Windows
Analysis Report
random.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- random.exe (PID: 6732 cmdline:
"C:\Users\ user\Deskt op\random. exe" MD5: 6446A00EB59754E15749AF229B0D5217) - conhost.exe (PID: 6736 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - random.exe (PID: 6920 cmdline:
"C:\Users\ user\Deskt op\random. exe" MD5: 6446A00EB59754E15749AF229B0D5217) - random.exe (PID: 6940 cmdline:
"C:\Users\ user\Deskt op\random. exe" MD5: 6446A00EB59754E15749AF229B0D5217) - WerFault.exe (PID: 7160 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 732 -s 140 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["cloudewahsj.shop", "framekgirus.shop", "abruptyopsn.shop", "pancakedipyps.click", "tirepublicerj.shop", "rabidcowse.shop", "nearycrepso.shop", "wholersorie.shop", "noisycuttej.shop"], "Build id": "FATE99--test"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:46:57.624092+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:58.723867+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:59.832079+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:02.382077+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:03.904266+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:05.131058+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:06.348119+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49746 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:10.415669+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:46:58.190213+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:59.202131+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:10.911021+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:46:58.190213+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:46:59.202131+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:46:57.624092+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:58.723867+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:59.832079+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:02.382077+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:03.904266+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:05.131058+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:06.348119+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49746 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:10.415669+0100 | 2058398 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:46:57.113787+0100 | 2058397 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 58005 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:47:05.600120+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:47:06.352320+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.4 | 49746 | 188.114.97.3 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_00415D89 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Directory queried: |
Source: | Code function: | 3_2_00441816 | |
Source: | Code function: | 3_2_0043D0D0 | |
Source: | Code function: | 3_2_0043D0D0 | |
Source: | Code function: | 3_2_0040C080 | |
Source: | Code function: | 3_2_004442E0 | |
Source: | Code function: | 3_2_00418BA2 | |
Source: | Code function: | 3_2_00444C20 | |
Source: | Code function: | 3_2_00430F03 | |
Source: | Code function: | 3_2_0042F716 | |
Source: | Code function: | 3_2_00417054 | |
Source: | Code function: | 3_2_0041B021 | |
Source: | Code function: | 3_2_0041B021 | |
Source: | Code function: | 3_2_004438E0 | |
Source: | Code function: | 3_2_004438F9 | |
Source: | Code function: | 3_2_004438FB | |
Source: | Code function: | 3_2_00422880 | |
Source: | Code function: | 3_2_00427885 | |
Source: | Code function: | 3_2_0041F170 | |
Source: | Code function: | 3_2_004421E9 | |
Source: | Code function: | 3_2_004421E9 | |
Source: | Code function: | 3_2_0041618C | |
Source: | Code function: | 3_2_0041BA52 | |
Source: | Code function: | 3_2_0041BA52 | |
Source: | Code function: | 3_2_0041BA52 | |
Source: | Code function: | 3_2_00402210 | |
Source: | Code function: | 3_2_0043A230 | |
Source: | Code function: | 3_2_00431AF5 | |
Source: | Code function: | 3_2_0040B280 | |
Source: | Code function: | 3_2_00440A90 | |
Source: | Code function: | 3_2_00441B50 | |
Source: | Code function: | 3_2_00409360 | |
Source: | Code function: | 3_2_00422370 | |
Source: | Code function: | 3_2_0042FB7D | |
Source: | Code function: | 3_2_00408320 | |
Source: | Code function: | 3_2_00419B30 | |
Source: | Code function: | 3_2_0041F3E0 | |
Source: | Code function: | 3_2_0041B3F2 | |
Source: | Code function: | 3_2_0041AB90 | |
Source: | Code function: | 3_2_00428C62 | |
Source: | Code function: | 3_2_00427C10 | |
Source: | Code function: | 3_2_00414C30 | |
Source: | Code function: | 3_2_00418492 | |
Source: | Code function: | 3_2_0043CD40 | |
Source: | Code function: | 3_2_0042C5E0 | |
Source: | Code function: | 3_2_0041B58F | |
Source: | Code function: | 3_2_004195B6 | |
Source: | Code function: | 3_2_004195B6 | |
Source: | Code function: | 3_2_0043E6E0 | |
Source: | Code function: | 3_2_0043E6E0 | |
Source: | Code function: | 3_2_00430F4E | |
Source: | Code function: | 3_2_00430F54 | |
Source: | Code function: | 3_2_0041A770 | |
Source: | Code function: | 3_2_00407730 | |
Source: | Code function: | 3_2_00407730 | |
Source: | Code function: | 3_2_00427FC0 | |
Source: | Code function: | 3_2_00427FC0 | |
Source: | Code function: | 3_2_004437D0 | |
Source: | Code function: | 3_2_0042A7F0 | |
Source: | Code function: | 3_2_0042A7F0 | |
Source: | Code function: | 3_2_00427FFD | |
Source: | Code function: | 3_2_0042AF92 | |
Source: | Code function: | 3_2_0042AF92 | |
Source: | Code function: | 3_2_0042AFB0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_00437A60 |
Source: | Code function: | 3_2_00437A60 |
Source: | Code function: | 3_2_00437C10 |
Source: | Code function: | 3_2_0043D0D0 | |
Source: | Code function: | 3_2_0040E16E | |
