Windows
Analysis Report
msit.msi
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- msiexec.exe (PID: 992 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ msit.msi" MD5: E5DA170027542E25EDE42FC54C929077)
- msiexec.exe (PID: 416 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 6036 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 031803D E2C6D91C23 BF4AB9F8F3 8A8DE MD5: 9D09DC1EDA745A5F87553048E57620CF) - MSIAEB.tmp (PID: 2248 cmdline:
"C:\Window s\Installe r\MSIAEB.t mp" MD5: 4D82074854750FDBA89D76624CC1E6F6) - dxdiag.exe (PID: 4828 cmdline:
"C:\Window s\SysWOW64 \dxdiag.ex e" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF) - dxdiag.exe (PID: 1708 cmdline:
"C:\Window s\SysWOW64 \dxdiag.ex e" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF)
- cleanup
{"C2 url": ["fixxyplanterv.click", "print-vexer.biz", "se-blurry.biz", "dwell-exclaim.biz", "zinc-sneark.biz", "impend-differ.biz", "dare-curbys.biz", "covery-mover.biz", "formy-spill.biz"], "Build id": "ZqchOa--new"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:29:11.533777+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49711 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:12.760819+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49717 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:13.982385+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49728 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:15.144517+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49734 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:16.338516+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49741 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:18.004044+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49753 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:19.579194+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49765 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:21.624274+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49781 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:29:12.199354+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49711 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:13.263540+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49717 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:21.949582+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49781 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:29:12.199354+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49711 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:29:13.263540+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49717 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:29:16.950627+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49741 | 172.67.134.197 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 6_2_00415971 |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 6_2_0040D866 | |
Source: | Code function: | 6_2_0043C8F0 | |
Source: | Code function: | 6_2_00415971 | |
Source: | Code function: | 6_2_0043CA10 | |
Source: | Code function: | 6_2_0040E458 | |
Source: | Code function: | 6_2_0040E458 | |
Source: | Code function: | 6_2_0040E458 | |
Source: | Code function: | 6_2_0043D400 | |
Source: | Code function: | 6_2_0043D400 | |
Source: | Code function: | 6_2_0043D400 | |
Source: | Code function: | 6_2_0040CDD7 | |
Source: | Code function: | 6_2_00438640 | |
Source: | Code function: | 6_2_004227B0 | |
Source: | Code function: | 6_2_0041805C | |
Source: | Code function: | 6_2_00409070 | |
Source: | Code function: | 6_2_00425800 | |
Source: | Code function: | 6_2_0041C802 | |
Source: | Code function: | 6_2_00425820 | |
Source: | Code function: | 6_2_004180EC | |
Source: | Code function: | 6_2_004238F0 | |
Source: | Code function: | 6_2_0040D136 | |
Source: | Code function: | 6_2_004029C0 | |
Source: | Code function: | 6_2_0040D9D6 | |
Source: | Code function: | 6_2_0042A9D5 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004231F6 | |
Source: | Code function: | 6_2_004231F6 | |
Source: | Code function: | 6_2_0041A9B0 | |
Source: | Code function: | 6_2_0041CA48 | |
Source: | Code function: | 6_2_0043BA70 | |
Source: | Code function: | 6_2_0043BA70 | |
Source: | Code function: | 6_2_0042AAC6 | |
Source: | Code function: | 6_2_0042AAD7 | |
Source: | Code function: | 6_2_004082F0 | |
Source: | Code function: | 6_2_004362F0 | |
Source: | Code function: | 6_2_004362F0 | |
Source: | Code function: | 6_2_00426282 | |
Source: | Code function: | 6_2_0041DA80 | |
Source: | Code function: | 6_2_0042AA8A | |
Source: | Code function: | 6_2_00432AA0 | |
Source: | Code function: | 6_2_004022B0 | |
Source: | Code function: | 6_2_0041BB20 | |
Source: | Code function: | 6_2_0041C330 | |
Source: | Code function: | 6_2_00436BE4 | |
Source: | Code function: | 6_2_00407450 | |
Source: | Code function: | 6_2_00407450 | |
Source: | Code function: | 6_2_004264F2 | |
Source: | Code function: | 6_2_0043CCF0 | |
Source: | Code function: | 6_2_0043CCF0 | |
Source: | Code function: | 6_2_0043CCF0 | |
Source: | Code function: | 6_2_0040A4FC | |
Source: | Code function: | 6_2_00416CBD | |
Source: | Code function: | 6_2_0042456F | |
Source: | Code function: | 6_2_00421D73 | |
Source: | Code function: | 6_2_00421D73 | |
Source: | Code function: | 6_2_00438D70 | |
Source: | Code function: | 6_2_00438D70 | |
Source: | Code function: | 6_2_00417D74 | |
Source: | Code function: | 6_2_0042A58E | |
Source: | Code function: | 6_2_00428DB0 | |
Source: | Code function: | 6_2_0041AEC5 | |
Source: | Code function: | 6_2_0040DEE9 | |
Source: | Code function: | 6_2_0043B6F0 | |
Source: | Code function: | 6_2_0041676A | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_0043A71E | |
Source: | Code function: | 6_2_00409730 | |
Source: | Code function: | 6_2_0041AFD8 | |
Source: | Code function: | 6_2_0042456F |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 6_2_004303F0 |
Source: | Code function: | 6_2_004303F0 |
Source: | Code function: | 6_2_00431262 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Code function: | 6_3_028FA4A4 | |
Source: | Code function: | 6_2_00435870 | |
Source: | Code function: | 6_2_00415971 | |
Source: | Code function: | 6_2_00408920 | |
Source: | Code function: | 6_2_0043CA10 | |
Source: | Code function: | 6_2_0040AAE0 | |
Source: | Code function: | 6_2_00420B10 | |
Source: | Code function: | 6_2_0040E458 | |
Source: | Code function: | 6_2_0043D400 | |
Source: | Code function: | 6_2_00425480 | |
