Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PqJockhBoA.exe

Overview

General Information

Sample name:PqJockhBoA.exe
renamed because original name is a hash value
Original sample name:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358.exe
Analysis ID:1588588
MD5:72d434d6d5ed6a8352796ab0dd4b275b
SHA1:9be0b0675c65a3ea8cbc2dfb651ae23aee4aecd6
SHA256:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358
Tags:exeuser-adrian__luca
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected non-DNS traffic on DNS port
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • PqJockhBoA.exe (PID: 4072 cmdline: "C:\Users\user\Desktop\PqJockhBoA.exe" MD5: 72D434D6D5ED6A8352796AB0DD4B275B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PqJockhBoA.exeReversingLabs: Detection: 65%
Source: PqJockhBoA.exeVirustotal: Detection: 66%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.0% probability
Source: PqJockhBoA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: PqJockhBoA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficTCP traffic: 192.168.2.6:61367 -> 1.1.1.1:53
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.9.191.182 45.9.191.182
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /basket/Snobzw.vdf HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: xianggrhen.com
Source: PqJockhBoA.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: PqJockhBoA.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: PqJockhBoA.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: PqJockhBoA.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: PqJockhBoA.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: PqJockhBoA.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: PqJockhBoA.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: PqJockhBoA.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: PqJockhBoA.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: PqJockhBoA.exe, 00000000.00000002.4020074049.000000000293A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002953000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000293A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002988000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com
Source: PqJockhBoA.exeString found in binary or memory: http://xianggrhen.com/basket/Snobzw.vdf
Source: PqJockhBoA.exe, 00000000.00000002.4020074049.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/basket/Snobzw.vdfto
Source: PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002980000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000297A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002988000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000295C000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002994000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000297C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comD
Source: PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002953000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002988000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comd
Source: PqJockhBoA.exeString found in binary or memory: https://sectigo.com/CPS0
Source: PqJockhBoA.exeStatic PE information: invalid certificate
Source: PqJockhBoA.exe, 00000000.00000000.2148910865.00000000004BA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQnxgltx.exe vs PqJockhBoA.exe
Source: PqJockhBoA.exe, 00000000.00000002.4018430230.000000000092E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PqJockhBoA.exe
Source: PqJockhBoA.exeBinary or memory string: OriginalFilenameQnxgltx.exe vs PqJockhBoA.exe
Source: PqJockhBoA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\PqJockhBoA.exeMutant created: NULL
Source: PqJockhBoA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: PqJockhBoA.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\PqJockhBoA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PqJockhBoA.exeReversingLabs: Detection: 65%
Source: PqJockhBoA.exeVirustotal: Detection: 66%
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeSection loaded: fwpuclnt.dllJump to behavior
Source: PqJockhBoA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: PqJockhBoA.exeStatic file information: File size 1202816 > 1048576
Source: PqJockhBoA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: E70000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: 28D0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: E70000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeWindow / User API: threadDelayed 1511Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeWindow / User API: threadDelayed 578Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 6564Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 6564Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 5328Thread sleep count: 1511 > 30Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 5328Thread sleep count: 578 > 30Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 6564Thread sleep time: -85656s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exe TID: 6564Thread sleep time: -85485s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 85656Jump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeThread delayed: delay time: 85485Jump to behavior
Source: PqJockhBoA.exe, 00000000.00000002.4018430230.00000000009DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\PqJockhBoA.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeQueries volume information: C:\Users\user\Desktop\PqJockhBoA.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PqJockhBoA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PqJockhBoA.exe66%ReversingLabsWin32.Trojan.Jalapeno
PqJockhBoA.exe67%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://xianggrhen.com/basket/Snobzw.vdf0%Avira URL Cloudsafe
http://xianggrhen.com0%Avira URL Cloudsafe
