Windows
Analysis Report
9cOUjp7ybm.exe
Overview
General Information
Sample name: | 9cOUjp7ybm.exerenamed because original name is a hash value |
Original sample name: | 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe |
Analysis ID: | 1584118 |
MD5: | 7177b0ba961ddd258ee9672d436d6b63 |
SHA1: | cdb7aef7f7a05430d323c00d43fe98af4680fa28 |
SHA256: | 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95 |
Tags: | exeuser-zhuzhu0009 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 9cOUjp7ybm.exe (PID: 7616 cmdline:
"C:\Users\ user\Deskt op\9cOUjp7 ybm.exe" MD5: 7177B0BA961DDD258EE9672D436D6B63) - conhost.exe (PID: 7624 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - aspnet_regiis.exe (PID: 7696 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 7752 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 616 -s 122 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["rabidcowse.shop", "framekgirus.shop", "tirepublicerj.shop", "abruptyopsn.shop", "undesirabkel.click", "wholersorie.shop", "nearycrepso.shop", "noisycuttej.shop", "cloudewahsj.shop"], "Build id": "LPnhqo--iicrrifofhfg"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 1 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:42:00.348017+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:01.447291+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:03.107818+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:06.751225+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:07.911389+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:09.758036+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:11.141919+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:13.787834+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:42:00.957953+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:02.320886+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:14.265404+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:42:00.957953+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:42:02.320886+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:42:00.348017+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:01.447291+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:03.107818+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:06.751225+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:07.911389+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:09.758036+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49743 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:11.141919+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49744 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:13.787834+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:41:59.845681+0100 | 2058550 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49481 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:42:07.275955+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 2_2_027A5270 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0040B810 | |
Source: | Code function: | 0_2_00405260 | |
Source: | Code function: | 0_2_00405260 | |
Source: | Code function: | 0_2_003F63C0 | |
Source: | Code function: | 0_2_003F63C0 | |
Source: | Code function: | 0_2_00431480 | |
Source: | Code function: | 0_2_00405D70 | |
Source: | Code function: | 0_2_003F3670 | |
Source: | Code function: | 0_2_003F7F20 | |
Source: | Code function: | 0_2_003F7F20 | |
Source: | Code function: | 2_2_027A5270 | |
Source: | Code function: | 2_2_027A5270 | |
Source: | Code function: | 2_2_027B2A28 | |
Source: | Code function: | 2_2_027B3288 | |
Source: | Code function: | 2_2_0279CB18 | |
Source: | Code function: | 2_2_027D0BA0 | |
Source: | Code function: | 2_2_027CF950 | |
Source: | Code function: | 2_2_0279A9B0 | |
Source: | Code function: | 2_2_027D0980 | |
Source: | Code function: | 2_2_027B24ED | |
Source: | Code function: | 2_2_027A8C90 | |
Source: | Code function: | 2_2_02799DEC | |
Source: | Code function: | 2_2_02798A70 | |
Source: | Code function: | 2_2_02799240 | |
Source: | Code function: | 2_2_027BBAC4 | |
Source: | Code function: | 2_2_027CF2B0 | |
Source: | Code function: | 2_2_027CC280 | |
Source: | Code function: | 2_2_027CC280 | |
Source: | Code function: | 2_2_027CC280 | |
Source: | Code function: | 2_2_027CC280 | |
Source: | Code function: | 2_2_027CC280 | |
Source: | Code function: | 2_2_02792B70 | |
Source: | Code function: | 2_2_027B9B60 | |
Source: | Code function: | 2_2_027CF350 | |
Source: | Code function: | 2_2_027C9B49 | |
Source: | Code function: | 2_2_027CF3E0 | |
Source: | Code function: | 2_2_027ABBA0 | |
Source: | Code function: | 2_2_027BC055 | |
Source: | Code function: | 2_2_027CF040 | |
Source: | Code function: | 2_2_027AB839 | |
Source: | Code function: | 2_2_02799814 | |
Source: | Code function: | 2_2_02799814 | |
Source: | Code function: | 2_2_027958C0 | |
Source: | Code function: | 2_2_027958C0 | |
Source: | Code function: | 2_2_027BA0A0 | |
Source: | Code function: | 2_2_027B796F | |
Source: | Code function: | 2_2_027B5784 | |
Source: | Code function: | 2_2_027B8150 | |
Source: | Code function: | 2_2_027B8150 | |
Source: | Code function: | 2_2_027CF130 | |
Source: | Code function: | 2_2_027A9980 | |
Source: | Code function: | 2_2_027B3E61 | |
Source: | Code function: | 2_2_027BC675 | |
Source: | Code function: | 2_2_027BC6D2 | |
Source: | Code function: | 2_2_027CF6A0 | |
Source: | Code function: | 2_2_027BB693 | |
Source: | Code function: | 2_2_027A4760 | |
Source: | Code function: | 2_2_027A4760 | |
Source: | Code function: | 2_2_027A4760 | |
Source: | Code function: | 2_2_027A4760 | |
Source: | Code function: | 2_2_027B6760 | |
Source: | Code function: | 2_2_027B6760 | |
Source: | Code function: | 2_2_027B6740 | |
Source: | Code function: | 2_2_027B873A | |
Source: | Code function: | 2_2_02799710 | |
Source: | Code function: | 2_2_02799710 | |
Source: | Code function: | 2_2_027A6711 | |
Source: | Code function: | 2_2_027C4FD0 | |