Source: | Code function: | 3_2_00408A60 | |
Source: | Code function: | 3_2_004442E0 | |
Source: | Code function: | 3_2_00421B30 | |
Source: | Code function: | 3_2_00418BA2 | |
Source: | Code function: | 3_2_00444C20 | |
Source: | Code function: | 3_2_0043CE90 | |
Source: | Code function: | 3_2_00428750 | |
Source: | Code function: | 3_2_00425713 | |
Source: | Code function: | 3_2_0042F716 | |
Source: | Code function: | 3_2_00437850 | |
Source: | Code function: | 3_2_0041906A | |
Source: | Code function: | 3_2_00426010 | |
Source: | Code function: | 3_2_004438E0 | |
Source: | Code function: | 3_2_004180F0 | |
Source: | Code function: | 3_2_004438F9 | |
Source: | Code function: | 3_2_004438FB | |
Source: | Code function: | 3_2_00427885 | |
Source: | Code function: | 3_2_0041D8B0 | |
Source: | Code function: | 3_2_00406950 | |
Source: | Code function: | 3_2_00444950 | |
Source: | Code function: | 3_2_0040D172 | |
Source: | Code function: | 3_2_0043210B | |
Source: | Code function: | 3_2_00403910 | |
Source: | Code function: | 3_2_00429917 | |
Source: | Code function: | 3_2_00406120 | |
Source: | Code function: | 3_2_0040B92C | |
Source: | Code function: | 3_2_0042F1C1 | |
Source: | Code function: | 3_2_004239EB | |
Source: | Code function: | 3_2_00421180 | |
Source: | Code function: | 3_2_0041618C | |
Source: | Code function: | 3_2_0043099F | |
Source: | Code function: | 3_2_0041F9A0 | |
Source: | Code function: | 3_2_0041D1B0 | |
Source: | Code function: | 3_2_0042E9B0 | |
Source: | Code function: | 3_2_0041BA52 | |
Source: | Code function: | 3_2_0043025E | |
Source: | Code function: | 3_2_0042621B | |
Source: | Code function: | 3_2_0042BA20 | |
Source: | Code function: | 3_2_00417222 | |
Source: | Code function: | 3_2_00443A30 | |
Source: | Code function: | 3_2_004042C0 | |
Source: | Code function: | 3_2_00443AC0 | |
Source: | Code function: | 3_2_004302CD | |
Source: | Code function: | 3_2_0040F2D0 | |
Source: | Code function: | 3_2_0040B280 | |
Source: | Code function: | 3_2_004352B0 | |
Source: | Code function: | 3_2_00402B40 | |
Source: | Code function: | 3_2_00443B60 | |
Source: | Code function: | 3_2_00409B70 | |
Source: | Code function: | 3_2_00422370 | |
Source: | Code function: | 3_2_00429B7B | |
Source: | Code function: | 3_2_0042FB7D | |
Source: | Code function: | 3_2_00405B00 | |
Source: | Code function: | 3_2_00440B00 | |
Source: | Code function: | 3_2_00428B10 | |
Source: | Code function: | 3_2_00419B30 | |
Source: | Code function: | 3_2_00411BDE | |
Source: | Code function: | 3_2_004123EC | |
Source: | Code function: | 3_2_00428C62 | |
Source: | Code function: | 3_2_0043C460 | |
Source: | Code function: | 3_2_0043B410 | |
Source: | Code function: | 3_2_00441C26 | |
Source: | Code function: | 3_2_004064C0 | |
Source: | Code function: | 3_2_0042F4E1 | |
Source: | Code function: | 3_2_004324EE | |
Source: | Code function: | 3_2_0041D4A0 | |
Source: | Code function: | 3_2_00408D10 | |
Source: | Code function: | 3_2_0043E520 | |
Source: | Code function: | 3_2_00442DCA | |
Source: | Code function: | 3_2_00415DD8 | |
Source: | Code function: | 3_2_00425DA0 | |
Source: | Code function: | 3_2_004085B0 | |
Source: | Code function: | 3_2_00409660 | |
Source: | Code function: | 3_2_00404E20 | |
Source: | Code function: | 3_2_0043C6C0 | |
Source: | Code function: | 3_2_0043E6E0 | |
Source: | Code function: | 3_2_004186E5 | |
Source: | Code function: | 3_2_00444680 | |
Source: | Code function: | 3_2_0041DE90 | |
Source: | Code function: | 3_2_0043DF60 | |
Source: | Code function: | 3_2_00429F7C | |
Source: | Code function: | 3_2_00433707 | |
Source: | Code function: | 3_2_00402F10 | |
Source: | Code function: | 3_2_00407730 | |
Source: | Code function: | 3_2_00427FC0 | |
Source: | Code function: | 3_2_004437D0 | |
Source: | Code function: | 3_2_00433FDF | |
Source: | Code function: | 3_2_004127E0 | |
Source: | Code function: | 3_2_0042A7F0 | |
Source: | Code function: | 3_2_00434FF0 | |
Source: | Code function: | 3_2_0042AF92 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_0043D0D0 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 3_2_004499A2 | |
Source: | Code function: | 3_2_0044AAD5 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_00442080 |
Source: | Code function: | 0_2_03087F19 | |
Source: | Code function: | 0_2_03088096 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_03087F19 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | Directory queried: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 1 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | ReversingLabs | ByteCode-MSIL.Trojan.Jalapeno | ||
76% | Virustotal | Browse | ||
100% | Avira | TR/ATRAPS.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
pancakedipyps.click | 188.114.97.3 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | pancakedipyps.click | European Union | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585859 |
Start date and time: | 2025-01-08 11:46:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | random.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@7/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.159.23, 20.109.210.53, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryDirectoryFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
05:46:56 | API Interceptor | |
05:47:08 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | Esquele Stealer | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
pancakedipyps.click | Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| |
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RedLine, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, zgRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_random.exe_ca1f07f5125e6bc91f62c19534af66d94f4128a_f759ac22_e704cede-f9d8-47b8-bdcb-ab76450523ff\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8858331213149667 |
Encrypted: | false |
