:40 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 019ac8c6e24f80fb88de699b6749f599 |
Instruction |
---|
call 00007F11C8D975AAh |
jmp 00007F11C8D9740Dh |
mov ecx, dword ptr [004307C0h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007F11C8D975A6h |
test esi, ecx |
jne 00007F11C8D975C8h |
call 00007F11C8D975D1h |
mov ecx, eax |
cmp ecx, edi |
jne 00007F11C8D975A9h |
mov ecx, BB40E64Fh |
jmp 00007F11C8D975B0h |
test esi, ecx |
jne 00007F11C8D975ACh |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [004307C0h], ecx |
not ecx |
pop edi |
mov dword ptr [00430800h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [0042E8D8h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [0042E894h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [0042E890h] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [0042E920h] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00431AB8h |
call dword ptr [0042E8F8h] |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov al, 01h |
ret |
push 00030000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2e6c4 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x34000 | 0xe8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x35000 | 0x1b90 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2a9a8 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x26e40 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2e834 | 0x148 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x247da | 0x24800 | ba0610d1e4ecb6f5f64959d9eb5b455a | False | 0.5549951840753424 | data | 6.559506263512015 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x26000 | 0x9eb4 | 0xa000 | 53eba87ddc7d2455b0ac2836680b1660 | False | 0.428271484375 | DOS executable (COM) | 4.9181666163124085 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x30000 | 0x2280 | 0x1600 | 112d0c9e43893ae5b7f96d23807996ac | False | 0.39506392045454547 | data | 4.581141173428789 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x33000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x34000 | 0xe8 | 0x200 | 03d6bf5d1e31277fc8fb90374111d794 | False | 0.306640625 | data | 2.344915704357875 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x35000 | 0x1b90 | 0x1c00 | 3080b38ba0e27b64b3ab5ca0f93c1c7c | False | 0.7785993303571429 | data | 6.532705218372571 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x37000 | 0x4a200 | 0x4a200 | 025acdb830e33bac6903c9b1a0c9e6a9 | False | 1.0003326570404723 | data | 7.99943461927735 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.BSS | 0x82000 | 0x4a200 | 0x4a200 | 025acdb830e33bac6903c9b1a0c9e6a9 | False | 1.0003326570404723 | data | 7.99943461927735 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x34060 | 0x87 | XML 1.0 document, ASCII text | English | United States | 0.8222222222222222 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:21:14.445250+0100 | 2058656 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) | 1 | 192.168.2.4 | 59757 | 1.1.1.1 | 53 | UDP |
2024-12-31T17:21:14.939261+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:14.939261+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:15.444803+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:15.444803+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:15.933780+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:15.933780+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:16.398944+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:16.398944+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:17.121915+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49732 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:17.121915+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:17.787374+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49732 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:18.350782+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:18.350782+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:19.635018+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49734 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:19.635018+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:21.084859+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49735 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:21.084859+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:22.466515+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49736 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:22.466515+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:24.584267+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:24.584267+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:21:25.028327+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:21:14.464581013 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:14.464634895 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:14.464699984 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:14.468256950 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:14.468275070 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:14.939062119 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:14.939260960 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:14.956257105 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:14.956269979 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:14.956558943 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.000106096 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.005577087 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.005608082 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.005666971 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.444792032 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.444885969 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.444987059 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.446499109 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.446511984 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.446553946 CET | 49730 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.446557999 CET | 443 | 49730 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.456770897 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.456819057 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.456897020 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.457180023 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.457190037 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.933697939 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.933779955 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.949858904 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.949872971 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.950099945 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:15.951812983 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.951849937 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:15.951877117 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.398931026 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.398994923 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.399024010 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.399063110 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.399099112 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.399136066 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.399153948 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.399153948 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.399173975 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.399184942 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.399504900 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.399550915 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.399557114 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.403695107 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.403733969 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.403748035 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.403753996 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.403871059 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.489353895 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.489531994 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.489562988 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.489658117 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.489660025 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.489717960 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.489861012 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.489872932 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.489882946 