Source: | Code function: | 2_2_027A6FC4 | |
Source: | Code function: | 2_2_027A7FB1 | |
Source: | Code function: | 2_2_027B5784 | |
Source: | Code function: | 2_2_027C9460 | |
Source: | Code function: | 2_2_027C9460 | |
Source: | Code function: | 2_2_027C9460 | |
Source: | Code function: | 2_2_02797420 | |
Source: | Code function: | 2_2_02797420 | |
Source: | Code function: | 2_2_027ADC10 | |
Source: | Code function: | 2_2_027D0CD0 | |
Source: | Code function: | 2_2_027B8490 | |
Source: | Code function: | 2_2_027AAD10 | |
Source: | Code function: | 2_2_027BA500 | |
Source: | Code function: | 2_2_027AE5F0 | |
Source: | Code function: | 2_2_027B1D90 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 2_2_027C2490 |
Source: | Code function: | 2_2_04D31000 |
Source: | Code function: | 2_2_027C2490 |
Source: | Code function: | 2_2_027C2620 |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_6CE18870 | |
Source: | Code function: | 0_2_6CE17960 |
Source: | Code function: | 0_2_003F7140 | |
Source: | Code function: | 0_2_003F39B0 | |
Source: | Code function: | 0_2_00428A40 | |
Source: | Code function: | 0_2_0042CAB0 | |
Source: | Code function: | 0_2_0040DB20 | |
Source: | Code function: | 0_2_003F43B0 | |
Source: | Code function: | 0_2_00429390 | |
Source: | Code function: | 0_2_003F63C0 | |
Source: | Code function: | 0_2_003D6428 | |
Source: | Code function: | 0_2_003F6CB0 | |
Source: | Code function: | 0_2_0041B4F0 | |
Source: | Code function: | 0_2_0040DDF0 | |
Source: | Code function: | 0_2_003D6E63 | |
Source: | Code function: | 0_2_0041DE30 | |
Source: | Code function: | 0_2_003F56A0 | |
Source: | Code function: | 0_2_003F7F20 | |
Source: | Code function: | 0_2_0040F7C0 | |
Source: | Code function: | 0_2_003D6FC7 | |
Source: | Code function: | 0_2_6CE117C0 | |
Source: | Code function: | 0_2_6CE18870 | |
Source: | Code function: | 0_2_6CE17960 | |
Source: | Code function: | 0_2_6CE15540 | |
Source: | Code function: | 0_2_6CE1ED30 | |
Source: | Code function: | 0_2_6CE11010 | |
Source: | Code function: | 0_2_6CE291E1 | |
Source: | Code function: | 0_2_0042ABC0 | |
Source: | Code function: | 2_2_027A5270 | |
Source: | Code function: | 2_2_027B6270 | |
Source: | Code function: | 2_2_027CFA60 | |
Source: | Code function: | 2_2_027B2A28 | |
Source: | Code function: | 2_2_027D02E0 | |
Source: | Code function: | 2_2_027B3288 | |
Source: | Code function: | 2_2_027CBB60 | |
Source: | Code function: | 2_2_027C8890 | |
Source: | Code function: | 2_2_027A2120 | |
Source: | Code function: | 2_2_0279A9B0 | |
Source: | Code function: | 2_2_0279E635 | |
Source: | Code function: | 2_2_027986F0 | |
Source: | Code function: | 2_2_0279D6C5 | |
Source: | Code function: | 2_2_027BAF45 | |
Source: | Code function: | 2_2_027B24ED | |
Source: | Code function: | 2_2_027AECC0 | |
Source: | Code function: | 2_2_027A627D | |
Source: | Code function: | 2_2_02794260 | |
Source: | Code function: | 2_2_027B3A50 | |
Source: | Code function: | 2_2_02799240 | |
Source: | Code function: | 2_2_027C9A00 | |
Source: | Code function: | 2_2_027AD2F0 | |
Source: | Code function: | 2_2_027982B0 | |
Source: | Code function: | 2_2_027CF2B0 | |
Source: | Code function: | 2_2_027C2290 | |
Source: | Code function: | 2_2_027CC280 | |
Source: | Code function: | 2_2_027B5370 | |
Source: | Code function: | 2_2_027C6B5C | |
Source: | Code function: | 2_2_027CF350 | |
Source: | Code function: | 2_2_027C9B49 | |
Source: | Code function: | 2_2_02798B30 | |
Source: | Code function: | 2_2_027BD330 | |
Source: | Code function: | 2_2_0279FB16 | |
Source: | Code function: | 2_2_027CF3E0 | |
Source: | Code function: | 2_2_027A93D2 | |
Source: | Code function: | 2_2_027C5BAA | |
Source: | Code function: | 2_2_02794BA0 | |
Source: | Code function: | 2_2_027CF040 | |
Source: | Code function: | 2_2_027AB839 | |
Source: | Code function: | 2_2_027AD020 | |
Source: | Code function: | 2_2_02799814 | |
Source: | Code function: | 2_2_027C0800 | |
Source: | Code function: | 2_2_027BD0FF | |
Source: | Code function: | 2_2_027958C0 | |
Source: | Code function: | 2_2_027938B0 | |
Source: | Code function: | 2_2_027C20A0 | |
Source: | Code function: | 2_2_027B796F | |
Source: | Code function: | 2_2_027B1960 | |
Source: | Code function: | 2_2_027B8150 | |
Source: | Code function: | 2_2_027CF130 | |
Source: | Code function: | 2_2_027A71F0 | |
Source: | Code function: | 2_2_027BA9F0 | |
Source: | Code function: | 2_2_027BE1C6 | |
Source: | Code function: | 2_2_027961B0 | |
Source: | Code function: | 2_2_027C71AD | |
Source: | Code function: | 2_2_027C81A0 | |
Source: | Code function: | 2_2_027A9980 | |
Source: | Code function: | 2_2_027B3E61 | |
Source: | Code function: | 2_2_027BB65A | |
Source: | Code function: | 2_2_02796640 | |
Source: | Code function: | 2_2_02795E10 | |
Source: | Code function: | 2_2_02792EB0 | |
Source: | Code function: | 2_2_0279AE90 | |
Source: | Code function: | 2_2_027A4760 | |
Source: | Code function: | 2_2_027B6760 | |
Source: | Code function: | 2_2_027A7F48 | |
Source: | Code function: | 2_2_027BB748 | |
Source: | Code function: | 2_2_027B6740 | |
Source: | Code function: | 2_2_027C7F40 | |
Source: | Code function: | 2_2_027B873A | |
Source: | Code function: | 2_2_027B9720 | |
Source: | Code function: | 2_2_02799710 | |
Source: | Code function: | 2_2_027A6F13 | |
Source: | Code function: | 2_2_027AD700 | |
Source: | Code function: | 2_2_027BA7F0 | |
Source: | Code function: | 2_2_027CCFF7 | |
Source: | Code function: | 2_2_027CFFE0 | |
Source: | Code function: | 2_2_027B8FD0 | |
Source: | Code function: | 2_2_027BB7C3 | |
Source: | Code function: | 2_2_027A7FB1 | |
Source: | Code function: | 2_2_027CBFB0 | |
Source: | Code function: | 2_2_027C9460 | |
Source: | Code function: | 2_2_027B0440 | |
Source: | Code function: | 2_2_027AB432 | |
Source: | Code function: | 2_2_02797420 | |
Source: | Code function: | 2_2_027ADC10 | |