Source: | Code function: | 6_2_00435530 | |
Source: | Code function: | 6_2_00438640 | |
Source: | Code function: | 6_2_0043A7F4 | |
Source: | Code function: | 6_2_004227B0 | |
Source: | Code function: | 6_2_0043D040 | |
Source: | Code function: | 6_2_00414860 | |
Source: | Code function: | 6_2_00433875 | |
Source: | Code function: | 6_2_00425800 | |
Source: | Code function: | 6_2_00425820 | |
Source: | Code function: | 6_2_0042683C | |
Source: | Code function: | 6_2_0041D0C0 | |
Source: | Code function: | 6_2_004230C0 | |
Source: | Code function: | 6_2_004238F0 | |
Source: | Code function: | 6_2_00403950 | |
Source: | Code function: | 6_2_0040F116 | |
Source: | Code function: | 6_2_0040E122 | |
Source: | Code function: | 6_2_0040B124 | |
Source: | Code function: | 6_2_004281C0 | |
Source: | Code function: | 6_2_0040D9D6 | |
Source: | Code function: | 6_2_0042A9D5 | |
Source: | Code function: | 6_2_004061E0 | |
Source: | Code function: | 6_2_004181E9 | |
Source: | Code function: | 6_2_004231F6 | |
Source: | Code function: | 6_2_00405980 | |
Source: | Code function: | 6_2_00436980 | |
Source: | Code function: | 6_2_00414860 | |
Source: | Code function: | 6_2_0043BA70 | |
Source: | Code function: | 6_2_00412200 | |
Source: | Code function: | 6_2_00426A10 | |
Source: | Code function: | 6_2_00419219 | |
Source: | Code function: | 6_2_0042AAC6 | |
Source: | Code function: | 6_2_004092D0 | |
Source: | Code function: | 6_2_0042AAD7 | |
Source: | Code function: | 6_2_004082F0 | |
Source: | Code function: | 6_2_004362F0 | |
Source: | Code function: | 6_2_0041DA80 | |
Source: | Code function: | 6_2_0042AA8A | |
Source: | Code function: | 6_2_00438A90 | |
Source: | Code function: | 6_2_00427365 | |
Source: | Code function: | 6_2_0040FB71 | |
Source: | Code function: | 6_2_00404300 | |
Source: | Code function: | 6_2_0041BB20 | |
Source: | Code function: | 6_2_0041C330 | |
Source: | Code function: | 6_2_00436BE4 | |
Source: | Code function: | 6_2_00402B90 | |
Source: | Code function: | 6_2_00407450 | |
Source: | Code function: | 6_2_00404C50 | |
Source: | Code function: | 6_2_00434463 | |
Source: | Code function: | 6_2_00415460 | |
Source: | Code function: | 6_2_00434C70 | |
Source: | Code function: | 6_2_00427C0F | |
Source: | Code function: | 6_2_0041D4C0 | |
Source: | Code function: | 6_2_0043CCF0 | |
Source: | Code function: | 6_2_0041EC80 | |
Source: | Code function: | 6_2_0042E480 | |
Source: | Code function: | 6_2_00416CBD | |
Source: | Code function: | 6_2_0042456F | |
Source: | Code function: | 6_2_00421D73 | |
Source: | Code function: | 6_2_00438D70 | |
Source: | Code function: | 6_2_00417D74 | |
Source: | Code function: | 6_2_00424DD0 | |
Source: | Code function: | 6_2_00405E40 | |
Source: | Code function: | 6_2_0041BE71 | |
Source: | Code function: | 6_2_00406670 | |
Source: | Code function: | 6_2_0040EE70 | |
Source: | Code function: | 6_2_0041CE00 | |
Source: | Code function: | 6_2_00434ED0 | |
Source: | Code function: | 6_2_004216E0 | |
Source: | Code function: | 6_2_0043B6F0 | |
Source: | Code function: | 6_2_00415FA1 | |
Source: | Code function: | 6_2_00417742 | |
Source: | Code function: | 6_2_00402F50 | |
Source: | Code function: | 6_2_0041676A | |
Source: | Code function: | 6_2_00419710 | |
Source: | Code function: | 6_2_00411712 | |
Source: | Code function: | 6_2_0040C72B | |
Source: | Code function: | 6_2_00409730 | |
Source: | Code function: | 6_2_004277E0 | |
Source: | Code function: | 6_2_0043B7E0 | |
Source: | Code function: | 6_2_0042779B | |
Source: | Code function: | 6_2_00415FA1 | |
Source: | Code function: | 6_2_0041A7A0 | |
Source: | Code function: | 6_2_0042456F |
Source: | Dropped File: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Code function: | 6_2_00435870 |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 6_3_028F6912 | |
Source: | Code function: | 6_3_0291D2FD | |
Source: | Code function: | 6_2_00442905 | |
Source: | Code function: | 6_2_0044592C | |
Source: | Code function: | 6_2_00438A0E | |
Source: | Code function: | 6_2_00445A3D | |
Source: | Code function: | 6_2_004423ED | |
Source: | Code function: | 6_2_0043B692 |
Persistence and Installation Behavior |
---|
Source: | Executable created and started: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 6_2_00439E40 |
Source: | Process created: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 4_2_00007FF78E2E5D6C |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Replication Through Removable Media | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 311 Process Injection | 121 Masquerading | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | LSASS Memory | 221 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 311 Process Injection | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 11 Peripheral Device Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 3 Obfuscated Files or Information | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 24 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 File Deletion | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
58% | Virustotal | Browse | ||
55% | ReversingLabs | Win64.Spyware.Lummastealer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
63% | ReversingLabs | Win32.Exploit.LummaC |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fixxyplanterv.click | 172.67.134.197 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.134.197 | fixxyplanterv.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589838 |
Start date and time: | 2025-01-13 08:28:11 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | msit.msi |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winMSI@10/25@1/1 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.245.163.56
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target MSIAEB.tmp, PID 2248 because there are no executed function
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
02:29:11 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fixxyplanterv.click | Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Babadeda, DanaBot, KeyLogger, LummaC Stealer, Poverty Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Windows\Installer\MSI602.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | PureCrypter | Browse | |||
Get hash | malicious | Matanbuchus | Browse |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | modified |
Size (bytes): | 863 |
Entropy (8bit): | 5.5270055721306175 |
Encrypted: | false |
SSDEEP: | 24:r/BMV8TvbPQjp6eSGV8Tv6V8Tv2pUn4oOYDhiSs6ao7id:7i6oke5h447YD8Ss6asW |
