Windows
Analysis Report
nayfObR.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- nayfObR.exe (PID: 6196 cmdline:
"C:\Users\ user\Deskt op\nayfObR .exe" MD5: 138FCF999A87419BE2C7E5E036601466) - conhost.exe (PID: 5536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - nayfObR.exe (PID: 6540 cmdline:
"C:\Users\ user\Deskt op\nayfObR .exe" MD5: 138FCF999A87419BE2C7E5E036601466)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["fancywaxxers.shop", "cloudewahsj.shop", "framekgirus.shop", "wholersorie.shop", "noisycuttej.shop", "tirepublicerj.shop", "abruptyopsn.shop", "rabidcowse.shop", "nearycrepso.shop"], "Build id": "7tx2jo--516"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:33:57.665182+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:58.596355+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:59.785500+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49706 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:01.112954+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:02.251726+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49708 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:04.770372+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:13.270327+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49710 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:15.612275+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:33:58.123850+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:59.081538+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:16.050117+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:33:58.123850+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:33:59.081538+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:33:57.665182+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:58.596355+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:59.785500+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49706 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:01.112954+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:02.251726+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49708 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:04.770372+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:13.270327+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49710 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:15.612275+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:33:57.173114+0100 | 2058656 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 61487 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:34:12.365477+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Directory queried: |
Source: | Code function: | 0_2_005BB099 | |
Source: | Code function: | 0_2_005BAFE8 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_005B3010 | |
Source: | Code function: | 0_2_005C00A2 | |
Source: | Code function: | 0_2_005AD9B2 | |
Source: | Code function: | 0_2_005A92AB | |
Source: | Code function: | 0_2_005BE38E | |
Source: | Code function: | 3_3_031087B8 | |
Source: | Code function: | 3_3_031087B8 | |
Source: | Code function: | 3_3_031087B8 | |
Source: | Code function: | 3_3_031087B8 |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Command line argument: | 0_2_005B4D40 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_005A998D | |
Source: | Code function: | 3_3_0311D001 | |
Source: | Code function: | 3_3_03139E21 | |
Source: | Code function: | 3_3_03139E21 | |
Source: | Code function: | 3_3_03137385 | |
Source: | Code function: | 3_3_03137385 | |
Source: | Code function: | 3_3_0310708F | |
Source: | Code function: | 3_3_0310708F | |
Source: | Code function: | 3_3_031053F2 | |
Source: | Code function: | 3_3_031053F2 | |
Source: | Code function: | 3_3_030ACF6D | |
Source: | Code function: | 3_3_03139E21 | |
Source: | Code function: | 3_3_03139E21 | |
Source: | Code function: | 3_3_03137385 | |
Source: | Code function: | 3_3_03137385 | |
Source: | Code function: | 3_3_0310708F | |
Source: | Code function: | 3_3_0310708F | |
Source: | Code function: | 3_3_031053F2 | |
Source: | Code function: | 3_3_031053F2 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_005BB099 | |
Source: | Code function: | 0_2_005BAFE8 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_005A9643 |
Source: | Code function: | 0_2_005D019E | |
Source: | Code function: | 0_2_005A1C80 |
Source: | Code function: | 0_2_005B6920 |
Source: | Code function: | 0_2_005A9283 | |
Source: | Code function: | 0_2_005A9643 | |
Source: | Code function: | 0_2_005B1630 | |
Source: | Code function: | 0_2_005A9637 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_005D019E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_005BA8F0 | |
Source: | Code function: | 0_2_005BA883 | |
Source: | Code function: | 0_2_005BA9C5 | |
Source: | Code function: | 0_2_005B61FD | |
Source: | Code function: | 0_2_005BAA10 | |
Source: | Code function: | 0_2_005BAAB7 | |
Source: | Code function: | 0_2_005BA337 | |
Source: | Code function: | 0_2_005BABBD | |
Source: | Code function: | 0_2_005B5CF5 | |
Source: | Code function: | 0_2_005BA588 | |
Source: | Code function: | 0_2_005BA630 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_005A9F05 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | Directory queried: |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 241 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | 21 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 21 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 33 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
44% | Virustotal | Browse | ||
39% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.32.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.32.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1583755 |
Start date and time: | 2025-01-03 14:33:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | nayfObR.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.253.45, 4.175.87.197
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target nayfObR.exe, PID 6540 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryDirectoryFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
08:33:56 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.32.1 | Get hash | malicious | CMSBrute | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 7.662111974378329 |
TrID: |
|
File name: | nayfObR.exe |
File size: | 535'040 bytes |
MD5: | 138fcf999a87419be2c7e5e036601466 |
SHA1: | 7569a1444cd948145c966dbe0b47ffdb587f8681 |
SHA256: | 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b |
SHA512: | afd574b7cf69012e1fd319c6e3825ff512c042c9917f5d7087ea88632516c9ab6bb30d48d465e18ba1be6e412a9ac728d609006af05df8577d7de2c938501c6d |
SSDEEP: | 12288:DztE0u86qlmk/345zA7Fv6vsVOzm9t/Gzr9AskP6f:DO0uYlmsozAAvsYkGzrOw |
TLSH: | F0B4E05175C0C072D8A3253259F5CB759A2EF9200F626DCFA7880FBA8F216D15B31B6E |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...c.vg.................F........................@.......................................@.............................Z...J...(.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x409eb0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67769663 [Thu Jan 2 13:36:35 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 3ccbd572e5c574aa059c8de8b80553b8 |
Instruction |
---|
call 00007FF415352A0Ah |
jmp 00007FF41535286Dh |
mov ecx, dword ptr [004307C0h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007FF415352A06h |
test esi, ecx |
jne 00007FF415352A28h |
call 00007FF415352A31h |
mov ecx, eax |
cmp ecx, edi |
jne 00007FF415352A09h |
mov ecx, BB40E64Fh |
jmp 00007FF415352A10h |
test esi, ecx |
jne 00007FF415352A0Ch |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [004307C0h], ecx |
not ecx |
pop edi |
mov dword ptr [00430800h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [0042E974h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [0042E92Ch] |
xor dword ptr [ebp-04h], eax |
call dword ptr [0042E928h] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [0042E9BCh] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00431B68h |
call dword ptr [0042E994h] |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov al, 01h |
ret |