Source: | Code function: | 2_2_027BE4F1 | |
Source: | Code function: | 2_2_027CFCE0 | |
Source: | Code function: | 2_2_027BDCAF | |
Source: | Code function: | 2_2_027C648E | |
Source: | Code function: | 2_2_027AFC89 | |
Source: | Code function: | 2_2_027BFDD0 | |
Source: | Code function: | 2_2_027A1598 | |
Source: | Code function: | 2_2_027B1D90 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 2_2_027C8890 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_003D2A42 | |
Source: | Code function: | 0_2_0042FAB4 | |
Source: | Code function: | 0_2_003DBC6B | |
Source: | Code function: | 0_2_003DD4AD | |
Source: | Code function: | 0_2_003D550A | |
Source: | Code function: | 0_2_003D6D60 | |
Source: | Code function: | 0_2_003D6D60 | |
Source: | Code function: | 0_2_003D4DF1 | |
Source: | Code function: | 0_2_003D65C2 | |
Source: | Code function: | 0_2_003D97F2 | |
Source: | Code function: | 0_2_003D97F2 | |
Source: | Code function: | 0_2_003D9802 | |
Source: | Code function: | 2_2_027CBF2E | |
Source: | Code function: | 2_2_027CEFB4 |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_2-13763 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 2_2_027CD760 |
Source: | Code function: | 0_2_6CE201CA |
Source: | Code function: | 0_2_6CE21955 | |
Source: | Code function: | 0_2_6CE22B29 |
Source: | Code function: | 0_2_6CE2473C |
Source: | Code function: | 0_2_6CE1FCF1 | |
Source: | Code function: | 0_2_6CE201CA | |
Source: | Code function: | 0_2_6CE22B5A |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_6CE20398 |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_6CE1FE13 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 311 Process Injection | 11 Deobfuscate/Decode Files or Information | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 4 Obfuscated Files or Information | Security Account Manager | 33 System Information Discovery | SMB/Windows Admin Shares | 1 Screen Capture | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Software Packing | NTDS | 351 Security Software Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 23 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Masquerading | Cached Domain Credentials | 1 Process Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 23 Virtualization/Sandbox Evasion | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 311 Process Injection | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | ReversingLabs | Win32.Exploit.LummaC | ||
67% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
68% | ReversingLabs | Win32.Trojan.LummaStealer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
undesirabkel.click | 188.114.96.3 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.96.3 | undesirabkel.click | European Union | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584118 |
Start date and time: | 2025-01-04 09:41:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 58s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 9cOUjp7ybm.exerenamed because original name is a hash value |
Original Sample Name: | 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/7@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.42.73.29, 40.126.32.76, 20.12.23.50, 13.107.246.45
- Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
03:41:59 | API Interceptor | |
03:42:01 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.96.3 | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
undesirabkel.click | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | KnowBe4 | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWorm | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9cOUjp7ybm.exe_b952a5b7d6b454dd87179fa1ef45e68ce4bf810_2bfc0910_afc74728-264e-41f0-bf2f-00ecc5bf4e9f\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9899121708814769 |
Encrypted: | false |
SSDEEP: | 96:ZPF5LXWPakhedHjtkMldvxmoijCQXIDcQvc6QcEVcw3cE/H+BHUHZ0ownOgHkEwV:xGDhedxkd0BU/qaGpezuiFcMZ24IO8q |
MD5: | 751FBAD4185099B00EB558FC12665505 |
SHA1: | 3234BC93FB62EC839D03994C69FA3721133D95C0 |
SHA-256: | 3E6316DBB009F788BC2E65D738E2AD80D6A2BAD6F104EC6834F7BB958FB7E8F3 |
SHA-512: | 6963DF8F56DCED2D8678C993D8469EDA078030841718BE27DD86F2FAA07FEBB6AA6B6F736ABCFC442F5648E463219530EC86D3A72B15CB5B8306FC392B17AE1C |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 197190 |
Entropy (8bit): | 3.3460013108985334 |
Encrypted: | false |
SSDEEP: | 1536:mMyEyz2GYcXzpN4uE2aOuM73dVyLTg3Bo0ZdCDQ/oRGuKF:zyPzHYu4uEqH3dVyLTg3BoZQE1K |
MD5: | D06B78567D155092D9FC7103023B547A |
SHA1: | 09CFDFF0FB0A8AC0AEF6A43F9B242D566628A473 |
SHA-256: | 94CF334979F8574FD285E5EE12023CF7DE731E32C158BB2A1AD8E4B98C72FDD7 |
SHA-512: | E15F56DFFDF8299BFE7A57A48FDE372C92D68E20A2932DF5349768895BB1A6463D78366667EF62EF3B92B7E0E2348F90DBA00E54246CA2832854404B016CD63A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8416 |
Entropy (8bit): | 3.710386919517836 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ8v6s6Y9iSUThcZgmfZPYnprT89bD8sf0cBm:R6lXJE6s6Y4SUTKZgmfBYuDPf6 |
MD5: | 246624BE1787D3C8E4086D7385983C59 |
SHA1: | 1E25EDB2F84CA54557C159043E192C5752844A14 |
SHA-256: | 2FC30936B9DAE863FAE91A5DC44B7FEFA440D6ACC8234B5F4FD06A98ABD134FD |
SHA-512: | 4E6030E314663D748D9B66A51607F682D4D31EE26618FC51620F8800A296ED7286C2E102EAA4C1254304939F5317C1555CD2AD9CA9660A1ECAEEC69B6E73D504 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4782 |
Entropy (8bit): | 4.533316435586078 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zseiJg77aI9liWpW8VYtcYm8M4J92Ft0+q8v2ahIpd3Nud:uIjfewI7Pj7VU5JvKjKpd3Nud |
MD5: | 21BE0A5846D39696BA300D746EB2BA02 |
SHA1: | 5B18E49595EB126C6F52E5B95E0BA2CCD22834AD |
SHA-256: | 7515FF15D7457EE517ACFD0B1D038F6FFB423DEFB71E99BEAA6A860C8E051DB3 |
SHA-512: | B139DD85570D9E95C42FB229CCB01307302F14E8AA287E79E39F64473363163DA28E209A7C029BF6C41B9666A85B84B1C31585435391C7CF372E858EB65AA6D6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\9cOUjp7ybm.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 441856 |