SSDEEP: | 96:YmFfMlh2C28s2gejTOAqyS3QXIDcQlc6VcEdcw31+BHUHZ0ownOgHkEwH3dEFYAZ:/llC28aA0LR3kaGGzuiFcoZ24IO8n |
MD5: | 3384BACA49EE74A6A28F249756F5F343 |
SHA1: | 33B5E87CAB428CE0A2EBA9DE211B16B24FEFEDA2 |
SHA-256: | C6841072507B266FBDB0CFD365F9D4738D67ECC71653F2A29D7C78FD185FB9F7 |
SHA-512: | 93E3F1D8B44F1AA0FC1EBA4C931E22DE12D5D58C93304370F2FBA330CAF7043328423107EC50D96D214E1A051004633732A6619DD048562149CCAB29E9FC4D35 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 153425 |
Entropy (8bit): | 3.743957904588716 |
Encrypted: | false |
SSDEEP: | 1536:g299GlU7uBojRVpN4uE2aOcLTgiAqbF0t5sCDJtTSUTfuFZjt:gUpVJ4uEqcLTgabF0zXPY5 |
MD5: | F46F0CAC4AC4B6DF778F7FDEBE909F4F |
SHA1: | 19A3FECCBB7E73D5462EE116C4E58ED8485A100F |
SHA-256: | F7070EA10F665C4E1EDC4FFF355A1E0A51D1E894B8E58A3EECFAB5A9BF174F4B |
SHA-512: | DC0AFCCEF9F8AA1A0C9BB43742E2586DE832B7BA7D754DCCE6A80DE84FE671D5B08514709FD55842E04471540CCAB6B5102A04D85A81C20232C2C69088A20C44 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8360 |
Entropy (8bit): | 3.688864417670488 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJiP6XaC6Y9OSUDGgmfbVJzyprt89bWtsfcrSm:R6lXJS6p6YkSUDGgmfbVJBWmfS |
MD5: | E7AFA7CF72E3EB07C69DABE50AFC4818 |
SHA1: | CFBA44C679BA49B7B53BF9CF8C7D27122A745DEC |
SHA-256: | 90BA2ECAD71B0AB78C235008B6180BF0A3F5F078944699EBEE01621F82CA37BC |
SHA-512: | 30B09A484114FD3C80DE1D9792BF3914D4744A417DB959E2559121B47CC1F113F9448B24F6BA62EF4B06EE9F84B18AE04948291AB515262235D991F170FF34EB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4730 |
Entropy (8bit): | 4.427648113002853 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zspJg77aI9uAyWpW8VYJYm8M4JlR0dxPcf6FI+q8vpR0dxPcfRQycwd:uIjf7I78I7V1JlRlfDKpRlfRQycwd |
MD5: | 9414A14E706E7D7CD712E743718FC3F8 |
SHA1: | 1EB9D634FB8048BAA53982AA7B409A8BABEAB6F7 |
SHA-256: | 05D1195AF188D10216386274498377711D84C240CDE0CB783E21537AC5F7358C |
SHA-512: | 113B3328768E4CD72802953E5DA2F544BF927E122C7407098EC193DF8532450FBC1550177CF92118AE7BF2D4B02C6F62CAF1D00599B750BB86D73EA15DCA2062 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465510249772632 |
Encrypted: | false |
SSDEEP: | 6144:2IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNjdwBCswSbWL:7XD94+WlLZMM6YFHN+WL |
MD5: | B31BB713B15D94E1AA6303CCB713C049 |
SHA1: | 970FD3537CAAC992083F70066ED7183A13B7180F |
SHA-256: | 8AC2F87484629DCDD8D8ED1034F921D56D6925F2B353B6398591F72CF9DD482C |
SHA-512: | ECC2382BFD99EA050B41FC3FF3D13D45D17F9BEA6216E7D332318999DF4A10B78FD5A426ECBB08A707C9CF07D3262913B11F8634B4332B8F81727DB28F7294CD |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.968250820517949 |
TrID: |
|
File name: | random.exe |
File size: | 349'696 bytes |
MD5: | 6446a00eb59754e15749af229b0d5217 |
SHA1: | 69c0311f0b121eb378e90a1dd88925c424c1a07b |
SHA256: | 558fe8c705bbd035f886cc02acee3fdfa50398e74795f62d182e01225d58e2e2 |
SHA512: | 63ffddb80faa7013dc4c665e1614ee7175d313868636e2d6bc9b8e1fa941134ff425f6f02c64a5509eb97a9be8bb87a2a9859cd57e72d10b7bbf13887cf0ba58 |
SSDEEP: | 6144:AT1Bgj04zLS/70E7IodJ6vsVzsooEAPmIV49g2/GzrtXAlGSExj76f:Gb45zA7Fv6vsVOzm9t/Gzr9AsdP6f |
TLSH: | 6374131057CBC170DAA6273228504E206BEBF74D1DC38DCDB489759F961AFA20B677AC |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...AL................0..B...........a... ........@.. ....................................`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40619e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xB98C4C41 [Thu Aug 23 20:32:01 2068 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6150 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xa000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x610a | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x41a4 | 0x4200 | 3fd86cd640fad1b0e3c70a019e57ee90 | False | 0.5025449810606061 | data | 5.884139579646745 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x598 | 0x600 | 97b5e78dd91bc3fa97e695160eb75d4a | False | 0.41015625 | data | 4.031118916432586 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xa000 | 0xc | 0x200 | 0553d30171535035af0137d669b879da | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0xc000 | 0x50800 | 0x50800 | 271045b038ee6a75896b67a0c0c4955d | False | 1.0003366411102483 | data | 7.999373253801423 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x80a0 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0x83ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T11:46:57.113787+0100 | 2058397 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pancakedipyps .click) | 1 | 192.168.2.4 | 58005 | 1.1.1.1 | 53 | UDP |
2025-01-08T11:46:57.624092+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:57.624092+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:58.190213+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:58.190213+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:58.723867+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:58.723867+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:59.202131+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:59.202131+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:59.832079+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:46:59.832079+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:02.382077+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:02.382077+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:03.904266+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:03.904266+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:05.131058+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:05.131058+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:05.600120+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:06.348119+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49746 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:06.348119+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49746 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:06.352320+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.4 | 49746 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:10.415669+0100 | 2058398 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) | 1 | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:10.415669+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | TCP |
