Windows
Analysis Report
Holiday#3021.exe
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Holiday#3021.exe (PID: 6960 cmdline:
"C:\Users\ user\Deskt op\Holiday #3021.exe" MD5: D94C4AAD05654B76B8B2624808355886)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | IP Address: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 31 Virtualization/Sandbox Evasion | LSASS Memory | 31 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | ReversingLabs | Win32.Virus.Virut | ||
44% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
oshi.at | 5.253.86.15 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
5.253.86.15 | oshi.at | Cyprus | 208046 | HOSTSLICK-GERMANYNL | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587359 |
Start date and time: | 2025-01-10 09:16:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Holiday#3021.exe |
Detection: | MAL |
Classification: | mal56.winEXE@1/0@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Holiday#3021.exe, PID 6960 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
03:16:56 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
5.253.86.15 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | AsyncRAT, Babadeda, PureLog Stealer, zgRAT | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
oshi.at | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HOSTSLICK-GERMANYNL | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Icarus | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 5.354199809612623 |
TrID: |
|
File name: | Holiday#3021.exe |
File size: | 105'592 bytes |
MD5: | d94c4aad05654b76b8b2624808355886 |
SHA1: | f3c7911d8834836c22d78da8ae22e790ccd1429d |
SHA256: | 337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5 |
SHA512: | de80c7528d00e618a5071b93ccaf86cc697df6219f9e5adb4036aff163a9e87b88a461a8a36adecda1eebefd52d97630ac6d777c8c7a127759e2ea46938e0896 |
SSDEEP: | 768:79tVmtzb9+Os5hidy/vn61YPkAbBfmFdEugpWWF2zIV9XeS+ST6nkAv:BtVH7DidIkVFdvD0iIC/m8 |
TLSH: | CEA3F31DE3D0E4CFDC85767234A62A1737216D8129AE8C079E62B6DD1EB12C279CB1DC |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................Z..........>y... ........@.. ....................................`................................ |
Icon Hash: | b04a484c4c4a4eb0 |
Entrypoint: | 0x40793e |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x677F8B1E [Thu Jan 9 08:38:54 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 0D966BC363CD56690E80EE36566E3C7B |
Thumbprint SHA-1: | A955D2CBD3F7D394053A3C5219A93AF13917EA0D |
Thumbprint SHA-256: | 2362CABC8423B1EE01F2DE0F40197E509F8FA6DCF631E687EDB44792B241E526 |
Serial: | 138A5335DB02BAFDC71DC47A |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x78e4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x10eea | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x16e00 | 0x2e78 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1a000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x5944 | 0x5a00 | 71d19515a916531c21055ed779002fdf | False | 0.48020833333333335 | data | 5.562129242054329 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x10eea | 0x11000 | cd5684816678f78e2f084b404c8027c6 | False | 0.056654986213235295 | data | 4.118847272485798 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x1a000 | 0xc | 0x200 | e06ea69fa48d73489b803d33aeced39f | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x8130 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | 0.046492369572932686 | ||
RT_GROUP_ICON | 0x18958 | 0x14 | data | 1.15 | ||
RT_VERSION | 0x1896c | 0x394 | OpenPGP Secret Key | 0.4268558951965066 | ||
RT_MANIFEST | 0x18d00 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 09:16:57.577282906 CET | 49732 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:16:57.577347040 CET | 443 | 49732 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:16:57.577416897 CET | 49732 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:16:57.589895010 CET | 49732 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:16:57.589912891 CET | 443 | 49732 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:17:40.379834890 CET | 443 | 49732 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:17:40.379972935 CET | 49732 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:17:40.389461040 CET | 49732 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:17:40.389486074 CET | 443 | 49732 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:17:40.402621984 CET | 49739 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:17:40.402686119 CET | 443 | 49739 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:17:40.402777910 CET | 49739 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:17:40.403217077 CET | 49739 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:17:40.403249025 CET | 443 | 49739 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:23.147349119 CET | 443 | 49739 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:23.147577047 CET | 49739 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:23.149414062 CET | 49739 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:23.149425983 CET | 443 | 49739 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:28.163729906 CET | 49953 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:28.163748980 CET | 443 | 49953 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:28.163808107 CET | 49953 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:28.164092064 CET | 49953 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:28.164103031 CET | 443 | 49953 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:48.179934025 CET | 49953 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:48.223345995 CET | 443 | 49953 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:49.541203976 CET | 443 | 49953 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:49.541268110 CET | 49953 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:53.211333036 CET | 50009 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:53.211374998 CET | 443 | 50009 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:18:53.214943886 CET | 50009 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:53.215363026 CET | 50009 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:18:53.215375900 CET | 443 | 50009 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:11.084722996 CET | 50009 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:11.127341032 CET | 443 | 50009 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:14.585753918 CET | 443 | 50009 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:14.591440916 CET | 50009 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:16.101160049 CET | 50010 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:16.101190090 CET | 443 | 50010 