MD5: | B6A596CC7D1F941FC4416D7E9540519C |
SHA1: | BA2BE5D5E48DA96F793F2E3D3312163CAC109374 |
SHA-256: | CDC892359E93C912ABC6196914DC8ED964763433DEBD72542C9E35DA0A59965E |
SHA-512: | C5D7EAFE353F5D5B3D45928A2D67F95A3A2B884232C73DF6C69C6CAAB22C791D2E8B9DF3E78B3E8891C1F9729AD287EBC9E108889771FD33A4C5B7E73EE45A6A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16847872 |
Entropy (8bit): | 7.611938145565435 |
Encrypted: | false |
SSDEEP: | 393216:LPF3zv8Zrqb+CUuubX26jytnTPjnXcBv9k2VvOTp:JzwqNUHytvnMd9Z |
MD5: | 18577F68754F3E2703CDCA2DF9BA65FF |
SHA1: | 8D8846470510B1B6F81C0725975C7C3589568BB3 |
SHA-256: | 413C17F73A0831D6AE209E491856A66E07E8C0AF70E7E06F68A7B7570CCB3A95 |
SHA-512: | EB238A258B0DFE40716C2A8BC847951ABBAC4E7224ECEFCB13BE559A63CC39E6645E406764991CB60B87AA082196B890FF78C3C25C659B851EB02C4064E8EAEC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1201504 |
Entropy (8bit): | 6.4558508565404535 |
Encrypted: | false |
SSDEEP: | 24576:h4FsQxRqkY1ngOktwC2Tec+4VGWSlnH/YrjPWqTIUGFUrHtAkJMsFUh29BKjxm:a2QxNwCsec+4VGWSlnfYvOjUGFUrHtA2 |
MD5: | 03CC8828BB0E0105915B7695B1EC8D88 |
SHA1: | CBF8EC531EA7E3EE58B51BD642F8BFABDC759EE1 |
SHA-256: | 0E1491AE7344F3A5EC824732648CCDDA19B271D6F01471793BF292840FC83B5E |
SHA-512: | 593A76166EB6CE2E3537B0D93E216DAEF12E4AB5B181A194B55A90B39A1AF2E0374C4EC3833A000530425319A003CD1A648489640FCCAF108061EBEA1D9CB1E7 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1021792 |
Entropy (8bit): | 6.608380087035959 |
Encrypted: | false |
SSDEEP: | 24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC |
MD5: | EC6EBF65FE4F361A73E473F46730E05C |
SHA1: | 01F946DFBF773F977AF5ADE7C27FFFC7FE311149 |
SHA-256: | D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F |
SHA-512: | E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 942 |
Entropy (8bit): | 5.3743474005382765 |
Encrypted: | false |
SSDEEP: | 24:r6BMV8TvbPQjnu65SYRouKLjWZpURoOYDhiSKzao7i0l:Wi6oVBiLjeS7YD8SKzasX |
MD5: | 95F0D09B8E996DF6C1D095A2E6872F67 |
SHA1: | C12CB94FADD56FECB351647D0EC88A56471EB5C7 |
SHA-256: | 169C4A86C9916069F6D104890A14F80D6D48155D5183BEC64943EAB3D96EBAB4 |
SHA-512: | 1E62FA06515786B94573D1A9F8F56EE82EAF79BB4E454CA6D38E1CB0F281831434CB17CCE680D8DE0FBE6A3D253DCAC69B53EF813EC6FF78BD761EAEE1687F24 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13084160 |
Entropy (8bit): | 7.767097954057833 |
Encrypted: | false |
SSDEEP: | 196608:hL1kxR9F9KENR9N4bQOZNxVs0eb+CwRVu4fpbr7vOSPFjytXwt4TPnqunXcHF91v:uF3zv8Zrqb+CUuubX26jytnTPjnXcBv |
MD5: | 4D82074854750FDBA89D76624CC1E6F6 |
SHA1: | 1CAB8150956317418F64E67692072CAC8472B75B |
SHA-256: | 019CF1AAD1F8D4F1B5DAE3AA609B2B53CFFC3C7894B58B9F0B225868AED7342D |
SHA-512: | 068BD8C1DB17C4DEF612618D463239F002E8F4712691A8FC9163215BDAA7BC5306AA861C396438C647E7B839C2C67C5709B25E0695E1BAA668AA100310255F9D |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.16232893070391 |
Encrypted: | false |
SSDEEP: | 12:JSbX72FjNAGiLIlHVRpzh/7777777777777777777777777vDHF/Y856bQp01l0G:J7QI538j8F |
MD5: | A037DDE7434A714359AC91D9BCBB73B5 |
SHA1: | E6E54D34CFFD15F2DFC25F6591BC72815C881CFF |
SHA-256: | D849B3C722764CD734D828C79C7E5DD345ACF93C1F2E5CBB1BF66B544AD252A4 |
SHA-512: | D19AA5CF4994574303D847293D150A79579708B4821EC255B3A75B9D3D35E5225AD202680FD4D24644C23A0CD9806EBBDC79F41ACED29064DCDA61FA27B1FB8B |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5716020855141486 |
Encrypted: | false |
SSDEEP: | 48:i8PhUuRc06WXJeFT5dAdpSkdHAEkrCynGrVM+dpSkdTTd:NhU11FTDyGRCoGv/ |
MD5: | B8FA65AFB5DDD7B61D99D622083560F6 |
SHA1: | C0186F4D5593EA35936EA89F02E0F6C5D029065D |
SHA-256: | E1AF8E80FC2E2204C1C65B928357147E99D7D1B9E9E14892D9A656B035CDE3B9 |
SHA-512: | 1A55EFDE09A5282D2C48D8B17C58BB88334C6104650C78518275142C1E1E7AB524B15A11AD2E1B20B12CE484C18030F8E7458CE1E05D61E13F791DC56E50C0D1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 360000 |
Entropy (8bit): | 5.362985130311034 |
Encrypted: | false |
SSDEEP: | 1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauR:zTtbmkExhMJCIpEG |
MD5: | 169A7E5B5C366E7E7CAEA92D4FAD1BEB |
SHA1: | DB7730B83851555D0B4C4789C1CFBF2619E53D78 |
SHA-256: | 43C02F9F7378BD3DCBF78D805A1B4ECC347BEAA38A1F20917E09AA4C325611A1 |
SHA-512: | A1B3D565430CB20B6B81A76B84F8876FF2F795726C31080CA13E2854CD255D1A64F147DFE5EC1C7F80D2C69DD3CE1C9B12EF023093E9A5A5698ED7E6F818BE5F |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.06852653289585642 |
Encrypted: | false |
SSDEEP: | 6:2/9LG7iVCnLG7iVrKOzPLHKOIs8tkGMdUrMtIWstoVky6l0t/:2F0i8n0itFzDHF/Y856Dx01 |
MD5: | AD44AE53DB82B181D75735395EB7675B |
SHA1: | 982AC3B94AC655DA23D5CE07F497E07811DA3573 |
SHA-256: | E06F8146FBA0D47EF7DFDAFB25581B7EF264ABC21877F6502AEBC9826FD88FB2 |
SHA-512: | A8041CEDF88B53BF2436244A7C6B7F4E65361FF2418302E2C4B26E5E139FEECA6A3CEFF6B29F4F068A766AD269F0F1471F3EEFED9754939A5F9C9C9080B693C7 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5716020855141486 |
Encrypted: | false |
SSDEEP: | 48:i8PhUuRc06WXJeFT5dAdpSkdHAEkrCynGrVM+dpSkdTTd:NhU11FTDyGRCoGv/ |
MD5: | B8FA65AFB5DDD7B61D99D622083560F6 |
SHA1: | C0186F4D5593EA35936EA89F02E0F6C5D029065D |
SHA-256: | E1AF8E80FC2E2204C1C65B928357147E99D7D1B9E9E14892D9A656B035CDE3B9 |
SHA-512: | 1A55EFDE09A5282D2C48D8B17C58BB88334C6104650C78518275142C1E1E7AB524B15A11AD2E1B20B12CE484C18030F8E7458CE1E05D61E13F791DC56E50C0D1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73728 |
Entropy (8bit): | 0.1389890362895574 |
Encrypted: | false |
SSDEEP: | 24:PacTx+dpipV+dH+dpipV+dHAEV+/jCynG+leVgwGgItQH5MF+Q7:ScT4dpSkdedpSkdHAEkrCynGrVMF |
MD5: | D874BAB7E21F879CBD088F9E81750CB9 |
SHA1: | 50678FCA5BDA644ECD1674F13F847265A686A6CA |
SHA-256: | 91C2EFBDC9EEE6E892923C310F317E1A80EC006676E35E703AF7737F3840A122 |
SHA-512: | 465B4DB51938E650A02DEF14CA8B6D7B917A24EA30131554A206C647D59B336D52947651EA37B4B832C1D41CAB93A50C9F0705D227A26A73E356FDF1CB450739 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.258678752436576 |
Encrypted: | false |
SSDEEP: | 48:w9cuCDBO+CFXJfT5jAdpSkdHAEkrCynGrVM+dpSkdTTd:kchO3T9yGRCoGv/ |
MD5: | A9F28E83F5185D85C77B8B3289E4B618 |
SHA1: | 8BB37DFA46D7A34AFE105445EFE799A775B7472B |
SHA-256: | 59BFC10F2F62CE56962116F84BA96AF775C95F8C1ED08D08DD8AD64DB996A92F |
SHA-512: | ABD63B1F34977EBE0715ABD3B19424909D2950B2675B53907C374DE346FF530A4C8AFFA7C8AD2EB70B50C4C581AB02F8B2B52EE1222D7EB4EA6C7CA284FC4EC3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.258678752436576 |
Encrypted: | false |
SSDEEP: | 48:w9cuCDBO+CFXJfT5jAdpSkdHAEkrCynGrVM+dpSkdTTd:kchO3T9yGRCoGv/ |