2025-01-08T11:47:10.911021+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 8, 2025 11:46:57.137763023 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.137784958 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:57.137856960 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.140708923 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.140722990 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:57.624025106 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:57.624092102 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.628391027 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.628396988 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:57.628662109 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:57.680793047 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.777384996 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.777415037 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:57.777513027 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.190243959 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.190330982 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.190380096 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.193372011 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.193382025 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.266021013 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.266072989 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.266220093 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.266607046 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.266623020 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.723664045 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.723866940 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.725111008 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.725121975 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.725379944 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:58.726619959 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.726674080 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:58.726687908 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202126980 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202174902 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202204943 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202233076 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202267885 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202284098 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.202301979 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202321053 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.202402115 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.202450991 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202636003 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202665091 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202706099 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202708006 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.202714920 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.202749014 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.206768036 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.206840038 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.206845999 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.258941889 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.258951902 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.288605928 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.288638115 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.288667917 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.288675070 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.288722992 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.288726091 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.288770914 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.288975000 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.288975000 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.288995981 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.289002895 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.371968985 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.372009039 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.372081995 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.372623920 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.372634888 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.831990004 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.832078934 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.833568096 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.833575964 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.833828926 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.842977047 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.843137980 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.843166113 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:46:59.843224049 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:46:59.843230009 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:01.904930115 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:01.905030966 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:01.905087948 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:01.905261993 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:01.905277967 