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.489891052 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.654648066 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.654679060 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:16.654762030 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.655112028 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:16.655122042 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.121776104 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.121915102 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.123245955 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.123253107 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.123511076 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.124816895 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.124969959 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.124998093 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.125057936 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.125063896 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.787323952 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.787401915 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.787447929 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.787636995 CET | 49732 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.787647963 CET | 443 | 49732 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.877238035 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.877300024 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:17.877378941 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.877696037 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:17.877713919 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:18.350404978 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:18.350781918 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:18.442691088 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:18.442724943 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:18.443033934 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:18.447894096 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:18.448641062 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:18.448676109 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:18.929927111 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:18.930002928 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:18.930063009 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:18.930283070 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:18.930305958 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:19.159235954 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.159269094 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:19.159357071 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.159708977 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.159715891 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:19.634903908 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:19.635018110 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.636378050 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.636384010 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:19.636584044 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:19.637835979 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.637949944 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.637968063 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:19.638030052 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:19.638035059 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:20.298890114 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:20.298965931 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:20.299091101 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:20.299295902 CET | 49734 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:20.299308062 CET | 443 | 49734 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:20.617959023 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:20.618030071 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:20.618904114 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:20.619651079 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:20.619668007 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.084779024 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.084858894 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.086087942 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.086100101 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.086304903 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.087622881 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.087707043 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.087712049 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.541987896 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.542083979 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.542140007 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.542352915 CET | 49735 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.542366982 CET | 443 | 49735 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.983285904 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.983342886 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:21.983462095 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.983805895 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:21.983825922 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.466312885 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.466515064 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.468065023 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.468074083 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.468327045 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.482531071 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.483257055 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.483289003 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.483381987 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.483422995 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.483534098 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.483572960 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.483711004 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.483732939 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.483890057 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.483907938 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.484077930 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.484097958 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.484107018 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.484268904 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.484291077 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.493307114 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.493486881 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.493510962 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.493535995 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.493547916 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.493670940 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.493696928 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.498631954 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:22.498756886 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:22.498778105 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.069005013 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.069092035 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.069156885 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.069369078 CET | 49736 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.069386959 CET | 443 | 49736 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.116734028 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.116780043 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.116867065 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.117181063 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.117193937 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.584203959 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.584266901 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.585871935 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.585880995 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.586208105 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:24.587620020 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.587639093 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:24.587743044 