Windows
Analysis Report
87.247.158.212.ps1
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- powershell.exe (PID: 7120 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -noLogo -E xecutionPo licy unres tricted -f ile "C:\Us ers\user\D esktop\87. 247.158.21 2.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5156 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - RegSvcs.exe (PID: 6480 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Svcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["kickykiduz.lat", "washyceehsu.lat", "savorraiykj.lat", "leggelatez.lat", "finickypwk.lat", "buynostopliik.shop", "shoefeatthe.lat", "miniatureyu.lat", "bloodyswif.lat"], "Build id": "NNaWCM--TEST"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T17:59:21.771472+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49753 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:23.210705+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49762 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:24.385499+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49771 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:26.805899+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49788 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:27.992894+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49795 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:29.294796+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49805 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:30.559974+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49815 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:34.190046+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49834 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T17:59:22.592799+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49753 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:23.710134+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49762 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:34.671116+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49834 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T17:59:22.592799+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49753 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T17:59:23.710134+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49762 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T17:59:26.310956+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49771 | 104.21.80.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_004182C0 | |
Source: | Code function: | 3_2_00415D15 | |
Source: | Code function: | 3_2_00418404 |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 3_2_00427A50 | |
Source: | Code function: | 3_2_0040BA29 | |
Source: | Code function: | 3_2_0040CB44 | |
Source: | Code function: | 3_2_0042D420 | |
Source: | Code function: | 3_2_00423E44 | |
Source: | Code function: | 3_2_00408740 | |
Source: | Code function: | 3_2_00429871 | |
Source: | Code function: | 3_2_0042E002 | |
Source: | Code function: | 3_2_0042E002 | |
Source: | Code function: | 3_2_0042A810 | |
Source: | Code function: | 3_2_004288BA | |
Source: | Code function: | 3_2_00402940 | |
Source: | Code function: | 3_2_0040A910 | |
Source: | Code function: | 3_2_004161DF | |
Source: | Code function: | 3_2_004251E8 | |
Source: | Code function: | 3_2_00426A00 | |
Source: | Code function: | 3_2_00438AF0 | |
Source: | Code function: | 3_2_0041AA90 | |
Source: | Code function: | 3_2_0041AA90 | |
Source: | Code function: | 3_2_004082A0 | |
Source: | Code function: | 3_2_0043EB00 | |
Source: | Code function: | 3_2_00420B10 | |
Source: | Code function: | 3_2_00440310 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_0041DC40 | |
Source: | Code function: | 3_2_00417451 | |
Source: | Code function: | 3_2_00407400 | |
Source: | Code function: | 3_2_00407400 | |
Source: | Code function: | 3_2_0043C410 | |
Source: | Code function: | 3_2_0043C410 | |
Source: | Code function: | 3_2_00415C25 | |
Source: | Code function: | 3_2_0042B430 | |
Source: | Code function: | 3_2_00408CD0 | |
Source: | Code function: | 3_2_00426D70 | |
Source: | Code function: | 3_2_0042DD30 | |
Source: | Code function: | 3_2_0042E5C2 | |
Source: | Code function: | 3_2_004165EE | |
Source: | Code function: | 3_2_00415590 | |
Source: | Code function: | 3_2_004095A0 | |
Source: | Code function: | 3_2_00415E42 | |
Source: | Code function: | 3_2_00413E50 | |
Source: | Code function: | 3_2_0040DE72 | |
Source: | Code function: | 3_2_00425E00 | |
Source: | Code function: | 3_2_00425E00 | |
Source: | Code function: | 3_2_0043EE10 | |
Source: | Code function: | 3_2_00408EB0 | |
Source: | Code function: | 3_2_0041DEB0 | |
Source: | Code function: | 3_2_0041F710 | |
Source: | Code function: | 3_2_0041F710 | |
Source: | Code function: | 3_2_004427E0 | |
Source: | Code function: | 3_2_0042E7EB | |
Source: | Code function: | 3_2_0040DFEA | |
Source: | Code function: | 3_2_0042F799 | |
Source: | Code function: | 3_2_0042DFAF |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_004363E0 |
Source: | Code function: | 3_2_004363E0 |
Source: | Code function: | 3_2_00436590 |
Source: | Window created: | Jump to behavior |
Source: | Code function: | 0_2_00007FFD3410A470 | |
Source: | Code function: | 0_2_00007FFD34103E65 | |
Source: | Code function: | 0_2_00007FFD34102EFA | |
Source: | Code function: | 0_2_00007FFD34104035 | |
Source: | Code function: | 0_2_00007FFD3410D850 | |
Source: | Code function: | 0_2_00007FFD3410C0A4 | |
Source: | Code function: | 0_2_00007FFD34105180 | |
Source: | Code function: | 0_2_00007FFD34104A70 | |
Source: | Code function: | 3_2_00415975 | |
Source: | Code function: | 3_2_00427A50 | |
Source: | Code function: | 3_2_00420440 | |
Source: | Code function: | 3_2_00410446 | |
Source: | Code function: | 3_2_00442460 | |
Source: | Code function: | 3_2_00442DE0 | |
Source: | Code function: | 3_2_00423E44 | |
Source: | Code function: | 3_2_0042DEE5 | |
Source: | Code function: | 3_2_0040D690 | |
Source: | Code function: | 3_2_00408740 | |
Source: | Code function: | 3_2_0043B7B0 | |
Source: | Code function: | 3_2_00430050 | |
Source: | Code function: | 3_2_00411078 | |
Source: | Code function: | 3_2_0042A810 | |
Source: | Code function: | 3_2_00433810 | |