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:01.924913883 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:01.924953938 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:01.925040960 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:01.925379038 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:01.925395012 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:02.382003069 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:02.382076979 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:02.386029005 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:02.386035919 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:02.386287928 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:02.401230097 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:02.401367903 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:02.401400089 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.018543005 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.018657923 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.018719912 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.051808119 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.051834106 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.434041977 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.434077024 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.434143066 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.434894085 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.434906006 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.904181957 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.904266119 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.905587912 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.905597925 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.905864954 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.907150030 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.907320023 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.907356024 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:03.907427073 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:03.907437086 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:04.546026945 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:04.546144009 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:04.546197891 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:04.546375036 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:04.546386003 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:04.671930075 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:04.671953917 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:04.672025919 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:04.672364950 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:04.672379971 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.130980015 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.131057978 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.132420063 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.132427931 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.132690907 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.134104013 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.134237051 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.134241104 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.600128889 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.600213051 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.600270033 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.600485086 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.600495100 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.888276100 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.888307095 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:05.888390064 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.888765097 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:05.888777971 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.348023891 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.348119020 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.349468946 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.349478960 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.349720955 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.351061106 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.351819038 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.351855993 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.351986885 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.352047920 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.352174997 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.352215052 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.352368116 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.352394104 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.352560043 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.352590084 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.352746964 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.352786064 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.352794886 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.352993965 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.353027105 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.362267971 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.362437963 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.362482071 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.362482071 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.362499952 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.362509012 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.362550020 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.362617970 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.362667084 