Entropy (8bit): | 7.099141129436754 |
Encrypted: | false |
SSDEEP: | 12288:Op8zdbqWi+wkHXZa+PkbCo0GDLob06QUQDCP2/lSWM5W:OGA+DHXZ10do06QUQDB/lU |
MD5: | 64C287959FF0DBD10DB81BDED030A3A1 |
SHA1: | ACF88011455FC98D0DE186520B4DDDE5D1CF5F75 |
SHA-256: | 673E0EFEE492A6A82AFCCE12545C4A2D46A1E9E827C33B7A1E9F0A904656A458 |
SHA-512: | D7CA03F8032E7C9D5882EAD046C33388D5EBBA5923ABD95C3C535945BA4AA8A1FE6E47D116DD9376C6717A36BFF5AC0D0DCFC599526A5FC89D81C3FD3B0517C2 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465660386383278 |
Encrypted: | false |
SSDEEP: | 6144:9IXfpi67eLPU9skLmb0b4hWSPKaJG8nAgejZMMhA2gX4WABl0uNudwBCswSbd:uXD94hWlLZMM6YFHI+d |
MD5: | 008DCCD74F98C7BF020692781A4B58CF |
SHA1: | 9C9EFB0208D8C5D80CB8CBF4A54C0EA856E6D5CA |
SHA-256: | 4A9E21A61F1EFD97F9AAC9BC955FC07F17466252B5CD269BE3F781EDE05EEA04 |
SHA-512: | C148BDF83277500077E9ECCA72A17130D2AEB7611D8C4CE7F5483FA889E63F35D2339035BA9D2DEB0009F07F503FA13916EF3C55BDF02CAA12B550145764D132 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\9cOUjp7ybm.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1414 |
Entropy (8bit): | 4.538550000655599 |
Encrypted: | false |
SSDEEP: | 24:7v74NulAMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T44AMff2p8p14nrPKktp |
MD5: | 6C17A359AD8E630345A9D8CE92776AD6 |
SHA1: | 1AB1D85A67065B77B1983436621D81F953311ECD |
SHA-256: | FD509D91FE69EC3C4FD468CC55435F09AE046D38234EE12174AAC9BA9B3E35C0 |
SHA-512: | A9B7F1222AB96D2A221C4956F89733A801FDFC071010620359976AEABD2CEB77766F1038388DB449E28C8995B9F8A9126CE5376FAF0F3D88BA122CDEC7C28058 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.641236463464292 |
TrID: |
|
File name: | 9cOUjp7ybm.exe |
File size: | 760'832 bytes |
MD5: | 7177b0ba961ddd258ee9672d436d6b63 |
SHA1: | cdb7aef7f7a05430d323c00d43fe98af4680fa28 |
SHA256: | 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95 |
SHA512: | df1b07f5d4ff53afc4547fb371af1393bafce2eec0cc96ab0ceeaeb4500a3e771f4d1b9c7936b86f38241abfdfb53c9cf2fff22d3a0e7006015f50c165c59078 |
SSDEEP: | 12288:RoA2sfoKrzzpKnToLX5y8anwFgBGOXtoTmDr1aVupsZTDfCc71FT/mI69puLam6q:n2sg0z2ToE8+Q8tpDr10fCETZ6 |
TLSH: | 5CF44A9C726072DFC867C472DEA82C68FA5174BB931F4247A02716ADAE4D897CF150F2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ug..............0...................... ....@.. ....................... ............@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4c000a |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67758BE0 [Wed Jan 1 18:39:28 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [004C0000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x90750 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xbc000 | 0x630 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xbe000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xc0000 | 0x8 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x90000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
<qqo!9W | 0x2000 | 0x8dfbc | 0x8e000 | 7fff0c7c0fecf003b0f35d7cfea5292b | False | 1.0003197898327465 | data | 7.999708454943257 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.text | 0x90000 | 0x2aab8 | 0x2ac00 | 96fdb7fa19e968f31ed3add38830b8bd | False | 0.31700018274853803 | data | 4.601162956172314 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xbc000 | 0x630 | 0x800 | f56b61609acce3d2ff125ebe9500bda6 | False | 0.35693359375 | data | 3.5365525633689616 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xbe000 | 0xc | 0x200 | 5ba34c2ca37b35a0de4f3409909cbf7a | False | 0.041015625 | data | 0.07225252269057866 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
0xc0000 | 0x10 | 0x200 | 17f9b25275a4d7c97677dd9cc8f5a01d | False | 0.044921875 | data | 0.12227588125913882 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xbc0a0 | 0x3a4 | data | 0.45278969957081544 | ||
RT_MANIFEST | 0xbc444 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T09:41:59.845681+0100 | 2058550 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) | 1 | 192.168.2.4 | 49481 | 1.1.1.1 | 53 | UDP |
2025-01-04T09:42:00.348017+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:00.348017+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:00.957953+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:00.957953+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:01.447291+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:01.447291+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:02.320886+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:02.320886+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:03.107818+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:03.107818+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:06.751225+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:06.751225+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:07.275955+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:07.911389+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:07.911389+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:09.758036+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49743 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:09.758036+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:11.141919+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49744 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:11.141919+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:13.787834+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:13.787834+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