Source: | Code function: | 3_2_004270D0 | |
Source: | Code function: | 3_2_004058E0 | |
Source: | Code function: | 3_2_0042D893 | |
Source: | Code function: | 3_2_004148B0 | |
Source: | Code function: | 3_2_004288BA | |
Source: | Code function: | 3_2_00436140 | |
Source: | Code function: | 3_2_0040A910 | |
Source: | Code function: | 3_2_00441910 | |
Source: | Code function: | 3_2_00403920 | |
Source: | Code function: | 3_2_004091C0 | |
Source: | Code function: | 3_2_004161DF | |
Source: | Code function: | 3_2_004311E6 | |
Source: | Code function: | 3_2_00432188 | |
Source: | Code function: | 3_2_00406190 | |
Source: | Code function: | 3_2_0042F195 | |
Source: | Code function: | 3_2_004421B0 | |
Source: | Code function: | 3_2_0041E250 | |
Source: | Code function: | 3_2_00441A56 | |
Source: | Code function: | 3_2_0041B200 | |
Source: | Code function: | 3_2_004042D0 | |
Source: | Code function: | 3_2_0041BAD0 | |
Source: | Code function: | 3_2_00433AD0 | |
Source: | Code function: | 3_2_00431A88 | |
Source: | Code function: | 3_2_00441A94 | |
Source: | Code function: | 3_2_0041AA90 | |
Source: | Code function: | 3_2_00442A90 | |
Source: | Code function: | 3_2_004082A0 | |
Source: | Code function: | 3_2_0041C370 | |
Source: | Code function: | 3_2_00420B10 | |
Source: | Code function: | 3_2_00402B20 | |
Source: | Code function: | 3_2_0042ABC0 | |
Source: | Code function: | 3_2_00441BD0 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_00417451 | |
Source: | Code function: | 3_2_00441C60 | |
Source: | Code function: | 3_2_00419470 | |
Source: | Code function: | 3_2_00404C00 | |
Source: | Code function: | 3_2_00407400 | |
Source: | Code function: | 3_2_0043C410 | |
Source: | Code function: | 3_2_0042ECD0 | |
Source: | Code function: | 3_2_00414C9C | |
Source: | Code function: | 3_2_0042CCA0 | |
Source: | Code function: | 3_2_0040E4B0 | |
Source: | Code function: | 3_2_00426D70 | |
Source: | Code function: | 3_2_00428D76 | |
Source: | Code function: | 3_2_0041A574 | |
Source: | Code function: | 3_2_00405DC0 | |
Source: | Code function: | 3_2_004245C0 | |
Source: | Code function: | 3_2_004165EE | |
Source: | Code function: | 3_2_00415590 | |
Source: | Code function: | 3_2_004095A0 | |
Source: | Code function: | 3_2_00415E42 | |
Source: | Code function: | 3_2_00413E50 | |
Source: | Code function: | 3_2_0040AE60 | |
Source: | Code function: | 3_2_0041BE00 | |
Source: | Code function: | 3_2_00406620 | |
Source: | Code function: | 3_2_00402EF0 | |
Source: | Code function: | 3_2_0043EE80 | |
Source: | Code function: | 3_2_00418690 | |
Source: | Code function: | 3_2_0043AEA0 | |
Source: | Code function: | 3_2_00419710 | |
Source: | Code function: | 3_2_0041F710 | |
Source: | Code function: | 3_2_0041C7D0 | |
Source: | Code function: | 3_2_004427E0 | |
Source: | Code function: | 3_2_00427F8D |
Source: | Classification label: |
Source: | Code function: | 3_2_0043B7B0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Binary string: |
Source: | Code function: | 0_2_00007FFD3410BC8D | |
Source: | Code function: | 0_2_00007FFD3410EF6F | |
Source: | Code function: | 0_2_00007FFD3410A8DD | |
Source: | Code function: | 0_2_00007FFD341000C1 | |
Source: | Code function: | 0_2_00007FFD341009C9 | |
Source: | Code function: | 3_2_00441864 | |
Source: | Code function: | 3_2_00412635 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 3_2_004402D0 |
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 121 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 121 Security Software Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 121 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 12 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
8% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high | |
buynostopliik.shop | 104.21.80.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.80.1 | buynostopliik.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591125 |
Start date and time: | 2025-01-14 17:58:11 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 87.247.158.212.ps1 |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winPS1@4/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
11:59:19 | API Interceptor | |
11:59:21 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.80.1 | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1628158735648508 |
Encrypted: | false |
SSDEEP: | 3:Nllluldhz/lL:NllU |
MD5: | 03744CE5681CB7F5E53A02F19FA22067 |
SHA1: | 234FB09010F6714453C83795D8CF3250D871D4DF |
SHA-256: | 88348573B57BA21639837E3AF19A00B4D7889E2D8E90A923151AC022D2946E5D |
SHA-512: | 0C05D6047DBA2286F8F72EB69A69919DC5650F96E8EE759BA9B3FC10BE793F3A88408457E700936BCACA02816CE25DD53F48B962491E7F4F0A4A534D88A855E6 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6224 |
Entropy (8bit): | 3.7101480256233854 |
Encrypted: | false |
SSDEEP: | 48:KrD/l0tf0Y3CycU2UfzukvhkvklCywYHVBkglHJfSogZosnVBkglSfSogZoI1:a/Y3C6TKkvhkvCCtgVBkgOHFVBkg3Hv |
MD5: | 5BFE1E441998FCBA71426905BEDDC148 |
SHA1: | CC995008A55CF4759A8A9A40D8D9B9B560145405 |
SHA-256: | 60E4021C7C8CA8D7B1B62CDAA28DC318CE9620A13F36DAFE777F964F4FBD209B |
SHA-512: | 61E51FEE9DC57596C46DCB9992FEAD9627BF7131743BFAFD0F9AB4394D137E19CB28F8B8F6B6EF4380A3617B58AE7D6D69F3BFE5B6A7D960D1B47D851C12F918 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IC9Y7NM5VEF8QUBZHVZS.temp
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6224 |
Entropy (8bit): | 3.7101480256233854 |
Encrypted: | false |
SSDEEP: | 48:KrD/l0tf0Y3CycU2UfzukvhkvklCywYHVBkglHJfSogZosnVBkglSfSogZoI1:a/Y3C6TKkvhkvCCtgVBkgOHFVBkg3Hv |
MD5: | 5BFE1E441998FCBA71426905BEDDC148 |
SHA1: | CC995008A55CF4759A8A9A40D8D9B9B560145405 |
SHA-256: | 60E4021C7C8CA8D7B1B62CDAA28DC318CE9620A13F36DAFE777F964F4FBD209B |
SHA-512: | 61E51FEE9DC57596C46DCB9992FEAD9627BF7131743BFAFD0F9AB4394D137E19CB28F8B8F6B6EF4380A3617B58AE7D6D69F3BFE5B6A7D960D1B47D851C12F918 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.488652867474763 |
TrID: | |
File name: | 87.247.158.212.ps1 |
File size: | 538'493 bytes |
MD5: | 5259076d6fd45bf7ddbb866c169541db |
SHA1: | 67549b5a010f40a004558b2c250829c9dc4d869b |
SHA256: | 4154e02a0d922fefb72812b972808dbf6c3f0a9108f577b641c9a57cf8d8d342 |