MD5: | A9F28E83F5185D85C77B8B3289E4B618 |
SHA1: | 8BB37DFA46D7A34AFE105445EFE799A775B7472B |
SHA-256: | 59BFC10F2F62CE56962116F84BA96AF775C95F8C1ED08D08DD8AD64DB996A92F |
SHA-512: | ABD63B1F34977EBE0715ABD3B19424909D2950B2675B53907C374DE346FF530A4C8AFFA7C8AD2EB70B50C4C581AB02F8B2B52EE1222D7EB4EA6C7CA284FC4EC3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.5716020855141486 |
Encrypted: | false |
SSDEEP: | 48:i8PhUuRc06WXJeFT5dAdpSkdHAEkrCynGrVM+dpSkdTTd:NhU11FTDyGRCoGv/ |
MD5: | B8FA65AFB5DDD7B61D99D622083560F6 |
SHA1: | C0186F4D5593EA35936EA89F02E0F6C5D029065D |
SHA-256: | E1AF8E80FC2E2204C1C65B928357147E99D7D1B9E9E14892D9A656B035CDE3B9 |
SHA-512: | 1A55EFDE09A5282D2C48D8B17C58BB88334C6104650C78518275142C1E1E7AB524B15A11AD2E1B20B12CE484C18030F8E7458CE1E05D61E13F791DC56E50C0D1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 1.258678752436576 |
Encrypted: | false |
SSDEEP: | 48:w9cuCDBO+CFXJfT5jAdpSkdHAEkrCynGrVM+dpSkdTTd:kchO3T9yGRCoGv/ |
MD5: | A9F28E83F5185D85C77B8B3289E4B618 |
SHA1: | 8BB37DFA46D7A34AFE105445EFE799A775B7472B |
SHA-256: | 59BFC10F2F62CE56962116F84BA96AF775C95F8C1ED08D08DD8AD64DB996A92F |
SHA-512: | ABD63B1F34977EBE0715ABD3B19424909D2950B2675B53907C374DE346FF530A4C8AFFA7C8AD2EB70B50C4C581AB02F8B2B52EE1222D7EB4EA6C7CA284FC4EC3 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.611938145565435 |
TrID: |
|
File name: | msit.msi |
File size: | 16'847'872 bytes |
MD5: | 18577f68754f3e2703cdca2df9ba65ff |
SHA1: | 8d8846470510b1b6f81c0725975c7c3589568bb3 |
SHA256: | 413c17f73a0831d6ae209e491856a66e07e8c0af70e7e06f68a7b7570ccb3a95 |
SHA512: | eb238a258b0dfe40716c2a8bc847951abbac4e7224ecefcb13be559a63cc39e6645e406764991cb60b87aa082196b890ff78c3c25c659b851eb02c4064e8eaec |
SSDEEP: | 393216:LPF3zv8Zrqb+CUuubX26jytnTPjnXcBv9k2VvOTp:JzwqNUHytvnMd9Z |
TLSH: | 5907E1157EBFE5EDF17E0035861616338A3B6D990B3251FB72E266409E360D21FF2622 |
File Content Preview: | ........................>...........................................1...........H.......p.......i.............................................................................................................................................................. |
Icon Hash: | 2d2e3797b32b2b99 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:29:11.533777+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49711 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:12.199354+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49711 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:12.199354+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49711 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:12.760819+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49717 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:13.263540+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49717 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:13.263540+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49717 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:13.982385+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49728 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:15.144517+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49734 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:16.338516+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49741 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:16.950627+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49741 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:18.004044+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49753 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:19.579194+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49765 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:21.624274+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49781 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:29:21.949582+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49781 | 172.67.134.197 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 13, 2025 08:29:11.041421890 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.041460991 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:11.041531086 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.046165943 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.046181917 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:11.533688068 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:11.533776999 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.735208035 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.735235929 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:11.736233950 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:11.784421921 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.796814919 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.796838045 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:11.796921015 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.199331045 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.199440002 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.199493885 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.201241016 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.201252937 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.201292992 CET | 49711 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.201297998 CET | 443 | 49711 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.267920971 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.268013000 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.268105030 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.268419981 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.268450975 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.760734081 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.760818958 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.762113094 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.762126923 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.762916088 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:12.764091015 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.764108896 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:12.764173985 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.263602018 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.263734102 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.263798952 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.263829947 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.263907909 