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:16.101260900 CET | 50010 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:16.101845980 CET | 50010 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:16.101856947 CET | 443 | 50010 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:20.928363085 CET | 50010 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:20.971348047 CET | 443 | 50010 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:25.944876909 CET | 50011 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:25.944920063 CET | 443 | 50011 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:25.944983006 CET | 50011 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:25.945514917 CET | 50011 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:25.945530891 CET | 443 | 50011 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:29.232307911 CET | 50011 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:29.275336981 CET | 443 | 50011 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:34.241558075 CET | 50012 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:34.241592884 CET | 443 | 50012 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:34.241650105 CET | 50012 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:34.242181063 CET | 50012 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:34.242193937 CET | 443 | 50012 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:37.476489067 CET | 443 | 50010 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:37.476543903 CET | 50010 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:47.321356058 CET | 443 | 50011 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:47.322489977 CET | 50011 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:53.224718094 CET | 50012 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:53.267373085 CET | 443 | 50012 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:55.636754990 CET | 443 | 50012 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:55.636977911 CET | 50012 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:58.241590977 CET | 50013 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:58.241652012 CET | 443 | 50013 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:19:58.241776943 CET | 50013 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:58.242427111 CET | 50013 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:19:58.242441893 CET | 443 | 50013 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:33.430850029 CET | 50013 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:33.431052923 CET | 443 | 50013 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:33.434297085 CET | 50013 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:38.444423914 CET | 50014 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:38.444458008 CET | 443 | 50014 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:38.444557905 CET | 50014 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:38.445183992 CET | 50014 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:38.445199013 CET | 443 | 50014 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:41.990261078 CET | 50014 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:42.031373024 CET | 443 | 50014 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:47.007071018 CET | 50015 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:47.007113934 CET | 443 | 50015 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:47.007534981 CET | 50015 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:47.008032084 CET | 50015 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:47.008054972 CET | 443 | 50015 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:51.788001060 CET | 50015 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:51.831331968 CET | 443 | 50015 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:56.808032990 CET | 50016 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:56.808077097 CET | 443 | 50016 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:56.808372021 CET | 50016 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:56.809318066 CET | 50016 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:20:56.809330940 CET | 443 | 50016 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:59.810041904 CET | 443 | 50014 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:20:59.810195923 CET | 50014 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:21:03.179213047 CET | 50016 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:21:03.219326973 CET | 443 | 50016 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:21:08.194248915 CET | 50017 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:21:08.194299936 CET | 443 | 50017 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:21:08.194849968 CET | 50017 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:21:08.195190907 CET | 50017 | 443 | 192.168.2.4 | 5.253.86.15 |
Jan 10, 2025 09:21:08.195204020 CET | 443 | 50017 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:21:08.386291981 CET | 443 | 50015 | 5.253.86.15 | 192.168.2.4 |
Jan 10, 2025 09:21:08.388052940 CET | 50015 | 443 | 192.168.2.4 | 5.253.86.15 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 09:16:57.560795069 CET | 60479 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 09:16:57.569550037 CET | 53 | 60479 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 09:16:57.560795069 CET | 192.168.2.4 | 1.1.1.1 | 0x8543 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 09:16:57.569550037 CET | 1.1.1.1 | 192.168.2.4 | 0x8543 | No error (0) | 5.253.86.15 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 09:16:57.569550037 CET | 1.1.1.1 | 192.168.2.4 | 0x8543 | No error (0) | 194.15.112.248 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 03:16:56 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\Holiday#3021.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x140000 |
File size: | 105'592 bytes |
MD5 hash: | D94C4AAD05654B76B8B2624808355886 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Function 02250857 Relevance: 1.3, Strings: 1, Instructions: 69COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02250868 Relevance: 1.3, Strings: 1, Instructions: 65COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0225129E Relevance: .1, Instructions: 85COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022512A8 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0225097B Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022509B7 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0094D785 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0094D784 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02250841 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|