2025-01-04T09:42:14.265404+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 09:41:59.868381977 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:41:59.868417978 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:41:59.868488073 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:41:59.871087074 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:41:59.871098995 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.347861052 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.348016977 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.377063990 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.377080917 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.377319098 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.428051949 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.532795906 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.532855034 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.532888889 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.957957029 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.958089113 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.958164930 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.960692883 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.960705042 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.970547915 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.970561981 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:00.970624924 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.971007109 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:00.971014977 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:01.447215080 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:01.447290897 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:01.460601091 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:01.460623026 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:01.461025953 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:01.471568108 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:01.471590042 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:01.471682072 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.320939064 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321028948 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321072102 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321074009 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.321099997 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321141005 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.321155071 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321257114 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321297884 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.321299076 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321314096 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321346045 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.321362019 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321546078 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.321588039 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.321594000 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.325539112 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.325587034 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.325592041 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.365581036 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.411401033 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.411483049 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.411526918 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.411622047 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.411628962 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.411643028 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.411664963 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.411696911 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.412379980 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.412396908 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.412406921 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.412411928 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.622525930 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.622567892 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:02.622633934 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.622889996 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:02.622914076 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:03.107732058 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:03.107817888 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:03.112905025 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:03.112914085 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:03.113240957 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:03.114420891 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:03.114572048 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:03.114619017 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:03.114677906 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:03.114685059 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.209470034 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.209559917 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.209631920 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.209758043 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.209774971 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.286535978 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.286567926 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.286669970 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.286971092 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.286982059 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.751007080 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.751224995 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.752393007 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.752399921 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.752598047 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:06.753858089 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.753981113 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:06.754008055 