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.263963938 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.263972044 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.264054060 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.264136076 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.264175892 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.264183044 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.264245987 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.264251947 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.264389992 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.264439106 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.264445066 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.268271923 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.268349886 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.268362045 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.315679073 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.355529070 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.355628014 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.355688095 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.355722904 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.355750084 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.355792999 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.355803967 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.355818033 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.355855942 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.356070995 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.356086969 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.356101036 CET | 49717 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.356106997 CET | 443 | 49717 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.496712923 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.496752024 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.496850967 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.497251034 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.497263908 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.982311010 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.982384920 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.983823061 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.983839989 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.984241962 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:13.985701084 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.985816002 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:13.985845089 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:14.533185959 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:14.533313036 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:14.533361912 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:14.533478022 CET | 49728 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:14.533503056 CET | 443 | 49728 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:14.673934937 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:14.673968077 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:14.674220085 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:14.674591064 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:14.674603939 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.144442081 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.144516945 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.145981073 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.145989895 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.146239042 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.147604942 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.147779942 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.147814035 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.147861958 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.195328951 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.663930893 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.664030075 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.664097071 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.664336920 CET | 49734 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.664369106 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.857145071 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.857243061 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:15.857340097 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.857996941 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:15.858023882 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.338269949 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.338515997 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:16.341347933 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:16.341378927 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.341660976 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.343000889 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:16.343000889 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:16.343056917 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.346216917 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:16.346232891 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.950666904 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.950900078 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:16.951128960 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:16.951589108 CET | 49741 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:16.951636076 CET | 443 | 49741 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:17.534223080 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:17.534266949 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:17.534581900 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:17.535042048 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:17.535064936 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:18.003869057 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:18.004044056 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:18.005434990 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:18.005445957 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:18.005676031 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:18.006953001 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:18.007076025 