http://xianggrhen.com/basket/Snobzw.vdfto0%Avira URL Cloudsafe
http://xianggrhen.comD0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
xianggrhen.com
45.9.191.182
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://xianggrhen.com/basket/Snobzw.vdffalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tPqJockhBoA.exefalse
      high
      https://sectigo.com/CPS0PqJockhBoA.exefalse
        high
        http://xianggrhen.com/basket/Snobzw.vdftoPqJockhBoA.exe, 00000000.00000002.4020074049.00000000028D1000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yPqJockhBoA.exefalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0PqJockhBoA.exefalse
            high
            http://ocsp.sectigo.com0PqJockhBoA.exefalse
              high
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#PqJockhBoA.exefalse
                high
                http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#PqJockhBoA.exefalse
                  high
                  http://xianggrhen.comPqJockhBoA.exe, 00000000.00000002.4020074049.0000000002953000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000293A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002988000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#PqJockhBoA.exefalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePqJockhBoA.exe, 00000000.00000002.4020074049.000000000293A000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://xianggrhen.comDPqJockhBoA.exe, 00000000.00000002.4020074049.0000000002980000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000297A000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002988000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000295C000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002994000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.000000000297C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://xianggrhen.comdPqJockhBoA.exe, 00000000.00000002.4020074049.0000000002953000.00000004.00000800.00020000.00000000.sdmp, PqJockhBoA.exe, 00000000.00000002.4020074049.0000000002988000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        45.9.191.182
                        xianggrhen.comGermany
                        47583AS-HOSTINGERLTfalse
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1588588
                        Start date and time:2025-01-11 02:55:23 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 20s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:17
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:PqJockhBoA.exe
                        renamed because original name is a hash value
                        Original Sample Name:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358.exe
                        Detection:MAL
                        Classification:mal52.winEXE@1/0@1/1
                        EGA Information:Failed
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                        • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 2.23.227.208, 13.107.246.45, 20.103.156.88, 20.223.35.26, 150.171.27.10, 172.202.163.200, 184.28.90.27
                        • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target PqJockhBoA.exe, PID 4072 because it is empty
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        No simulations
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        45.9.191.182EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/book/Fvrbzpfzrm.vdf
                        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/book/Fvrbzpfzrm.vdf
                        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/book/Netnoyfq.mp3
                        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/composure/Emmaj.vdf
                        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/composure/Vuglyxyuvio.pdf
                        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/camp/Reibbfkkyy.dat
                        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
                        • xianggrhen.com/desk/Tbddfcris.vdf
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        xianggrhen.comEZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        AMTR-TT4781-SWFT-U4Y81-SO39-C37AR-AO937-CNR742-S3782-2818DY-9A82.exeGet hashmaliciousUnknownBrowse
                        • 92.113.29.113
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        AS-HOSTINGERLTEZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
                        • 92.249.45.121
                        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
                        • 92.249.45.121
                        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
                        • 45.9.191.182
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):5.926791619503864
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        • Win32 Executable (generic) a (10002005/4) 49.97%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:PqJockhBoA.exe
                        File size:1'202'816 bytes
                        MD5:72d434d6d5ed6a8352796ab0dd4b275b
                        SHA1:9be0b0675c65a3ea8cbc2dfb651ae23aee4aecd6
                        SHA256:a4fe52bb9ff7d20b6b00d0a0c0f73edf3e27c1aaf97bf03a4a609b802c9d9358
                        SHA512:d924de930e4a5cf692e7863ab9c0d7118ab82991006540adf26287db581f2860af4dd6f0f918397b3492c4702efd5af23ce1e6c0b9fed900908662a44fe7b3b0
                        SSDEEP:12288:Y06exAOZvzn3yu+3hj6sdrtPBBKGdHMzxgl5e+QpJdSWWOpMjBkMmL4Wzr9Koc9m:YsB3yuA3jgpVwZNrRpSERLYVBB
                        TLSH:D945B4D5EF45D872C50A06F7D0AE2A254260C1619BC3EF071DA4CB288E69BDDCED34E6
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~hQg.................b............... ........@.. ....................................`................................