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.275970936 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.276087999 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.276194096 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.276407003 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.276422024 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.455223083 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.455266953 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.455349922 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.455655098 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.455670118 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.911304951 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.911389112 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.913014889 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.913021088 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.913237095 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.914371967 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.914546967 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.914582014 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:07.914640903 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:07.914649963 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:08.962595940 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:08.962718010 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:08.962773085 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:08.962893963 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:08.962908030 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:09.282937050 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:09.282975912 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:09.283129930 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:09.283418894 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:09.283442974 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:09.757945061 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:09.758035898 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:09.759154081 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:09.759162903 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:09.759758949 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:09.760881901 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:09.760926962 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:09.760931969 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:10.187879086 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:10.188009024 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:10.188080072 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:10.188206911 CET | 49743 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:10.188230991 CET | 443 | 49743 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:10.666409016 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:10.666454077 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:10.666557074 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:10.666927099 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:10.666943073 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.141833067 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.141918898 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.143353939 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.143363953 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.143665075 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.147414923 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.148277044 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.148313046 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.148420095 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.148454905 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.148544073 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.148598909 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.148693085 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.148718119 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.148827076 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.148852110 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.148969889 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.148996115 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.158375978 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.158524036 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.158550978 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.158570051 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.158590078 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.158675909 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.158704042 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.158724070 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.158740997 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.158775091 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.158797026 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.158844948 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.165184021 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:11.165261030 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:11.165287018 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.269215107 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.269402027 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.269470930 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.269727945 CET | 49744 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.269747972 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.311661005 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.311700106 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.311780930 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.312060118 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.312073946 