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:18.007081985 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:18.433442116 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:18.433532953 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:18.433634043 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:18.433866978 CET | 49753 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:18.433883905 CET | 443 | 49753 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.123059034 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.123100996 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.123168945 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.123440027 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.123454094 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.579116106 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.579194069 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.580421925 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.580440044 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.580666065 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.605319023 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.606126070 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.606154919 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.606240988 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.606267929 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.606369019 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.606440067 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.606543064 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.606568098 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.606698990 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.606734037 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.606899977 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.606930017 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.606941938 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.607076883 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.607108116 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.616265059 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.616427898 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.616458893 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.616482973 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.616497993 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.616508007 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.616518974 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.616611958 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.616646051 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.616674900 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.621570110 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:19.621612072 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:19.663327932 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.079972982 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.080224991 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.080373049 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.080517054 CET | 49765 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.080562115 CET | 443 | 49765 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.145860910 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.145896912 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.145956039 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.146318913 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.146331072 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.624165058 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.624274015 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.627994061 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.628000021 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.628423929 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.629937887 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.629956961 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.630019903 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.949625015 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.949870110 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.949928999 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.950061083 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.950071096 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Jan 13, 2025 08:29:21.950082064 CET | 49781 | 443 | 192.168.2.6 | 172.67.134.197 |
Jan 13, 2025 08:29:21.950086117 CET | 443 | 49781 | 172.67.134.197 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 13, 2025 08:29:11.004713058 CET | 63323 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 13, 2025 08:29:11.027338028 CET | 53 | 63323 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 13, 2025 08:29:11.004713058 CET | 192.168.2.6 | 1.1.1.1 | 0xb2b9 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 13, 2025 08:29:11.027338028 CET | 1.1.1.1 | 192.168.2.6 | 0xb2b9 | No error (0) | 172.67.134.197 | A (IP address) | IN (0x0001) | false | ||
Jan 13, 2025 08:29:11.027338028 CET | 1.1.1.1 | 192.168.2.6 | 0xb2b9 | No error (0) | 104.21.6.116 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49711 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:11 UTC | 266 | OUT | |
2025-01-13 07:29:11 UTC | 8 | OUT | |
2025-01-13 07:29:12 UTC | 1121 | IN | |
2025-01-13 07:29:12 UTC | 7 | IN | |
2025-01-13 07:29:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49717 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:12 UTC | 267 | OUT | |
2025-01-13 07:29:12 UTC | 45 | OUT | |
2025-01-13 07:29:13 UTC | 1127 | IN | |
2025-01-13 07:29:13 UTC | 242 | IN | |
2025-01-13 07:29:13 UTC | 1369 | IN | |
2025-01-13 07:29:13 UTC | 1369 | IN | |
2025-01-13 07:29:13 UTC | 1369 | IN | |
2025-01-13 07:29:13 UTC | 1369 | IN | |
2025-01-13 07:29:13 UTC | 1369 | IN | |
2025-01-13 07:29:13 UTC | 276 | IN | |
2025-01-13 07:29:13 UTC | 1369 | IN | |
2025-01-13 07:29:13 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49728 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:13 UTC | 286 | OUT | |
2025-01-13 07:29:13 UTC | 12863 | OUT | |
2025-01-13 07:29:14 UTC | 1130 | IN | |
2025-01-13 07:29:14 UTC | 20 | IN | |
2025-01-13 07:29:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49734 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:15 UTC | 281 | OUT | |