SHA512: | 17faa2a63e9cc2e927f517ce34bdfc17e4d2229b9eb745dcbabd84c2800e853c4fa9fb0e2ef7420f1d259137dc37394fe0e7e7972520de79067837f7cff7cfc1 |
SSDEEP: | 6144:eVe/8jH/fkbaAiHnVExoyZYwOiY1LBSUkf2jFgdIVgMbJN+5PVu1Zhn6w/lAVigM:eFwoW2h7dVI42CoeUJ2z6m20VFqwg2 |
TLSH: | 20B46D3240537C5F3B9B2ECEA4006EC00C5839A77618D154AE899276F2FD53A9E6D9FC |
File Content Preview: | .. $t0='IQIQQIIQIQQEX'.replace('IQIQQ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAKcOfWcAAAAAAA |
Icon Hash: | 3270d6baae77db44 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T17:59:21.771472+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49753 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:22.592799+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49753 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:22.592799+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49753 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:23.210705+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49762 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:23.710134+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49762 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:23.710134+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49762 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:24.385499+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49771 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:26.310956+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49771 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:26.805899+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49788 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:27.992894+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49795 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:29.294796+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49805 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:30.559974+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49815 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:34.190046+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49834 | 104.21.80.1 | 443 | TCP |
2025-01-14T17:59:34.671116+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49834 | 104.21.80.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 17:59:21.279568911 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.279607058 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:21.279736042 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.288333893 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.288368940 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:21.771305084 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:21.771471977 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.773001909 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.773019075 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:21.773281097 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:21.822938919 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.823894024 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.823894024 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:21.824063063 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:22.592856884 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:22.593096018 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:22.593170881 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:22.595894098 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:22.595927954 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:22.595968008 CET | 49753 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:22.595978022 CET | 443 | 49753 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:22.604852915 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:22.604887962 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:22.604959011 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:22.605338097 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:22.605355024 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.210639954 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.210705042 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.212441921 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.212451935 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.212774038 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.216825008 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.216842890 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.216922998 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710212946 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710356951 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710410118 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.710438013 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710532904 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710587978 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.710597038 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710721016 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710764885 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.710772991 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710881948 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.710930109 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.710937977 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.711039066 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.711085081 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.711092949 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.711201906 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.711250067 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.711257935 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.760242939 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.788885117 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.789074898 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.789124966 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.789143085 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.789295912 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.789349079 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.790065050 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.790077925 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.790090084 