Windows
Analysis Report
EZsrFTi.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- EZsrFTi.exe (PID: 7652 cmdline:
"C:\Users\ user\Deskt op\EZsrFTi .exe" MD5: C0A15C8328D0EB6C48C194CA52787560) - EZsrFTi.exe (PID: 7684 cmdline:
"C:\Users\ user\Deskt op\EZsrFTi .exe" MD5: C0A15C8328D0EB6C48C194CA52787560) - EZsrFTi.exe (PID: 7708 cmdline:
"C:\Users\ user\Deskt op\EZsrFTi .exe" MD5: C0A15C8328D0EB6C48C194CA52787560) - EZsrFTi.exe (PID: 7732 cmdline:
"C:\Users\ user\Deskt op\EZsrFTi .exe" MD5: C0A15C8328D0EB6C48C194CA52787560) - WerFault.exe (PID: 7824 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 652 -s 940 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["immolatechallen.bond", "sobrattyeu.bond", "jarry-fixxer.bond", "strivehelpeu.bond", "crookedfoshe.bond", "growthselec.bond", "pain-temper.bond", "stripedre-lot.bond", "jarry-deatile.bond"], "Build id": "yau6Na--7329910690"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T18:11:05.442760+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49707 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:06.693913+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49708 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:08.156911+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49710 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:09.451195+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49715 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:10.735748+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49727 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:12.853049+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:14.284231+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49750 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:16.693086+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49769 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T18:11:05.949857+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.11 | 49707 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:07.501941+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.11 | 49708 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:17.494241+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.11 | 49769 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T18:11:05.949857+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.11 | 49707 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T18:11:07.501941+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.11 | 49708 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T18:11:08.917043+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.11 | 49710 | 104.21.64.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 4_2_004151D0 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 4_2_00441230 | |
Source: | Code function: | 4_2_0043A2B0 | |
Source: | Code function: | 4_2_00441310 | |
Source: | Code function: | 4_2_004243A0 | |
Source: | Code function: | 4_2_004243A0 | |
Source: | Code function: | 4_2_00409BB0 | |
Source: | Code function: | 4_2_00409BB0 | |
Source: | Code function: | 4_2_00427520 | |
Source: | Code function: | 4_2_004330F0 | |
Source: | Code function: | 4_2_0041C09C | |
Source: | Code function: | 4_2_0042E8A9 | |
Source: | Code function: | 4_2_004180AC | |
Source: | Code function: | 4_2_00440910 | |
Source: | Code function: | 4_2_00440910 | |
Source: | Code function: | 4_2_0042E91D | |
Source: | Code function: | 4_2_0041812C | |
Source: | Code function: | 4_2_00405930 | |
Source: | Code function: | 4_2_00405930 | |
Source: | Code function: | 4_2_004249D0 | |
Source: | Code function: | 4_2_0043D9D0 | |
Source: | Code function: | 4_2_0040A9E0 | |
Source: | Code function: | 4_2_00417193 | |
Source: | Code function: | 4_2_00417193 | |
Source: | Code function: | 4_2_0042B240 | |
