Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AJ5zYYsisA.exe

Overview

General Information

Sample name:AJ5zYYsisA.exe
renamed because original name is a hash value
Original sample name:846b1a1780ef242a61828a428ce04a9d40c3a6bd02de90a3a06499895899fede.exe
Analysis ID:1588641
MD5:d522a48e0db195310ffe6dabf14d3c32
SHA1:83a4dfb28a5c9710ff812e7f568bf71316e33665
SHA256:846b1a1780ef242a61828a428ce04a9d40c3a6bd02de90a3a06499895899fede
Tags:exeuser-adrian__luca
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • AJ5zYYsisA.exe (PID: 1268 cmdline: "C:\Users\user\Desktop\AJ5zYYsisA.exe" MD5: D522A48E0DB195310FFE6DABF14D3C32)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-11T03:39:40.112285+010020197142Potentially Bad Traffic192.168.2.549704188.114.97.3443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: AJ5zYYsisA.exeAvira: detected
Source: https://dddotx.shopAvira URL Cloud: Label: malware
Source: https://dddotx.shop/Bish2.exe:Avira URL Cloud: Label: malware
Source: http://dddotx.shopAvira URL Cloud: Label: malware
Source: https://dddotx.shop/DLLL.dllAvira URL Cloud: Label: malware
Source: https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exeAvira URL Cloud: Label: malware
Source: https://dddotx.shop/Bish2.exeAvira URL Cloud: Label: malware
Source: AJ5zYYsisA.exeReversingLabs: Detection: 57%
Source: AJ5zYYsisA.exeVirustotal: Detection: 70%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
Source: AJ5zYYsisA.exeJoe Sandbox ML: detected
Source: AJ5zYYsisA.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: AJ5zYYsisA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: Bish.pdbH source: AJ5zYYsisA.exe
Source: Binary string: Bish.pdb source: AJ5zYYsisA.exe
Source: global trafficHTTP traffic detected: GET /Bish2.exe HTTP/1.1Host: dddotx.shopConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network trafficSuricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.5:49704 -> 188.114.97.3:443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /Bish2.exe HTTP/1.1Host: dddotx.shopConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: dddotx.shop
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 02:39:40 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCache-Control: max-age=14400CF-Cache-Status: EXPIREDReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MLRzVkZxkBwlscSIHoKu7G3bKcMDiKHppTREQI9MbpXXy9Q7zHLzffJtsaFhsKqGumd0MHiR5pBUwZtiM16DJMH0TbcJIvP7DZk9vYR%2F1jeztHl6CZSLmLBpqrg9og%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 900189a24c707cff-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2092&min_rtt=2056&rtt_var=844&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2826&recv_bytes=684&delivery_rate=1243611&cwnd=222&unsent_bytes=0&cid=8afedfee9c1450a5&ts=345&x=0"
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://dddotx.shop
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://dddotx.shopd
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dddotx.shop
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dddotx.shop/Bish2.exe
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dddotx.shop/Bish2.exe:
Source: AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dddotx.shop/DLLL.dll
Source: AJ5zYYsisA.exeString found in binary or memory: https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: AJ5zYYsisA.exe, 00000000.00000000.2096425331.000000000088A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBish.exe* vs AJ5zYYsisA.exe
Source: AJ5zYYsisA.exe, 00000000.00000002.2107246528.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs AJ5zYYsisA.exe
Source: AJ5zYYsisA.exeBinary or memory string: OriginalFilenameBish.exe* vs AJ5zYYsisA.exe
Source: AJ5zYYsisA.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal72.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AJ5zYYsisA.exe.logJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeMutant created: NULL
Source: AJ5zYYsisA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: AJ5zYYsisA.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: AJ5zYYsisA.exeReversingLabs: Detection: 57%
Source: AJ5zYYsisA.exeVirustotal: Detection: 70%
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeSection loaded: gpapi.dllJump to behavior
Source: AJ5zYYsisA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: AJ5zYYsisA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: AJ5zYYsisA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: Bish.pdbH source: AJ5zYYsisA.exe
Source: Binary string: Bish.pdb source: AJ5zYYsisA.exe
Source: AJ5zYYsisA.exeStatic PE information: 0xEF72C5EC [Sat Apr 20 06:06:36 2097 UTC]