CET | 49762 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.790096045 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.917556047 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.917597055 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:23.917695999 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.921485901 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:23.921523094 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:24.385282040 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:24.385499001 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:24.392254114 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:24.392263889 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:24.392510891 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:24.394099951 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:24.394275904 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:24.394310951 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.310996056 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.311225891 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.311364889 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.311467886 CET | 49771 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.311489105 CET | 443 | 49771 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.326801062 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.326839924 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.326941967 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.327867985 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.327883005 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.805788040 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.805898905 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.811522007 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.811541080 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.811805964 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.815902948 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.819224119 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.819258928 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:26.819334984 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:26.863331079 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.351821899 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.351970911 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.352111101 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.353420973 CET | 49788 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.353441954 CET | 443 | 49788 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.508323908 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.508353949 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.508424997 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.508708954 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.508727074 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.992801905 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.992893934 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.994112968 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.994129896 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.994338036 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.995449066 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.995605946 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.995637894 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:27.995704889 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:27.995716095 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:28.700587988 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:28.700714111 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:28.700786114 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:28.701663971 CET | 49795 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:28.701683044 CET | 443 | 49795 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:28.835355043 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:28.835365057 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:28.835427999 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:28.835715055 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:28.835731030 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:29.294698000 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:29.294795990 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:29.295919895 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:29.295926094 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:29.296221972 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:29.297483921 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:29.297589064 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:29.297595024 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:29.788481951 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:29.788593054 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:29.788644075 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:29.788754940 CET | 49805 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:29.788764954 CET | 443 | 49805 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.099453926 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.099534035 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.099946022 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.099946022 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.099992037 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.559654951 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.559973955 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.561146975 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.561172009 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.561429024 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.562844992 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.563668013 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.563718081 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.563806057 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.563838959 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.563956022 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564008951 