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.362698078 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.367368937 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:06.367461920 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:06.367479086 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:09.938153028 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:09.938327074 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:09.938388109 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:09.938466072 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:09.938486099 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:09.943063974 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:09.943105936 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:09.943186045 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:09.943487883 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:09.943501949 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.415599108 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.415668964 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:10.417073011 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:10.417083025 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.417325974 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.418720961 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:10.418740034 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:10.418797970 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.911024094 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.911118984 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.911195993 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:10.911396027 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:10.911415100 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Jan 8, 2025 11:47:10.911425114 CET | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 8, 2025 11:47:10.911429882 CET | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 8, 2025 11:46:57.113786936 CET | 58005 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 8, 2025 11:46:57.128448009 CET | 53 | 58005 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 8, 2025 11:46:57.113786936 CET | 192.168.2.4 | 1.1.1.1 | 0x6c3a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 8, 2025 11:46:57.128448009 CET | 1.1.1.1 | 192.168.2.4 | 0x6c3a | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 8, 2025 11:46:57.128448009 CET | 1.1.1.1 | 192.168.2.4 | 0x6c3a | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:46:57 UTC | 266 | OUT | |
2025-01-08 10:46:57 UTC | 8 | OUT | |
2025-01-08 10:46:58 UTC | 1127 | IN | |
2025-01-08 10:46:58 UTC | 7 | IN | |
2025-01-08 10:46:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:46:58 UTC | 267 | OUT | |
2025-01-08 10:46:58 UTC | 46 | OUT | |
2025-01-08 10:46:59 UTC | 1127 | IN | |
2025-01-08 10:46:59 UTC | 242 | IN | |
2025-01-08 10:46:59 UTC | 1369 | IN | |
2025-01-08 10:46:59 UTC | 1369 | IN | |
2025-01-08 10:46:59 UTC | 1369 | IN | |
2025-01-08 10:46:59 UTC | 1369 | IN | |
2025-01-08 10:46:59 UTC | 1369 | IN | |
2025-01-08 10:46:59 UTC | 243 | IN | |
2025-01-08 10:46:59 UTC | 1369 | IN | |
2025-01-08 10:46:59 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:46:59 UTC | 281 | OUT | |
2025-01-08 10:46:59 UTC | 15331 | OUT | |
2025-01-08 10:46:59 UTC | 2807 | OUT | |
2025-01-08 10:47:01 UTC | 1126 | IN | |
2025-01-08 10:47:01 UTC | 20 | IN | |
2025-01-08 10:47:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:47:02 UTC | 280 | OUT | |
2025-01-08 10:47:02 UTC | 8759 | OUT | |
2025-01-08 10:47:03 UTC | 1131 | IN | |
2025-01-08 10:47:03 UTC | 20 | IN | |
2025-01-08 10:47:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:47:03 UTC | 281 | OUT | |
2025-01-08 10:47:03 UTC | 15331 | OUT | |
2025-01-08 10:47:03 UTC | 5081 | OUT | |
2025-01-08 10:47:04 UTC | 1131 | IN | |
2025-01-08 10:47:04 UTC | 20 | IN | |
2025-01-08 10:47:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:47:05 UTC | 284 | OUT | |
2025-01-08 10:47:05 UTC | 988 | OUT | |
2025-01-08 10:47:05 UTC | 1133 | IN | |
2025-01-08 10:47:05 UTC | 20 | IN | |
2025-01-08 10:47:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49746 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:47:06 UTC | 279 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:06 UTC | 15331 | OUT | |
2025-01-08 10:47:09 UTC | 1139 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | 6940 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 10:47:10 UTC | 267 | OUT | |
2025-01-08 10:47:10 UTC | 81 | OUT | |
2025-01-08 10:47:10 UTC | 1125 | IN | |
2025-01-08 10:47:10 UTC | 54 | IN | |
2025-01-08 10:47:10 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:46:55 |
Start date: | 08/01/2025 |
Path: | C:\Users\user\Desktop\random.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb90000 |
File size: | 349'696 bytes |
MD5 hash: | 6446A00EB59754E15749AF229B0D5217 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 05:46:55 |
Start date: | 08/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 05:46:55 |
Start date: | 08/01/2025 |
Path: | C:\Users\user\Desktop\random.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x290000 |
File size: | 349'696 bytes |
MD5 hash: | 6446A00EB59754E15749AF229B0D5217 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 05:46:55 |
Start date: | 08/01/2025 |
Path: | C:\Users\user\Desktop\random.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x560000 |
File size: | 349'696 bytes |
MD5 hash: | 6446A00EB59754E15749AF229B0D5217 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 05:46:55 |
Start date: | 08/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4e0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 8.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 47.4% |
Total number of Nodes: | 19 |