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeMemory allocated: FA0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeMemory allocated: 4B40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe TID: 3128Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exe TID: 5844Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: AJ5zYYsisA.exe, 00000000.00000002.2107246528.0000000000D95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllzz
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeQueries volume information: C:\Users\user\Desktop\AJ5zYYsisA.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\AJ5zYYsisA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AJ5zYYsisA.exe58%ReversingLabsByteCode-MSIL.Trojan.Leonem
AJ5zYYsisA.exe71%VirustotalBrowse
AJ5zYYsisA.exe100%AviraHEUR/AGEN.1323738
AJ5zYYsisA.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://dddotx.shopd0%Avira URL Cloudsafe
https://dddotx.shop100%Avira URL Cloudmalware
https://dddotx.shop/Bish2.exe:100%Avira URL Cloudmalware
http://dddotx.shop100%Avira URL Cloudmalware
https://dddotx.shop/DLLL.dll100%Avira URL Cloudmalware
https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exe100%Avira URL Cloudmalware
https://dddotx.shop/Bish2.exe100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    dddotx.shop
    188.114.97.3
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://dddotx.shop/Bish2.exefalse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://dddotx.shop/DLLL.dll;https://dddotx.shop/Bish2.exeAJ5zYYsisA.exefalse
      • Avira URL Cloud: malware
      unknown
      https://dddotx.shopAJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      https://dddotx.shop/Bish2.exe:AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BD9000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://dddotx.shopdAJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BB9000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://dddotx.shopAJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BB9000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://dddotx.shop/DLLL.dllAJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, AJ5zYYsisA.exe, 00000000.00000002.2107985686.0000000002BA3000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        188.114.97.3
        dddotx.shopEuropean Union
        13335CLOUDFLARENETUSfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1588641
        Start date and time:2025-01-11 03:38:42 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 16s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:2
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:AJ5zYYsisA.exe
        renamed because original name is a hash value
        Original Sample Name:846b1a1780ef242a61828a428ce04a9d40c3a6bd02de90a3a06499895899fede.exe
        Detection:MAL
        Classification:mal72.winEXE@1/1@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 7
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Stop behavior analysis, all processes terminated
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.45
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
        • Execution Graph export aborted for target AJ5zYYsisA.exe, PID 1268 because it is empty
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        188.114.97.31SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
        • www.rgenerousrs.store/o362/
        suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
        • www.zkdamdjj.shop/swhs/
        k9OEsV37GE.exeGet hashmaliciousFormBookBrowse
        • www.einpisalpace.shop/8g74/?cNPH=WJ/rFpSuW7SUTonvHlYgJHet70+40/nSG+S456FFT70GKpWTD+yYW7KPXc3l6inPZ41lXlQU44ttBNcSIyPO/Awb2QEZq+eieNEXwOjUfdTJHvICblirwfj54bAbpLWz76fPuJmn0JFO&EtJTX=_JVX4ryxDRQpLJF
        wWXR5js3k2.exeGet hashmaliciousFormBookBrowse
        • www.supernutra01.online/rk61/
        NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
        • www.vh5g.sbs/rjsl/
        KSts9xW7qy.exeGet hashmaliciousFormBookBrowse
        • www.beylikduzu616161.xyz/2nga/?xP7x=Q2EbwnYhq4vEVEYxQpNjsu4gFlGHCs4lBliPtc8X0AIyDwowOCFGn/661E09vvaaF3LvgpjgW8Wvr6GWd63ULodNNE679jqiZ5mYQ2jjCrjO82Z0/3agI7E=&F4=Q0yHy
        GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
        • /api/get/dll
        DHL DOCS 2-0106-25.exeGet hashmaliciousFormBookBrowse
        • www.uzshou.world/ricr/
        Order Inquiry.exeGet hashmaliciousFormBookBrowse
        • www.cifasnc.info/8rr3/
        Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
        • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s-part-0017.t-0009.t-msedge.netsuBpo1g13Q.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        1297823757234143258.jsGet hashmaliciousStrela DownloaderBrowse
        • 13.107.246.45
        4N4nldx1wW.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        1487427797195518826.jsGet hashmaliciousStrela DownloaderBrowse
        • 13.107.246.45
        5by4QM3v89.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
        • 13.107.246.45
        23754232101540928500.jsGet hashmaliciousStrela DownloaderBrowse
        • 13.107.246.45
        rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
        • 13.107.246.45
        CGk5FtIq0N.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        wOBmA8bj8d.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        dddotx.shoprQuotation.exeGet hashmaliciousLokibot, PureLog StealerBrowse
        • 172.67.153.63
        XE5p2qNoWt.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
        • 104.21.12.202
        6SQADa3zKv.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
        • 172.67.153.63
        Quotation.exeGet hashmaliciousLokibot, PureLog StealerBrowse
        • 104.21.12.202
        rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
        • 188.114.96.3
        1e#U0414.exeGet hashmaliciousLokibotBrowse
        • 188.114.96.3
        (PO403810)_VOLEX_doc.exeGet hashmaliciousLokibotBrowse
        • 188.114.97.3
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUS1SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
        • 104.21.95.160
        SpCuEoekPa.exeGet hashmaliciousFormBookBrowse
        • 104.21.64.1
        suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
        • 188.114.97.3
        4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
        • 104.21.80.1
        n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
        • 104.21.80.1
        njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
        • 104.21.16.1
        AxKxwW9WGa.exeGet hashmaliciousFormBookBrowse
        • 172.67.186.192
        k9OEsV37GE.exeGet hashmaliciousFormBookBrowse
        • 104.21.96.1
        rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
        • 104.21.80.1
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        3b5074b1b5d032e5620f69f9f700ff0e4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
        • 188.114.97.3
        n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
        • 188.114.97.3
        njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
        • 188.114.97.3
        KtPCqWWnqM.exeGet hashmaliciousUnknownBrowse
        • 188.114.97.3
        YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
        • 188.114.97.3
        KtPCqWWnqM.exeGet hashmaliciousUnknownBrowse
        • 188.114.97.3
        ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
        • 188.114.97.3
        6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
        • 188.114.97.3
        4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
        • 188.114.97.3
        No context
        Process:C:\Users\user\Desktop\AJ5zYYsisA.exe
        File Type:CSV text
        Category:dropped
        Size (bytes):847
        Entropy (8bit):5.345615485833535
        Encrypted:false
        SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKlYHKh3oPtHo6hAHKzeR
        MD5:EEEC189088CC5F1F69CEE62A3BE59EA2
        SHA1:250F25CE24458FC0C581FDDF59FAA26D557844C5
        SHA-256:5345D03A7E6C9436497BA4120DE1F941800F2522A21DE70CEA6DB1633D356E11
        SHA-512:2E017FD29A505BCAC78C659DE10E0D869C42CE3B057840680B23961DBCB1F82B1CC7094C87CEEB8FA14826C4D8CFED88DC647422A4A3FA36C4AAFD6430DAEFE5
        Malicious:true
        Reputation:moderate, very likely benign file
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):4.14477814728973
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:AJ5zYYsisA.exe
        File size:101'376 bytes
        MD5:d522a48e0db195310ffe6dabf14d3c32
        SHA1:83a4dfb28a5c9710ff812e7f568bf71316e33665
        SHA256:846b1a1780ef242a61828a428ce04a9d40c3a6bd02de90a3a06499895899fede
        SHA512:6c70b5014807a03448a1d8b8aec3a2dc95e8e6c72c3a1313674bce278e94a7cd935dfc8375ad0c7fe92d5eff12f46b1fb81e971aafc70b83582c82349b57a46b
        SSDEEP:384:SmsWV1SRxW+dwMDS3b7202OtaiqLhSp1Xtff9vwEG9/XwJwq6uJfq2GSLwqX9vwt:SdiAZdwPLLNT0a22GZ2GzmW19
        TLSH:5BA3B330B6578721C52B1E31C8AD755C0372AF85A923DA5FE88C33799BF23C74A91B52
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....r...............0..x..........n.... ........@.. ....................................`................................