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.028255939 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.028299093 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.028321981 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.028346062 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.028373003 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.028394938 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.028515100 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.028515100 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.028538942 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.029159069 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.029206991 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.029213905 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.032974958 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.033003092 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.033027887 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.033034086 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.033082962 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.033087015 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.033096075 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.033138037 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.033281088 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.033293962 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Dec 31, 2024 17:21:25.033318043 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Dec 31, 2024 17:21:25.033324003 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:21:14.445250034 CET | 59757 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 31, 2024 17:21:14.457431078 CET | 53 | 59757 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:21:14.445250034 CET | 192.168.2.4 | 1.1.1.1 | 0x942e | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:21:14.457431078 CET | 1.1.1.1 | 192.168.2.4 | 0x942e | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:21:14.457431078 CET | 1.1.1.1 | 192.168.2.4 | 0x942e | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:21:14.457431078 CET | 1.1.1.1 | 192.168.2.4 | 0x942e | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:21:14.457431078 CET | 1.1.1.1 | 192.168.2.4 | 0x942e | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:21:14.457431078 CET | 1.1.1.1 | 192.168.2.4 | 0x942e | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:21:14.457431078 CET | 1.1.1.1 | 192.168.2.4 | 0x942e | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:21:14.457431078 CET | 1.1.1.1 | 192.168.2.4 | 0x942e | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:15 UTC | 264 | OUT | |
2024-12-31 16:21:15 UTC | 8 | OUT | |
2024-12-31 16:21:15 UTC | 1133 | IN | |
2024-12-31 16:21:15 UTC | 7 | IN | |
2024-12-31 16:21:15 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:15 UTC | 265 | OUT | |
2024-12-31 16:21:15 UTC | 51 | OUT | |
2024-12-31 16:21:16 UTC | 1135 | IN | |
2024-12-31 16:21:16 UTC | 234 | IN | |
2024-12-31 16:21:16 UTC | 1369 | IN | |
2024-12-31 16:21:16 UTC | 1369 | IN | |
2024-12-31 16:21:16 UTC | 1369 | IN | |
2024-12-31 16:21:16 UTC | 1369 | IN | |
2024-12-31 16:21:16 UTC | 1369 | IN | |
2024-12-31 16:21:16 UTC | 268 | IN | |
2024-12-31 16:21:16 UTC | 1369 | IN | |
2024-12-31 16:21:16 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:17 UTC | 279 | OUT | |
2024-12-31 16:21:17 UTC | 15331 | OUT | |
2024-12-31 16:21:17 UTC | 2812 | OUT | |
2024-12-31 16:21:17 UTC | 1139 | IN | |
2024-12-31 16:21:17 UTC | 20 | IN | |
2024-12-31 16:21:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:18 UTC | 282 | OUT | |
2024-12-31 16:21:18 UTC | 8788 | OUT | |
2024-12-31 16:21:18 UTC | 1132 | IN | |
2024-12-31 16:21:18 UTC | 20 | IN | |
2024-12-31 16:21:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49734 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:19 UTC | 282 | OUT | |
2024-12-31 16:21:19 UTC | 15331 | OUT | |
2024-12-31 16:21:19 UTC | 5104 | OUT | |
2024-12-31 16:21:20 UTC | 1133 | IN | |
2024-12-31 16:21:20 UTC | 20 | IN | |
2024-12-31 16:21:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49735 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:21 UTC | 273 | OUT | |
2024-12-31 16:21:21 UTC | 1210 | OUT | |
2024-12-31 16:21:21 UTC | 1132 | IN | |
2024-12-31 16:21:21 UTC | 20 | IN | |
2024-12-31 16:21:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49736 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:22 UTC | 283 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:22 UTC | 15331 | OUT | |
2024-12-31 16:21:24 UTC | 1145 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | 7396 | C:\Users\user\Desktop\Delta.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:21:24 UTC | 265 | OUT | |
2024-12-31 16:21:24 UTC | 86 | OUT | |
2024-12-31 16:21:25 UTC | 1137 | IN | |
2024-12-31 16:21:25 UTC | 232 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN | |
2024-12-31 16:21:25 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:21:12 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Delta.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5e0000 |
File size: | 813'568 bytes |
MD5 hash: | 24A858EBB9FC24D58BB3615386CE0F43 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 11:21:12 |
Start date: | 31/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 11:21:13 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Delta.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5e0000 |
File size: | 813'568 bytes |
MD5 hash: | 24A858EBB9FC24D58BB3615386CE0F43 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 8.1% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 1.1% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 32 |
Graph
Function 0061019E Relevance: 42.3, APIs: 10, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E1C10 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 108libraryfileloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F6642 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E20C0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 33libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F6E2A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E1DB0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 78librarymemoryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F72A8 Relevance: 3.2, APIs: 2, Instructions: 177COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F7192 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E2010 Relevance: 3.0, APIs: 2, Instructions: 34COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F56B7 Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E14C0 Relevance: 1.8, APIs: 1, Instructions: 308COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F7837 Relevance: 1.6, APIs: 1, Instructions: 142COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E8570 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F56F1 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FB1B7 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F3440 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FB799 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E9A73 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005EA335 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FAD30 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E96DB Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FB6E8 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FAFF0 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005EDDE2 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FB110 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FB2BD Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E9A67 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F7020 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005E1BA0 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F85B6 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F4D4C Relevance: 10.8, APIs: 2, Strings: 4, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00602E9C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005EF1F8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FF6B0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FB576 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005ECA12 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FC96E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005FA126 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F5170 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005F49DC Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C3FA4A Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|