Total number of Limit Nodes: | 1 |
Graph
Function 03087F19 Relevance: 42.3, APIs: 11, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03088096 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E629D7 Relevance: 1.6, APIs: 1, Instructions: 58memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E60668 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 7.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 48.7% |
Total number of Nodes: | 189 |
Total number of Limit Nodes: | 14 |
Graph
Function 0043D0D0 Relevance: 32.5, APIs: 11, Strings: 7, Instructions: 957memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421B30 Relevance: 9.3, Strings: 7, Instructions: 527COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408A60 Relevance: 7.7, APIs: 5, Instructions: 216threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C080 Relevance: 6.4, Strings: 5, Instructions: 104COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418BA2 Relevance: 5.4, Strings: 4, Instructions: 367COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428750 Relevance: 4.1, Strings: 3, Instructions: 328COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430F54 Relevance: 3.1, APIs: 2, Instructions: 96COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430F4E Relevance: 3.1, APIs: 2, Instructions: 81COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415D89 Relevance: 1.6, APIs: 1, Instructions: 141COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430F03 Relevance: 1.6, APIs: 1, Instructions: 79COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444C20 Relevance: 1.6, Strings: 1, Instructions: 312COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442080 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004442E0 Relevance: .3, Instructions: 321COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F4E1 Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CE90 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441B50 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441816 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004423C5 Relevance: 3.0, APIs: 2, Instructions: 26COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436312 Relevance: 1.7, APIs: 1, Instructions: 163memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F222 Relevance: 1.6, APIs: 1, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B967 Relevance: 1.6, APIs: 1, Instructions: 67COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442020 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437180 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434865 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D400 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D433 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004404E2 Relevance: 1.5, APIs: 1, Instructions: 13memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004404B0 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004127E0 Relevance: 183.9, APIs: 3, Strings: 101, Instructions: 1937COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042621B Relevance: 33.7, Strings: 26, Instructions: 1202COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041618C Relevance: 14.8, Strings: 11, Instructions: 1044COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409B70 Relevance: 11.7, Strings: 9, Instructions: 418COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B280 Relevance: 10.4, Strings: 8, Instructions: 384COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409360 Relevance: 10.3, Strings: 8, Instructions: 272COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409660 Relevance: 9.2, Strings: 7, Instructions: 448COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C6C0 Relevance: 9.1, Strings: 7, Instructions: 361COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428B10 Relevance: 8.0, Strings: 6, Instructions: 513COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004042C0 Relevance: 6.7, Strings: 5, Instructions: 465COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427FC0 Relevance: 5.4, Strings: 4, Instructions: 431COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041906A Relevance: 5.3, Strings: 4, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004437D0 Relevance: 4.4, Strings: 3, Instructions: 647COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004438E0 Relevance: 4.3, Strings: 3, Instructions: 577COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004438FB Relevance: 4.3, Strings: 3, Instructions: 566COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004438F9 Relevance: 4.3, Strings: 3, Instructions: 565COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440B00 Relevance: 4.3, Strings: 3, Instructions: 555COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443A30 Relevance: 4.2, Strings: 3, Instructions: 488COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004239EB Relevance: 4.2, Strings: 3, Instructions: 458COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422370 Relevance: 4.2, Strings: 3, Instructions: 457COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443AC0 Relevance: 4.2, Strings: 3, Instructions: 453COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421180 Relevance: 4.2, Strings: 3, Instructions: 428COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043099F Relevance: 4.0, Strings: 3, Instructions: 251COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F2D0 Relevance: 3.9, Strings: 3, Instructions: 168COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404E20 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F9A0 Relevance: 3.3, Strings: 2, Instructions: 771COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BA20 Relevance: 3.1, APIs: 2, Instructions: 146COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422880 Relevance: 3.0, Strings: 2, Instructions: 455COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443B60 Relevance: 2.9, Strings: 2, Instructions: 441COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429F7C Relevance: 2.9, Strings: 2, Instructions: 421COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004195B6 Relevance: 2.9, Strings: 2, Instructions: 363COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F1C1 Relevance: 2.8, Strings: 2, Instructions: 284COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043025E Relevance: 2.8, Strings: 2, Instructions: 282COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004302CD Relevance: 2.8, Strings: 2, Instructions: 281COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004123EC Relevance: 2.8, Strings: 2, Instructions: 271COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415DD8 Relevance: 2.7, Strings: 2, Instructions: 215COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E6E0 Relevance: 2.0, Strings: 1, Instructions: 749COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AF92 Relevance: 2.0, Strings: 1, Instructions: 719COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004324EE Relevance: 1.8, Strings: 1, Instructions: 514COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426010 Relevance: 1.7, APIs: 1, Instructions: 205COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DF60 Relevance: 1.6, Strings: 1, Instructions: 391COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414C30 Relevance: 1.6, Strings: 1, Instructions: 384COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004085B0 Relevance: 1.6, Strings: 1, Instructions: 314COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B410 Relevance: 1.5, Strings: 1, Instructions: 299COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BA52 Relevance: 1.5, Strings: 1, Instructions: 293COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406120 Relevance: 1.5, Strings: 1, Instructions: 265COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444950 Relevance: 1.5, Strings: 1, Instructions: 257COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004180F0 Relevance: 1.5, Strings: 1, Instructions: 255COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AFB0 Relevance: 1.5, Strings: 1, Instructions: 222COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D8B0 Relevance: 1.5, Strings: 1, Instructions: 202COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418492 Relevance: 1.4, Strings: 1, Instructions: 158COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417054 Relevance: 1.4, Strings: 1, Instructions: 146COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D172 Relevance: 1.4, Strings: 1, Instructions: 132COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442DCA Relevance: 1.4, Strings: 1, Instructions: 130COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004421E9 Relevance: 1.3, Strings: 1, Instructions: 96COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B58F Relevance: 1.3, Strings: 1, Instructions: 79COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427FFD Relevance: 1.3, Strings: 1, Instructions: 67COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406950 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402F10 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004352B0 Relevance: .6, Instructions: 627COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407730 Relevance: .6, Instructions: 613COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403910 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B00 Relevance: .5, Instructions: 539COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428C62 Relevance: .4, Instructions: 434COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433FDF Relevance: .4, Instructions: 423COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B92C Relevance: .4, Instructions: 383COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004186E5 Relevance: .4, Instructions: 379COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433707 Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D4A0 Relevance: .3, Instructions: 337COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004064C0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441C26 Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427C10 Relevance: .3, Instructions: 277COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D1B0 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043210B Relevance: .2, Instructions: 246COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444680 Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434FF0 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427885 Relevance: .2, Instructions: 211COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F170 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AB90 Relevance: .2, Instructions: 196COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C460 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437850 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A770 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402210 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CD40 Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408D10 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E520 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B021 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E9B0 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431AF5 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408320 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B40 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B3F2 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A230 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C5E0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440A90 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F3E0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|