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.564133883 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564160109 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.564285040 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564318895 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.564466000 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564512014 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.564523935 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564532042 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.564666986 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564694881 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.564712048 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564846039 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.564876080 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.573821068 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.573942900 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.573973894 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.573999882 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.574023008 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:30.574048042 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:30.574059963 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:33.714812994 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:33.715075016 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:33.715188026 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:33.715481997 CET | 49815 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:33.715502977 CET | 443 | 49815 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:33.720278978 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:33.720330954 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:33.720417976 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:33.720753908 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:33.720771074 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.189755917 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.190046072 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:34.191307068 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:34.191323042 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.191551924 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.192944050 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:34.192964077 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:34.192995071 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.671117067 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.671221972 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.671468973 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:34.671659946 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:34.671685934 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Jan 14, 2025 17:59:34.671699047 CET | 49834 | 443 | 192.168.2.6 | 104.21.80.1 |
Jan 14, 2025 17:59:34.671708107 CET | 443 | 49834 | 104.21.80.1 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 17:59:21.251851082 CET | 65453 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 14, 2025 17:59:21.265080929 CET | 53 | 65453 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 14, 2025 17:59:21.251851082 CET | 192.168.2.6 | 1.1.1.1 | 0x9446 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 14, 2025 17:59:14.257138968 CET | 1.1.1.1 | 192.168.2.6 | 0x339c | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:14.257138968 CET | 1.1.1.1 | 192.168.2.6 | 0x339c | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:21.265080929 CET | 1.1.1.1 | 192.168.2.6 | 0x9446 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:21.265080929 CET | 1.1.1.1 | 192.168.2.6 | 0x9446 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:21.265080929 CET | 1.1.1.1 | 192.168.2.6 | 0x9446 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:21.265080929 CET | 1.1.1.1 | 192.168.2.6 | 0x9446 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:21.265080929 CET | 1.1.1.1 | 192.168.2.6 | 0x9446 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:21.265080929 CET | 1.1.1.1 | 192.168.2.6 | 0x9446 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 17:59:21.265080929 CET | 1.1.1.1 | 192.168.2.6 | 0x9446 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49753 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:21 UTC | 265 | OUT | |
2025-01-14 16:59:21 UTC | 8 | OUT | |
2025-01-14 16:59:22 UTC | 1131 | IN | |
2025-01-14 16:59:22 UTC | 7 | IN | |
2025-01-14 16:59:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49762 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:23 UTC | 266 | OUT | |
2025-01-14 16:59:23 UTC | 46 | OUT | |
2025-01-14 16:59:23 UTC | 1133 | IN | |
2025-01-14 16:59:23 UTC | 236 | IN | |
2025-01-14 16:59:23 UTC | 1369 | IN | |
2025-01-14 16:59:23 UTC | 1369 | IN | |
2025-01-14 16:59:23 UTC | 1369 | IN | |
2025-01-14 16:59:23 UTC | 926 | IN | |
2025-01-14 16:59:23 UTC | 1369 | IN | |
2025-01-14 16:59:23 UTC | 1369 | IN | |
2025-01-14 16:59:23 UTC | 1369 | IN | |
2025-01-14 16:59:23 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49771 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:24 UTC | 280 | OUT | |
2025-01-14 16:59:24 UTC | 12834 | OUT | |
2025-01-14 16:59:26 UTC | 1133 | IN | |
2025-01-14 16:59:26 UTC | 20 | IN | |
2025-01-14 16:59:26 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49788 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:26 UTC | 276 | OUT | |
2025-01-14 16:59:26 UTC | 15056 | OUT | |
2025-01-14 16:59:27 UTC | 1138 | IN | |
2025-01-14 16:59:27 UTC | 20 | IN | |
2025-01-14 16:59:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49795 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:27 UTC | 279 | OUT | |
2025-01-14 16:59:27 UTC | 15331 | OUT | |
2025-01-14 16:59:27 UTC | 4601 | OUT | |
2025-01-14 16:59:28 UTC | 1129 | IN | |
2025-01-14 16:59:28 UTC | 20 | IN | |
2025-01-14 16:59:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49805 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:29 UTC | 283 | OUT | |
2025-01-14 16:59:29 UTC | 1382 | OUT | |
2025-01-14 16:59:29 UTC | 1130 | IN | |
2025-01-14 16:59:29 UTC | 20 | IN | |