                        Icon Hash:125ada12e9cc368b
                        Entrypoint:0x4f811a
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x6751687E [Thu Dec 5 08:46:54 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Signature Valid:false
                        Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                        Signature Validation Error:The digital signature of the object did not verify
                        Error Number:-2146869232
                        Not Before, Not After
                        • 06/09/2023 02:00:00 06/09/2026 01:59:59
                        Subject Chain
                        • CN=Janos Mathe, O=Janos Mathe, S=Fej\xe9r, C=HU
                        Version:3
                        Thumbprint MD5:AC9BAE96C38C5DB7CC68746FF2289F19
                        Thumbprint SHA-1:13FA1C1DB6E071F6904C6B6A36DF32D598534F47
                        Thumbprint SHA-256:665EC763CE4C00ACC0838CCD912356D9EF16A9B8201234BDA5EB77BD752ABC55
                        Serial:00A6662F1C09DA0BE6EA30BBE076306A55
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xf80d00x4a.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xfa0000x2b45c.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x121c000x3e80
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000xf61200xf6200c9a5f831501fa559be5f01237f96de16False0.3436220400584053data5.844337867665367IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0xfa0000x2b45c0x2b6008419137ca98d8c50bcbefe8a461c5831False0.16103431195965417data3.7712800338554096IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x1260000xc0x200e35e4c087b858de619eb8479f93d3622False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xfa0ac0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/m0.3528368794326241
                        RT_ICON0xfa5380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/m0.2581967213114754
                        RT_ICON0xfaee40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/m0.20590994371482177
                        RT_ICON0xfbfb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 11811 x 11811 px/m0.14470954356846474
                        RT_ICON0xfe57c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 11811 x 11811 px/m0.11767831837505904
                        RT_ICON0x1027c80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 11811 x 11811 px/m0.10642329020332718
                        RT_ICON0x107c740x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 11811 x 11811 px/m0.08616249737229346
                        RT_ICON0x1111400x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 11811 x 11811 px/m0.06911747308647817
                        RT_ICON0x12198c0x3228PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9858255451713396
                        RT_GROUP_ICON0x124bf00x84data0.7121212121212122
                        RT_VERSION0x124cb00x586data0.28076379066478074
                        RT_MANIFEST0x1252720x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 02:56:17.789926052 CET4971980192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:17.794744968 CET804971945.9.191.182192.168.2.6
                        Jan 11, 2025 02:56:17.794831991 CET4971980192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:17.795520067 CET4971980192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:17.800371885 CET804971945.9.191.182192.168.2.6
                        Jan 11, 2025 02:56:36.673569918 CET6136753192.168.2.61.1.1.1
                        Jan 11, 2025 02:56:36.678451061 CET53613671.1.1.1192.168.2.6
                        Jan 11, 2025 02:56:36.678519964 CET6136753192.168.2.61.1.1.1
                        Jan 11, 2025 02:56:36.683347940 CET53613671.1.1.1192.168.2.6
                        Jan 11, 2025 02:56:37.143825054 CET6136753192.168.2.61.1.1.1
                        Jan 11, 2025 02:56:37.149279118 CET53613671.1.1.1192.168.2.6
                        Jan 11, 2025 02:56:37.149528980 CET6136753192.168.2.61.1.1.1
                        Jan 11, 2025 02:56:39.168919086 CET804971945.9.191.182192.168.2.6
                        Jan 11, 2025 02:56:39.168986082 CET4971980192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:39.184175968 CET4971980192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:39.184937000 CET6138180192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:39.193598032 CET804971945.9.191.182192.168.2.6
                        Jan 11, 2025 02:56:39.193617105 CET806138145.9.191.182192.168.2.6
                        Jan 11, 2025 02:56:39.193703890 CET6138180192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:39.193893909 CET6138180192.168.2.645.9.191.182