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.787765980 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.787833929 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.792129040 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.792138100 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.792377949 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:13.795975924 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.796019077 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:13.796045065 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.265414000 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.265471935 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.265505075 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.265523911 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.265568018 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.265569925 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.265590906 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.265710115 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.265930891 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.266463041 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.266519070 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.266526937 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.270302057 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.270329952 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.270395994 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.270396948 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.270402908 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.270463943 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.270483971 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.270608902 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.270819902 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.270836115 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 4, 2025 09:42:14.270847082 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 4, 2025 09:42:14.270852089 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 09:41:59.845680952 CET | 49481 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 4, 2025 09:41:59.859971046 CET | 53 | 49481 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 4, 2025 09:41:59.845680952 CET | 192.168.2.4 | 1.1.1.1 | 0x8dac | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 4, 2025 09:41:59.859971046 CET | 1.1.1.1 | 192.168.2.4 | 0x8dac | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 09:41:59.859971046 CET | 1.1.1.1 | 192.168.2.4 | 0x8dac | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:00 UTC | 265 | OUT | |
2025-01-04 08:42:00 UTC | 8 | OUT | |
2025-01-04 08:42:00 UTC | 1129 | IN | |
2025-01-04 08:42:00 UTC | 7 | IN | |
2025-01-04 08:42:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:01 UTC | 266 | OUT | |
2025-01-04 08:42:01 UTC | 54 | OUT | |
2025-01-04 08:42:02 UTC | 1121 | IN | |
2025-01-04 08:42:02 UTC | 248 | IN | |
2025-01-04 08:42:02 UTC | 1369 | IN | |
2025-01-04 08:42:02 UTC | 1369 | IN | |
2025-01-04 08:42:02 UTC | 173 | IN | |
2025-01-04 08:42:02 UTC | 1369 | IN | |
2025-01-04 08:42:02 UTC | 1369 | IN | |
2025-01-04 08:42:02 UTC | 1369 | IN | |
2025-01-04 08:42:02 UTC | 1369 | IN | |
2025-01-04 08:42:02 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:03 UTC | 274 | OUT | |
2025-01-04 08:42:03 UTC | 15331 | OUT | |
2025-01-04 08:42:03 UTC | 2779 | OUT | |
2025-01-04 08:42:06 UTC | 1132 | IN | |
2025-01-04 08:42:06 UTC | 20 | IN | |
2025-01-04 08:42:06 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:06 UTC | 278 | OUT | |
2025-01-04 08:42:06 UTC | 8761 | OUT | |
2025-01-04 08:42:07 UTC | 1133 | IN | |
2025-01-04 08:42:07 UTC | 20 | IN | |
2025-01-04 08:42:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:07 UTC | 279 | OUT | |
2025-01-04 08:42:07 UTC | 15331 | OUT | |
2025-01-04 08:42:07 UTC | 5083 | OUT | |
2025-01-04 08:42:08 UTC | 1131 | IN | |
2025-01-04 08:42:08 UTC | 20 | IN | |
2025-01-04 08:42:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49743 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:09 UTC | 284 | OUT | |
2025-01-04 08:42:09 UTC | 1275 | OUT | |
2025-01-04 08:42:10 UTC | 1128 | IN | |
2025-01-04 08:42:10 UTC | 20 | IN | |
2025-01-04 08:42:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49744 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:11 UTC | 282 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:11 UTC | 15331 | OUT | |
2025-01-04 08:42:13 UTC | 1137 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | 7696 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 08:42:13 UTC | 266 | OUT | |
2025-01-04 08:42:13 UTC | 89 | OUT | |
2025-01-04 08:42:14 UTC | 1129 | IN | |
2025-01-04 08:42:14 UTC | 240 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN | |
2025-01-04 08:42:14 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:41:58 |
Start date: | 04/01/2025 |
Path: | C:\Users\user\Desktop\9cOUjp7ybm.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3d0000 |
File size: | 760'832 bytes |
MD5 hash: | 7177B0BA961DDD258EE9672D436D6B63 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 03:41:58 |
Start date: | 04/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 03:41:58 |
Start date: | 04/01/2025 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x200000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 4 |
Start time: | 03:41:58 |
Start date: | 04/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9c0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 12.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 14.5% |
Total number of Nodes: | 647 |
Total number of Limit Nodes: | 8 |
Graph