push 00030000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x2e6f0 | 0x5a | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2e74a | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x34000 | 0xe8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x35000 | 0x1bcc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2a9a8 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x26e40 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2e8c8 | 0x154 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x244ba | 0x24600 | c38052d5842cd8b07c8f812eb6910b36 | False | 0.5554459299828178 | data | 6.570338615727902 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x26000 | 0x9f74 | 0xa000 | 3370e0b3d540bf8efa1a09679e10d998 | False | 0.4305419921875 | DOS executable (COM) | 4.93781731386841 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x30000 | 0x2330 | 0x1600 | e21ea4dbd16bf9c0820f2949a9c56684 | False | 0.3952414772727273 | data | 4.576677467448693 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x33000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x34000 | 0xe8 | 0x200 | 03d6bf5d1e31277fc8fb90374111d794 | False | 0.306640625 | data | 2.344915704357875 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x35000 | 0x1bcc | 0x1c00 | 43927976336ae0c9a639d5f9efc7a7d3 | False | 0.7833426339285714 | data | 6.549002942674606 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x37000 | 0x50800 | 0x50800 | 46029f298e6ff67983eb46d6d69e0777 | False | 1.0003366411102483 | data | 7.999374639049402 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x34060 | 0x87 | XML 1.0 document, ASCII text | English | United States | 0.8222222222222222 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObject, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Name | Ordinal | Address |
---|---|---|
_SerializeData@16 | 1 | 0x401e90 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T14:33:57.173114+0100 | 2058656 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) | 1 | 192.168.2.5 | 61487 | 1.1.1.1 | 53 | UDP |
2025-01-03T14:33:57.665182+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:57.665182+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:58.123850+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:58.123850+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:58.596355+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:58.596355+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:59.081538+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:59.081538+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:59.785500+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49706 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:33:59.785500+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49706 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:01.112954+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:01.112954+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:02.251726+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49708 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:02.251726+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49708 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:04.770372+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:04.770372+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:12.365477+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:13.270327+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49710 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:13.270327+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49710 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:15.612275+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:15.612275+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
2025-01-03T14:34:16.050117+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 3, 2025 14:33:57.191173077 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:57.191231012 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:57.191302061 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:57.192483902 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:57.192498922 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:57.665050983 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:57.665182114 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:57.677970886 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:57.677989006 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:57.678308964 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:57.720886946 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:57.720902920 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:57.720968962 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.123867989 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.123958111 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.124007940 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.125361919 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.125380039 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.125407934 CET | 49704 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.125413895 CET | 443 | 49704 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.135754108 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.135797977 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.135863066 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.136162996 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.136178970 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.596210957 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.596354961 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.597665071 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.597678900 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.598021984 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:58.599302053 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.599332094 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:58.599407911 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.081526041 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.081584930 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.081636906 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.081666946 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.081702948 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.081749916 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.081758022 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.081964016 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.081998110 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.082014084 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.082021952 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.082062006 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.082067966 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.086436987 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.086491108 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.086498976 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.131562948 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.131596088 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.168361902 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.168414116 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.168427944 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.168437958 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.168487072 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.168493032 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.168540955 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.168582916 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.168719053 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.168735027 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.168745995 CET | 49705 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.168751001 CET | 443 | 49705 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.312927961 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.312999010 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.313067913 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.313441038 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.313455105 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.785409927 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.785500050 