                        Jan 11, 2025 02:56:39.200088978 CET806138145.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:00.575717926 CET806138145.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:00.575834990 CET6138180192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:00.576204062 CET6138180192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:00.580982924 CET806138145.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:00.607492924 CET6150780192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:00.613132954 CET806150745.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:00.613280058 CET6150780192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:00.613398075 CET6150780192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:00.618156910 CET806150745.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:21.966984987 CET806150745.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:21.967129946 CET6150780192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:21.967566013 CET6150780192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:21.968131065 CET6155280192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:21.972292900 CET806150745.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:21.973030090 CET806155245.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:21.973097086 CET6155280192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:21.973362923 CET6155280192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:21.978096962 CET806155245.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:43.377913952 CET806155245.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:43.377984047 CET6155280192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:43.378478050 CET6155280192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:43.381110907 CET6155580192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:43.383271933 CET806155245.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:43.385937929 CET806155545.9.191.182192.168.2.6
                        Jan 11, 2025 02:57:43.386033058 CET6155580192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:43.386213064 CET6155580192.168.2.645.9.191.182
                        Jan 11, 2025 02:57:43.390995026 CET806155545.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:04.735260963 CET806155545.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:04.735413074 CET6155580192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:04.735805035 CET6155580192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:04.736306906 CET6155780192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:04.740622997 CET806155545.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:04.741086006 CET806155745.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:04.741334915 CET6155780192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:04.741334915 CET6155780192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:04.746153116 CET806155745.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:26.140302896 CET806155745.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:26.140372992 CET6155780192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:26.140814066 CET6155780192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:26.143739939 CET6155880192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:26.145538092 CET806155745.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:26.148569107 CET806155845.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:26.148629904 CET6155880192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:26.148809910 CET6155880192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:26.153558016 CET806155845.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:47.502089977 CET806155845.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:47.502242088 CET6155880192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:47.502727985 CET6155880192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:47.503235102 CET6156080192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:47.507492065 CET806155845.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:47.508008957 CET806156045.9.191.182192.168.2.6
                        Jan 11, 2025 02:58:47.508093119 CET6156080192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:47.508414030 CET6156080192.168.2.645.9.191.182
                        Jan 11, 2025 02:58:47.513187885 CET806156045.9.191.182192.168.2.6
                        Jan 11, 2025 02:59:08.875792027 CET806156045.9.191.182192.168.2.6
                        Jan 11, 2025 02:59:08.875966072 CET6156080192.168.2.645.9.191.182
                        Jan 11, 2025 02:59:08.876224041 CET6156080192.168.2.645.9.191.182
                        Jan 11, 2025 02:59:08.879333973 CET6156180192.168.2.645.9.191.182
                        Jan 11, 2025 02:59:08.881089926 CET806156045.9.191.182192.168.2.6
                        Jan 11, 2025 02:59:08.884428024 CET806156145.9.191.182192.168.2.6
                        Jan 11, 2025 02:59:08.884732962 CET6156180192.168.2.645.9.191.182
                        Jan 11, 2025 02:59:08.884732962 CET6156180192.168.2.645.9.191.182
                        Jan 11, 2025 02:59:08.889559031 CET806156145.9.191.182192.168.2.6
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 02:56:17.758363962 CET5680953192.168.2.61.1.1.1
                        Jan 11, 2025 02:56:17.767798901 CET53568091.1.1.1192.168.2.6
                        Jan 11, 2025 02:56:36.673043013 CET53597681.1.1.1192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 11, 2025 02:56:17.758363962 CET192.168.2.61.1.1.10xbeb6Standard query (0)xianggrhen.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 11, 2025 02:56:17.767798901 CET1.1.1.1192.168.2.60xbeb6No error (0)xianggrhen.com45.9.191.182A (IP address)IN (0x0001)false