        Icon Hash:1a5ada12a98c3689
        Entrypoint:0x40976e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xEF72C5EC [Sat Apr 20 06:06:36 2097 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x97200x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x10e54.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c0000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x96d40x1c.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x77740x78006edf62815fb84feb6652ef2deb7c7accFalse0.35771484375data5.38635854985906IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xa0000x10e540x1100083d61dc8e888d40f171008f7643aa345False0.05658318014705882data2.6807684242744467IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x1c0000xc0x2003ee5eb55d2c84cad34ece42377c6f250False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xa1300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.046891636105524666
        RT_GROUP_ICON0x1a9580x14data1.15
        RT_VERSION0x1a96c0x2fcdata0.43586387434554974
        RT_MANIFEST0x1ac680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
        2025-01-11T03:39:40.112285+01002019714ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile2192.168.2.549704188.114.97.3443TCP
        TimestampSource PortDest PortSource IPDest IP
        Jan 11, 2025 03:39:39.312129974 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:39.312175035 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:39.313581944 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:39.319575071 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:39.319588900 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:39.786020041 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:39.786112070 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:39.790076017 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:39.790082932 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:39.790395975 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:39.835922003 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:39.841017962 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:39.887329102 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:40.112359047 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:40.112570047 CET44349704188.114.97.3192.168.2.5
        Jan 11, 2025 03:39:40.113570929 CET49704443192.168.2.5188.114.97.3
        Jan 11, 2025 03:39:40.132467031 CET49704443192.168.2.5188.114.97.3
        TimestampSource PortDest PortSource IPDest IP
        Jan 11, 2025 03:39:39.294600964 CET6392553192.168.2.51.1.1.1
        Jan 11, 2025 03:39:39.306674004 CET53639251.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 11, 2025 03:39:39.294600964 CET192.168.2.51.1.1.10x768bStandard query (0)dddotx.shopA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 11, 2025 03:39:39.306674004 CET1.1.1.1192.168.2.50x768bNo error (0)dddotx.shop188.114.97.3A (IP address)IN (0x0001)false
        Jan 11, 2025 03:39:39.306674004 CET1.1.1.1192.168.2.50x768bNo error (0)dddotx.shop188.114.96.3A (IP address)IN (0x0001)false
        Jan 11, 2025 03:39:50.581609011 CET1.1.1.1192.168.2.50xc2edNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
        Jan 11, 2025 03:39:50.581609011 CET1.1.1.1192.168.2.50xc2edNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
        • dddotx.shop
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.549704188.114.97.34431268C:\Users\user\Desktop\AJ5zYYsisA.exe
        TimestampBytes transferredDirectionData
        2025-01-11 02:39:39 UTC70OUTGET /Bish2.exe HTTP/1.1
        Host: dddotx.shop
        Connection: Keep-Alive
        2025-01-11 02:39:40 UTC823INHTTP/1.1 404 Not Found
        Date: Sat, 11 Jan 2025 02:39:40 GMT
        Content-Type: text/html; charset=iso-8859-1
        Transfer-Encoding: chunked
        Connection: close
        Cache-Control: max-age=14400
        CF-Cache-Status: EXPIRED
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MLRzVkZxkBwlscSIHoKu7G3bKcMDiKHppTREQI9MbpXXy9Q7zHLzffJtsaFhsKqGumd0MHiR5pBUwZtiM16DJMH0TbcJIvP7DZk9vYR%2F1jeztHl6CZSLmLBpqrg9og%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 900189a24c707cff-EWR
        alt-svc: h3=":443"; ma=86400
        server-timing: cfL4;desc="?proto=TCP&rtt=2092&min_rtt=2056&rtt_var=844&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2826&recv_bytes=684&delivery_rate=1243611&cwnd=222&unsent_bytes=0&cid=8afedfee9c1450a5&ts=345&x=0"
        2025-01-11 02:39:40 UTC213INData Raw: 63 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 42 69 73 68 32 2e 65 78 65 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a