2025-01-13 07:29:15 UTC | 15079 | OUT | |
2025-01-13 07:29:15 UTC | 1122 | IN | |
2025-01-13 07:29:15 UTC | 20 | IN | |
2025-01-13 07:29:15 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49741 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:16 UTC | 277 | OUT | |
2025-01-13 07:29:16 UTC | 15331 | OUT | |
2025-01-13 07:29:16 UTC | 4582 | OUT | |
2025-01-13 07:29:16 UTC | 1131 | IN | |
2025-01-13 07:29:16 UTC | 20 | IN | |
2025-01-13 07:29:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49753 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:18 UTC | 280 | OUT | |
2025-01-13 07:29:18 UTC | 1208 | OUT | |
2025-01-13 07:29:18 UTC | 1126 | IN | |
2025-01-13 07:29:18 UTC | 20 | IN | |
2025-01-13 07:29:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49765 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:19 UTC | 281 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:19 UTC | 15331 | OUT | |
2025-01-13 07:29:21 UTC | 1139 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49781 | 172.67.134.197 | 443 | 1708 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:29:21 UTC | 267 | OUT | |
2025-01-13 07:29:21 UTC | 80 | OUT | |
2025-01-13 07:29:21 UTC | 1121 | IN | |
2025-01-13 07:29:21 UTC | 54 | IN | |
2025-01-13 07:29:21 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:29:06 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b21b0000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 02:29:06 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b21b0000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 02:29:07 |
Start date: | 13/01/2025 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xaa0000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 02:29:08 |
Start date: | 13/01/2025 |
Path: | C:\Windows\Installer\MSIAEB.tmp |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff78e210000 |
File size: | 13'084'160 bytes |
MD5 hash: | 4D82074854750FDBA89D76624CC1E6F6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:29:09 |
Start date: | 13/01/2025 |
Path: | C:\Windows\SysWOW64\dxdiag.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 222'720 bytes |
MD5 hash: | 24D3F0DB6CCF0C341EA4F6B206DF2EDF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 02:29:09 |
Start date: | 13/01/2025 |
Path: | C:\Windows\SysWOW64\dxdiag.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5a0000 |
File size: | 222'720 bytes |
MD5 hash: | 24D3F0DB6CCF0C341EA4F6B206DF2EDF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Function 00007FF78E2E5D6C Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 68.9% |
Total number of Nodes: | 296 |
Total number of Limit Nodes: | 24 |
Graph
Function 00435870 Relevance: 26.9, APIs: 11, Strings: 4, Instructions: 661memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CDD7 Relevance: 10.3, Strings: 8, Instructions: 291COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420B10 Relevance: 8.0, Strings: 6, Instructions: 515COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408920 Relevance: 6.1, APIs: 4, Instructions: 116threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AAE0 Relevance: 5.4, Strings: 4, Instructions: 370COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415971 Relevance: 4.0, APIs: 1, Strings: 1, Instructions: 457encryptionCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425480 Relevance: 2.8, Strings: 2, Instructions: 315COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439E40 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438640 Relevance: 1.5, Strings: 1, Instructions: 240COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C8F0 Relevance: 1.3, Strings: 1, Instructions: 98COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D400 Relevance: .3, Instructions: 336COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CA10 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435530 Relevance: .2, Instructions: 250COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A7F4 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D866 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433195 Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439DE0 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F18E Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CEE6 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438612 Relevance: 1.5, APIs: 1, Instructions: 13memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004385E0 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004238F0 Relevance: 21.8, Strings: 17, Instructions: 517COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434ED0 Relevance: 21.6, Strings: 17, Instructions: 319COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004303F0 Relevance: 21.1, APIs: 6, Strings: 6, Instructions: 124clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041676A Relevance: 20.4, Strings: 16, Instructions: 364COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B124 Relevance: 19.1, Strings: 15, Instructions: 302COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DA80 Relevance: 15.9, Strings: 12, Instructions: 904COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417742 Relevance: 10.5, Strings: 8, Instructions: 526COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004092D0 Relevance: 10.4, Strings: 8, Instructions: 436COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427365 Relevance: 10.3, Strings: 8, Instructions: 338COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042456F Relevance: 9.1, Strings: 7, Instructions: 366COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004281C0 Relevance: 8.2, Strings: 6, Instructions: 665COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AFD8 Relevance: 7.7, Strings: 6, Instructions: 153COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042683C Relevance: 6.8, Strings: 5, Instructions: 527COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424DD0 Relevance: 6.6, Strings: 5, Instructions: 369COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409730 Relevance: 5.4, Strings: 4, Instructions: 352COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BB20 Relevance: 5.3, Strings: 4, Instructions: 310COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419219 Relevance: 5.3, Strings: 4, Instructions: 274COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421D73 Relevance: 4.5, Strings: 3, Instructions: 737COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042779B Relevance: 4.2, Strings: 3, Instructions: 443COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004277E0 Relevance: 4.2, Strings: 3, Instructions: 436COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436BE4 Relevance: 4.2, Strings: 3, Instructions: 426COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415460 Relevance: 4.2, Strings: 3, Instructions: 408COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A9D5 Relevance: 4.1, Strings: 3, Instructions: 388COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AA8A Relevance: 4.1, Strings: 3, Instructions: 365COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AAD7 Relevance: 4.1, Strings: 3, Instructions: 364COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AAC6 Relevance: 4.1, Strings: 3, Instructions: 339COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004230C0 Relevance: 4.0, Strings: 3, Instructions: 285COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DEE9 Relevance: 3.9, Strings: 3, Instructions: 140COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414860 Relevance: 3.6, Strings: 2, Instructions: 1055COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404C50 Relevance: 3.3, Strings: 2, Instructions: 805COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438D70 Relevance: 3.3, Strings: 2, Instructions: 755COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416CBD Relevance: 3.2, Strings: 2, Instructions: 743COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425820 Relevance: 3.1, Strings: 2, Instructions: 614COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415FA1 Relevance: 3.1, Strings: 2, Instructions: 606COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004231F6 Relevance: 3.0, Strings: 2, Instructions: 524COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BE71 Relevance: 2.8, Strings: 2, Instructions: 349COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404300 Relevance: 2.8, Strings: 2, Instructions: 335COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C72B Relevance: 2.8, Strings: 2, Instructions: 256COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040FB71 Relevance: 2.3, Strings: 1, Instructions: 1089COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004181E9 Relevance: 2.0, Strings: 1, Instructions: 793COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004216E0 Relevance: 1.7, Strings: 1, Instructions: 457COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C330 Relevance: 1.7, Strings: 1, Instructions: 443COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427C0F Relevance: 1.6, Strings: 1, Instructions: 324COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E40 Relevance: 1.5, Strings: 1, Instructions: 269COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409070 Relevance: 1.5, Strings: 1, Instructions: 256COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CE00 Relevance: 1.5, Strings: 1, Instructions: 256COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417D74 Relevance: 1.5, Strings: 1, Instructions: 215COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A71E Relevance: 1.3, Strings: 1, Instructions: 44COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F116 Relevance: .7, Instructions: 745COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406670 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041EC80 Relevance: .7, Instructions: 658COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402F50 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407450 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403950 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411712 Relevance: .5, Instructions: 546COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BA70 Relevance: .5, Instructions: 504COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004362F0 Relevance: .5, Instructions: 482COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004082F0 Relevance: .4, Instructions: 429COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405980 Relevance: .4, Instructions: 400COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D040 Relevance: .4, Instructions: 364COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 028FA4A4 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D0C0 Relevance: .3, Instructions: 314COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CCF0 Relevance: .3, Instructions: 307COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004061E0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434463 Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D4C0 Relevance: .3, Instructions: 286COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E480 Relevance: .2, Instructions: 231COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040EE70 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438A90 Relevance: .2, Instructions: 212COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426A10 Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CA48 Relevance: .2, Instructions: 207COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C802 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B6F0 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A9B0 Relevance: .2, Instructions: 200COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022B0 Relevance: .2, Instructions: 199COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426282 Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434C70 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004264F2 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433875 Relevance: .2, Instructions: 187COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E122 Relevance: .2, Instructions: 182COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436980 Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A7A0 Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004029C0 Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D9D6 Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B7E0 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D136 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AEC5 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B90 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004180EC Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432AA0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428DB0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A58E Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041805C Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A4FC Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|