                        • xianggrhen.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.64971945.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:56:17.795520067 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.66138145.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:56:39.193893909 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.66150745.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:57:00.613398075 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.66155245.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:57:21.973362923 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.66155545.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:57:43.386213064 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.66155745.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:58:04.741334915 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.66155845.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:58:26.148809910 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        7192.168.2.66156045.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:58:47.508414030 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        8192.168.2.66156145.9.191.182804072C:\Users\user\Desktop\PqJockhBoA.exe
                        TimestampBytes transferredDirectionData
                        Jan 11, 2025 02:59:08.884732962 CET81OUTGET /basket/Snobzw.vdf HTTP/1.1
                        Host: xianggrhen.com
                        Connection: Keep-Alive


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:20:56:16
                        Start date:10/01/2025
                        Path:C:\Users\user\Desktop\PqJockhBoA.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\PqJockhBoA.exe"
                        Imagebase:0x3c0000
                        File size:1'202'816 bytes
                        MD5 hash:72D434D6D5ED6A8352796AB0DD4B275B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Reset < >
                          Memory Dump Source
                          • Source File: 00000000.00000002.4019597400.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_f10000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e7264a87fd0e318940557e50831da2dd59b2e739e3e7574ea50e33284740a9d4
                          • Instruction ID: 0597262b51f295ff24b76501ddc6c4fa10a68ab920cb4881dc5db427ad662026
                          • Opcode Fuzzy Hash: e7264a87fd0e318940557e50831da2dd59b2e739e3e7574ea50e33284740a9d4
                          • Instruction Fuzzy Hash: CC313870D01249DFDB14CFAAC580ADEBFF6AF48354F288029E909AB350DB749945DF90
                          Memory Dump Source
                          • Source File: 00000000.00000002.4019228050.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_bcd000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 16a28c538e80f15016706ac713b827a79d6d97d2ad35fde7d8f8d8be78201ff5
                          • Instruction ID: a2c7b68d1d435f01067d09b218b6eb32fbce4af487b19e12e4a19529e918a23a
                          • Opcode Fuzzy Hash: 16a28c538e80f15016706ac713b827a79d6d97d2ad35fde7d8f8d8be78201ff5
                          • Instruction Fuzzy Hash: AA21F175500240DFDB08DF14D9C0F16BBA5FB94324F20C5ADEA094A356C336E856CAA2
                          Memory Dump Source
                          • Source File: 00000000.00000002.4019228050.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_bcd000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 347ceff61f71c01d8d79cfdbd8358f6f0be4c31f492294fd5b1d002aa0560fbf
                          • Instruction ID: edccada55822863f1d4988ed86b2f382cffcaa8fb4fc1c9029aabbffb9c542fc
                          • Opcode Fuzzy Hash: 347ceff61f71c01d8d79cfdbd8358f6f0be4c31f492294fd5b1d002aa0560fbf
                          • Instruction Fuzzy Hash: 6511B176504280CFCB15CF10D9C4B16BFB1FB94324F24C5ADD9494B656C33AE856CBA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.4019228050.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_bcd000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f40c3ce221424d6b83e109e6f66fe582fb5f7d49474c7f98baf289606a9f31af
                          • Instruction ID: 77f025b0f0ea13cf9bcc00d208529d934c6c3047035344b56eebe8b54f57ea21
                          • Opcode Fuzzy Hash: f40c3ce221424d6b83e109e6f66fe582fb5f7d49474c7f98baf289606a9f31af
                          • Instruction Fuzzy Hash: 4D01A235109344AAE7108B65DDC4F67FBD8EF41724F1885AFEE094A286C2789C45CA72
                          Memory Dump Source
                          • Source File: 00000000.00000002.4019228050.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_bcd000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f13289240b15603b87c73dce7ce3ff05950b3645846b00950e3a832d9a12665d
                          • Instruction ID: 0d39dbf1a67bfdf86a7ffa0c7ffa5171ad921e7f8795695b110735db3a8ba7d1
                          • Opcode Fuzzy Hash: f13289240b15603b87c73dce7ce3ff05950b3645846b00950e3a832d9a12665d
                          • Instruction Fuzzy Hash: EFF062754053489EE7108B15D9C4B62FFD8EB91724F18C45AED484A686C2799C44CA71
                          Memory Dump Source
                          • Source File: 00000000.00000002.4019597400.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_f10000_PqJockhBoA.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f7b98f76a0abd7b60f3babb328799d58242cde2463ee55a87bcda25774a122f0
                          • Instruction ID: aa987a9c1e704db2493d7169af33407462f641540c0eb0210249dbc218aa667b
                          • Opcode Fuzzy Hash: f7b98f76a0abd7b60f3babb328799d58242cde2463ee55a87bcda25774a122f0
                          • Instruction Fuzzy Hash: B6E04F6320C005EF9744A76A9444BBE76F9EE86BD03B4449AF443C7222EE145D81BB76