        Data Ascii: cf<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /Bish2.exe was not found on this server.</p></body></html>
        2025-01-11 02:39:40 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:21:39:37
        Start date:10/01/2025
        Path:C:\Users\user\Desktop\AJ5zYYsisA.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\AJ5zYYsisA.exe"
        Imagebase:0x870000
        File size:101'376 bytes
        MD5 hash:D522A48E0DB195310FFE6DABF14D3C32
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Reset < >
          Memory Dump Source
          • Source File: 00000000.00000002.2107677888.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_fa0000_AJ5zYYsisA.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5f85c3198a07f1d54078f941279d435820a62c3c636c7ac208fcbfe20033b57f
          • Instruction ID: d5cbd507831bfa25e374ff370601693066aa1bb3c28cffd43113eca069abd439
          • Opcode Fuzzy Hash: 5f85c3198a07f1d54078f941279d435820a62c3c636c7ac208fcbfe20033b57f
          • Instruction Fuzzy Hash: 2C4159B5D05208DFCB04DFA9E8446EDBBB6BF8A311F20902AE805B7315DB745846EF44
          Memory Dump Source
          • Source File: 00000000.00000002.2107677888.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_fa0000_AJ5zYYsisA.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bdaf21b72ef1a1b56427a573e04d94436ff538e2ff405f5eb35301867805896c
          • Instruction ID: 85712c9e5b08c94402c6bdab70d28e7e317c2d226174661551a08bb5160fec31
          • Opcode Fuzzy Hash: bdaf21b72ef1a1b56427a573e04d94436ff538e2ff405f5eb35301867805896c
          • Instruction Fuzzy Hash: 2E4117B5D05218DFCB04DFA9E8446EDBBB6BF8A311F209029E809B7315DB746845EF44
          Memory Dump Source
          • Source File: 00000000.00000002.2107677888.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_fa0000_AJ5zYYsisA.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 411a742170204324c3b93c70b3de3e79676f8e03a1cc32643311001362bc362c
          • Instruction ID: 94301645dc845cef42eeba9fb1574cc3e2bbadad689091b3949a941c19720b0e
          • Opcode Fuzzy Hash: 411a742170204324c3b93c70b3de3e79676f8e03a1cc32643311001362bc362c
          • Instruction Fuzzy Hash: 4F214BB5D0924CCFCB14CFA5E884AEDBBF6BF8A310F24912AD815B7255DB705881EB50
          Memory Dump Source
          • Source File: 00000000.00000002.2107677888.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_fa0000_AJ5zYYsisA.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f58bb3ac92bd1931e8f826bbee965f7b32b0b2fa879caae96d0f96e7fe535c12
          • Instruction ID: b00e3f70a156c6e977025346821480573b3418c2cd1115e703601e6405b35a4d
          • Opcode Fuzzy Hash: f58bb3ac92bd1931e8f826bbee965f7b32b0b2fa879caae96d0f96e7fe535c12
          • Instruction Fuzzy Hash: BB2108B5D45248CFCB14DFA4E994AEDBBB5BF4A304F209029D415B7251DB705881EB50
          Memory Dump Source
          • Source File: 00000000.00000002.2107677888.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_fa0000_AJ5zYYsisA.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f004f4b4f0ef974c51bd0fab6b56bface94fe4fdc2e765d152340cb5ade84886
          • Instruction ID: e681f02986022bd97176fd5ad94e21203865d82697d853ba78245c51c837b2da
          • Opcode Fuzzy Hash: f004f4b4f0ef974c51bd0fab6b56bface94fe4fdc2e765d152340cb5ade84886
          • Instruction Fuzzy Hash: DCF0F676C8D3048FC7008B70E8097F9B775AF8B301F14646DD50A635A2EFB81559FA41
          Memory Dump Source
          • Source File: 00000000.00000002.2107677888.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_fa0000_AJ5zYYsisA.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 87a025ff6c7b64f2952081667c1ab6d0017fb32f32b829456c745b37e62b0a41
          • Instruction ID: 63a8ba2af4946919e18cd0598551f6adb76b5db3979f0c40a027bb5ec2266982
          • Opcode Fuzzy Hash: 87a025ff6c7b64f2952081667c1ab6d0017fb32f32b829456c745b37e62b0a41
          • Instruction Fuzzy Hash: 17E0C26084E3486FC742CBB4AC13FAC7B30AB42305F0401DED080631E1D6641D02D746
          Memory Dump Source
          • Source File: 00000000.00000002.2107677888.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_fa0000_AJ5zYYsisA.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0d627e3e3ad03ed49cd99b5be4ee674f469156e308b67395bb2001637ffa8b28
          • Instruction ID: 8be1f103953937ca53aee42e60987aaaabcc29d4476f672fc6705cadf664c2ed
          • Opcode Fuzzy Hash: 0d627e3e3ad03ed49cd99b5be4ee674f469156e308b67395bb2001637ffa8b28
          • Instruction Fuzzy Hash: 79C0127084631CABC744DBA5E802F9DB768DB42315F4001A8A50423290DB752D50E695