Function 6CE18870 Relevance: 78.2, APIs: 24, Strings: 17, Instructions: 6458nativethreadmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE117C0 Relevance: 75.8, APIs: 25, Strings: 16, Instructions: 4011filememoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE17960 Relevance: 9.7, APIs: 3, Strings: 2, Instructions: 984nativeCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE1F9E1 Relevance: 3.1, APIs: 2, Instructions: 76COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE2480D Relevance: 3.1, APIs: 2, Instructions: 67COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE25070 Relevance: 3.1, APIs: 2, Instructions: 66COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE22DD6 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE15540 Relevance: 9.9, Strings: 6, Instructions: 2431COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429390 Relevance: 9.5, Strings: 7, Instructions: 781COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B4F0 Relevance: 9.0, Strings: 7, Instructions: 266COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE22B5A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 77COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B810 Relevance: 4.0, Strings: 3, Instructions: 237COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F56A0 Relevance: 3.3, Strings: 2, Instructions: 811COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE11010 Relevance: 3.1, Strings: 2, Instructions: 583COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE20398 Relevance: 1.6, APIs: 1, Instructions: 144COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DB20 Relevance: 1.5, Strings: 1, Instructions: 268COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431480 Relevance: 1.4, Strings: 1, Instructions: 128COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE2473C Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F7C0 Relevance: .8, Instructions: 753COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F7140 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F39B0 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F7F20 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F43B0 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DE30 Relevance: .5, Instructions: 531COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F63C0 Relevance: .4, Instructions: 449COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DDF0 Relevance: .3, Instructions: 337COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405260 Relevance: .3, Instructions: 319COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F6CB0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CAB0 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428A40 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003D6E63 Relevance: .1, Instructions: 148COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405D70 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003D6FC7 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003D6428 Relevance: .1, Instructions: 90COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003F3670 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE22B29 Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE226F3 Relevance: 15.1, APIs: 10, Instructions: 69COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE2435A Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 77COMMONLIBRARYCODE
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE211A7 Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE21323 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 62COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE219DA Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 30libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE25FF8 Relevance: 7.7, APIs: 5, Instructions: 199COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE26F6D Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 170fileCOMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE22F37 Relevance: 6.1, APIs: 4, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE22164 Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CE265E1 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 47COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 11.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 27% |
Total number of Nodes: | 355 |
Total number of Limit Nodes: | 23 |
Graph
Function 027A2120 Relevance: 131.6, APIs: 3, Strings: 71, Instructions: 2148COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027C8890 Relevance: 32.3, APIs: 11, Strings: 7, Instructions: 781memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04D31000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027986F0 Relevance: 7.8, APIs: 5, Instructions: 293threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027B3288 Relevance: 3.3, APIs: 2, Instructions: 296COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027CD760 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BCC80 Relevance: 3.1, APIs: 2, Instructions: 123COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BCC7E Relevance: 3.1, APIs: 2, Instructions: 100COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0279EA88 Relevance: 3.0, APIs: 2, Instructions: 29COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027CE5F1 Relevance: 3.0, APIs: 2, Instructions: 16COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BCC2C Relevance: 1.6, APIs: 1, Instructions: 100COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BCE22 Relevance: 1.6, APIs: 1, Instructions: 71COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BCE20 Relevance: 1.6, APIs: 1, Instructions: 50COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027CD700 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BDC02 Relevance: 1.5, APIs: 1, Instructions: 27COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027C100D Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0279CAD0 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027CBB30 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027CBB10 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|