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.786705971 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.786716938 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.787039042 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:33:59.788378000 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.788556099 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:33:59.788589954 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:00.515064001 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:00.515173912 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:00.515238047 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:00.515403032 CET | 49706 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:00.515419960 CET | 443 | 49706 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:00.648340940 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:00.648379087 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:00.648452997 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:00.648758888 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:00.648777008 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.112876892 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.112953901 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.114280939 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.114294052 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.114535093 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.115803957 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.116028070 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.116079092 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.116141081 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.163336039 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.614913940 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.615025043 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.615086079 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.615223885 CET | 49707 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.615243912 CET | 443 | 49707 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.797843933 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.797897100 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:01.797988892 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.798316956 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:01.798337936 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:02.251594067 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:02.251725912 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:02.253402948 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:02.253420115 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:02.253654957 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:02.255286932 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:02.255444050 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:02.255481958 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:02.255549908 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:02.255562067 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:03.881117105 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:03.881233931 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:03.881294012 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:03.881469965 CET | 49708 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:03.881489038 CET | 443 | 49708 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:04.317738056 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:04.317805052 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:04.317877054 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:04.318181038 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:04.318195105 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:04.770279884 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:04.770371914 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:04.771594048 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:04.771605015 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:04.771838903 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:04.773121119 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:04.773248911 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:04.773257017 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:12.365458965 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:12.365571976 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:12.365746975 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:12.365869045 CET | 49709 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:12.365885019 CET | 443 | 49709 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:12.808293104 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:12.808365107 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:12.808453083 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:12.808756113 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:12.808794022 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.270239115 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.270327091 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.281821966 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.281862974 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.282104969 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.283196926 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.283981085 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.284029961 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.284162998 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.284218073 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.284348965 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.284403086 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.284574032 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.284631968 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.285200119 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.285263062 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.285480022 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.285525084 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.285545111 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.285576105 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.285734892 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.285777092 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.285820007 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.285903931 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.285963058 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.294202089 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.294456005 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.294512033 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.294557095 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.294599056 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:13.294702053 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:13.297753096 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.069550991 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.069643974 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.069719076 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.069938898 CET | 49710 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.069956064 CET | 443 | 49710 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.141700983 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.141746998 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.141850948 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.142456055 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.142469883 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.612202883 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.612274885 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.613571882 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.613583088 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.613817930 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:15.620524883 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.620541096 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:15.620592117 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:16.050142050 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:16.050266981 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:16.050316095 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:16.050719023 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:16.050741911 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:16.050753117 CET | 49716 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 3, 2025 14:34:16.050759077 CET | 443 | 49716 | 104.21.32.1 | 192.168.2.5 |