2025-01-14 16:59:29 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49815 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:30 UTC | 275 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:30 UTC | 15331 | OUT | |
2025-01-14 16:59:33 UTC | 1143 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49834 | 104.21.80.1 | 443 | 6480 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 16:59:34 UTC | 266 | OUT | |
2025-01-14 16:59:34 UTC | 81 | OUT | |
2025-01-14 16:59:34 UTC | 1129 | IN | |
2025-01-14 16:59:34 UTC | 54 | IN | |
2025-01-14 16:59:34 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:59:17 |
Start date: | 14/01/2025 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6e3d50000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 11:59:17 |
Start date: | 14/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 11:59:20 |
Start date: | 14/01/2025 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe40000 |
File size: | 45'984 bytes |
MD5 hash: | 9D352BC46709F0CB5EC974633A0C3C94 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 1.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 9 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD34104A70 Relevance: .5, Instructions: 508COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD34104035 Relevance: .3, Instructions: 276COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD34103E65 Relevance: .2, Instructions: 169COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD3410A470 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD34105180 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD3410C0A4 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD34102EFA Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 48.4% |
Total number of Nodes: | 320 |
Total number of Limit Nodes: | 25 |
Graph
Function 0043B7B0 Relevance: 23.6, APIs: 11, Strings: 2, Instructions: 851memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408740 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 228threadCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CB44 Relevance: 3.0, APIs: 2, Instructions: 30COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00410446 Relevance: 2.4, APIs: 1, Instructions: 941COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427A50 Relevance: 1.7, Strings: 1, Instructions: 403COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004402D0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BA29 Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D420 Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432D44 Relevance: 1.6, APIs: 1, Instructions: 94COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F596 Relevance: 1.6, APIs: 1, Instructions: 75COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F586 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440260 Relevance: 1.5, APIs: 1, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432648 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E860 Relevance: 1.5, APIs: 1, Instructions: 22memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E840 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425E00 Relevance: 34.2, Strings: 27, Instructions: 430COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004251E8 Relevance: 34.2, Strings: 27, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417451 Relevance: 6.7, Strings: 5, Instructions: 462COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A910 Relevance: 6.7, Strings: 5, Instructions: 422COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420B10 Relevance: 5.5, Strings: 4, Instructions: 470COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F799 Relevance: 5.4, Strings: 4, Instructions: 395COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408EB0 Relevance: 5.3, Strings: 4, Instructions: 299COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AA90 Relevance: 4.4, Strings: 3, Instructions: 606COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004095A0 Relevance: 4.1, Strings: 3, Instructions: 375COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E5C2 Relevance: 3.9, Strings: 3, Instructions: 189COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413E50 Relevance: 3.4, Strings: 2, Instructions: 884COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F710 Relevance: 3.0, Strings: 2, Instructions: 527COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C410 Relevance: 2.8, Strings: 2, Instructions: 349COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DFAF Relevance: 2.6, Strings: 2, Instructions: 124COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E7EB Relevance: 2.6, Strings: 2, Instructions: 108COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004273A0 Relevance: 1.6, Strings: 1, Instructions: 311COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004082A0 Relevance: 1.5, Strings: 1, Instructions: 288COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E002 Relevance: 1.4, Strings: 1, Instructions: 152COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426A00 Relevance: 1.3, Strings: 1, Instructions: 11COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407400 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004288BA Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415590 Relevance: .3, Instructions: 326COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426D70 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004427E0 Relevance: .2, Instructions: 242COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DC40 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402940 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429871 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408CD0 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DFEA Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DE72 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EB00 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415C25 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438AF0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B430 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EE10 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DEB0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440310 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|