Jan 3, 2025 14:34:17.404647112 CET | 64588 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 3, 2025 14:34:17.409420013 CET | 53 | 64588 | 1.1.1.1 | 192.168.2.5 |
Jan 3, 2025 14:34:17.409478903 CET | 64588 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 3, 2025 14:34:17.414288044 CET | 53 | 64588 | 1.1.1.1 | 192.168.2.5 |
Jan 3, 2025 14:34:17.872384071 CET | 64588 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 3, 2025 14:34:17.877454042 CET | 53 | 64588 | 1.1.1.1 | 192.168.2.5 |
Jan 3, 2025 14:34:17.877657890 CET | 64588 | 53 | 192.168.2.5 | 1.1.1.1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 3, 2025 14:33:57.173114061 CET | 61487 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 3, 2025 14:33:57.185899973 CET | 53 | 61487 | 1.1.1.1 | 192.168.2.5 |
Jan 3, 2025 14:34:17.404308081 CET | 53 | 64926 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 3, 2025 14:33:57.173114061 CET | 192.168.2.5 | 1.1.1.1 | 0x1254 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 3, 2025 14:33:57.185899973 CET | 1.1.1.1 | 192.168.2.5 | 0x1254 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 14:33:57.185899973 CET | 1.1.1.1 | 192.168.2.5 | 0x1254 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 14:33:57.185899973 CET | 1.1.1.1 | 192.168.2.5 | 0x1254 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 14:33:57.185899973 CET | 1.1.1.1 | 192.168.2.5 | 0x1254 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 14:33:57.185899973 CET | 1.1.1.1 | 192.168.2.5 | 0x1254 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 14:33:57.185899973 CET | 1.1.1.1 | 192.168.2.5 | 0x1254 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 14:33:57.185899973 CET | 1.1.1.1 | 192.168.2.5 | 0x1254 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:33:57 UTC | 264 | OUT | |
2025-01-03 13:33:57 UTC | 8 | OUT | |
2025-01-03 13:33:58 UTC | 1131 | IN | |
2025-01-03 13:33:58 UTC | 7 | IN | |
2025-01-03 13:33:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:33:58 UTC | 265 | OUT | |
2025-01-03 13:33:58 UTC | 45 | OUT | |
2025-01-03 13:33:59 UTC | 1130 | IN | |
2025-01-03 13:33:59 UTC | 239 | IN | |
2025-01-03 13:33:59 UTC | 903 | IN | |
2025-01-03 13:33:59 UTC | 1369 | IN | |
2025-01-03 13:33:59 UTC | 1369 | IN | |
2025-01-03 13:33:59 UTC | 1369 | IN | |
2025-01-03 13:33:59 UTC | 1369 | IN | |
2025-01-03 13:33:59 UTC | 1369 | IN | |
2025-01-03 13:33:59 UTC | 1369 | IN | |
2025-01-03 13:33:59 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49706 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:33:59 UTC | 276 | OUT | |
2025-01-03 13:33:59 UTC | 12791 | OUT | |
2025-01-03 13:34:00 UTC | 1132 | IN | |
2025-01-03 13:34:00 UTC | 20 | IN | |
2025-01-03 13:34:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49707 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:34:01 UTC | 274 | OUT | |
2025-01-03 13:34:01 UTC | 15021 | OUT | |
2025-01-03 13:34:01 UTC | 1138 | IN | |
2025-01-03 13:34:01 UTC | 20 | IN | |
2025-01-03 13:34:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49708 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:34:02 UTC | 274 | OUT | |
2025-01-03 13:34:02 UTC | 15331 | OUT | |
2025-01-03 13:34:02 UTC | 5180 | OUT | |
2025-01-03 13:34:03 UTC | 1136 | IN | |
2025-01-03 13:34:03 UTC | 20 | IN | |
2025-01-03 13:34:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49709 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:34:04 UTC | 279 | OUT | |
2025-01-03 13:34:04 UTC | 952 | OUT | |
2025-01-03 13:34:12 UTC | 1143 | IN | |
2025-01-03 13:34:12 UTC | 20 | IN | |
2025-01-03 13:34:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49710 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:34:13 UTC | 275 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:13 UTC | 15331 | OUT | |
2025-01-03 13:34:15 UTC | 1133 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49716 | 104.21.32.1 | 443 | 6540 | C:\Users\user\Desktop\nayfObR.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-03 13:34:15 UTC | 265 | OUT | |
2025-01-03 13:34:15 UTC | 80 | OUT | |
2025-01-03 13:34:16 UTC | 1129 | IN | |
2025-01-03 13:34:16 UTC | 54 | IN | |
2025-01-03 13:34:16 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:33:55 |
Start date: | 03/01/2025 |
Path: | C:\Users\user\Desktop\nayfObR.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5a0000 |
File size: | 535'040 bytes |
MD5 hash: | 138FCF999A87419BE2C7E5E036601466 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 08:33:55 |
Start date: | 03/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 08:33:55 |
Start date: | 03/01/2025 |
Path: | C:\Users\user\Desktop\nayfObR.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5a0000 |
File size: | 535'040 bytes |
MD5 hash: | 138FCF999A87419BE2C7E5E036601466 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 7.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 6% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 32 |
Graph
Function 005D019E Relevance: 42.3, APIs: 10, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A1CF0 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 108libraryfileloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A2350 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 54libraryloadersynchronizationCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B5F42 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B672A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A2050 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 78librarymemoryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B6BA8 Relevance: 3.2, APIs: 2, Instructions: 177COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B6A92 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A22B0 Relevance: 3.0, APIs: 2, Instructions: 33COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A1310 Relevance: 1.8, APIs: 1, Instructions: 308COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B7137 Relevance: 1.6, APIs: 1, Instructions: 142COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A8100 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B62F4 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B4FF1 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BAAB7 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B3010 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BB099 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A9643 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A9F05 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BA630 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A92AB Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BAFE8 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BA8F0 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005AD9B2 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BAA10 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BABBD Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A9637 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B6920 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005A1C80 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B7EB6 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B464C Relevance: 10.8, APIs: 2, Strings: 4, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C2A3C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005AEDC8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BF251 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BAE76 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005AC5E2 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005BC26E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B9A26 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B4A70 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005B42DC Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|