Source: | Code function: | 4_2_0043EA02 | |
Source: | Code function: | 4_2_0040B21B | |
Source: | Code function: | 4_2_0041BACA | |
Source: | Code function: | 4_2_004272D8 | |
Source: | Code function: | 4_2_00440AF0 | |
Source: | Code function: | 4_2_004262F7 | |
Source: | Code function: | 4_2_0041A28A | |
Source: | Code function: | 4_2_0040CAB2 | |
Source: | Code function: | 4_2_00402B70 | |
Source: | Code function: | 4_2_0043B300 | |
Source: | Code function: | 4_2_00440BA0 | |
Source: | Code function: | 4_2_0041A3B1 | |
Source: | Code function: | 4_2_00414BBB | |
Source: | Code function: | 4_2_0042DC65 | |
Source: | Code function: | 4_2_0042EC6B | |
Source: | Code function: | 4_2_0044046D | |
Source: | Code function: | 4_2_00426C74 | |
Source: | Code function: | 4_2_00426C74 | |
Source: | Code function: | 4_2_0043ACEA | |
Source: | Code function: | 4_2_00407490 | |
Source: | Code function: | 4_2_00407490 | |
Source: | Code function: | 4_2_00425D67 | |
Source: | Code function: | 4_2_0041BDC0 | |
Source: | Code function: | 4_2_00417DC3 | |
Source: | Code function: | 4_2_004262F7 | |
Source: | Code function: | 4_2_0042D5AC | |
Source: | Code function: | 4_2_00429665 | |
Source: | Code function: | 4_2_0042966F | |
Source: | Code function: | 4_2_0041A60C | |
Source: | Code function: | 4_2_00440ED0 | |
Source: | Code function: | 4_2_004096B0 | |
Source: | Code function: | 4_2_0042C710 | |
Source: | Code function: | 4_2_0042EF3F | |
Source: | Code function: | 4_2_0041A7F6 | |
Source: | Code function: | 4_2_004407FD | |
Source: | Code function: | 4_2_004407FD | |
Source: | Code function: | 4_2_0043AF80 | |
Source: | Code function: | 4_2_0043B789 | |
Source: | Code function: | 4_2_0041E790 | |
Source: | Code function: | 4_2_0043E7AE | |
Source: | Code function: | 4_2_00420FB0 | |
Source: | Code function: | 4_2_004167BD |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 4_2_00435A30 |
Source: | Code function: | 4_2_03941000 |
Source: | Code function: | 4_2_00435A30 |
Source: | Code function: | 4_2_00435BD0 |
Source: | Code function: | 0_2_00CA3CA9 | |
Source: | Code function: | 0_2_00CA3CB8 | |
Source: | Code function: | 0_2_00CA6CB0 | |
Source: | Code function: | 4_2_004178F2 | |
Source: | Code function: | 4_2_004208A0 | |
Source: | Code function: | 4_2_004151D0 | |
Source: | Code function: | 4_2_0043A2B0 | |
Source: | Code function: | 4_2_00441310 | |
Source: | Code function: | 4_2_004243A0 | |
Source: | Code function: | 4_2_00441CD0 | |
Source: | Code function: | 4_2_00427520 | |
Source: | Code function: | 4_2_00408660 | |
Source: | Code function: | 4_2_00410FB5 | |
Source: | Code function: | 4_2_00414820 | |
Source: | Code function: | 4_2_004038C0 | |
Source: | Code function: | 4_2_004398C0 | |
Source: | Code function: | 4_2_004330F0 | |
Source: | Code function: | 4_2_00440080 | |
Source: | Code function: | 4_2_0042A142 | |
Source: | Code function: | 4_2_0041D150 | |
Source: | Code function: | 4_2_00441960 | |
Source: | Code function: | 4_2_00440910 | |
Source: | Code function: | 4_2_0041812C | |
Source: | Code function: | 4_2_00405930 | |
Source: | Code function: | 4_2_0040A9E0 | |
Source: | Code function: | 4_2_004339F0 | |
Source: | Code function: | 4_2_00417193 | |
Source: | Code function: | 4_2_004289BC | |
Source: | Code function: | 4_2_0043DA40 | |
Source: | Code function: | 4_2_00409250 | |
Source: | Code function: | 4_2_0041EA60 | |
Source: | Code function: | 4_2_00404270 | |
Source: | Code function: | 4_2_0040B21B | |
Source: | Code function: | 4_2_00406220 | |
Source: | Code function: | 4_2_00427A30 | |
Source: | Code function: | 4_2_00440AF0 | |
Source: | Code function: | 4_2_004262F7 | |
Source: | Code function: | 4_2_00415B54 | |
Source: | Code function: | 4_2_00419B60 | |
Source: | Code function: | 4_2_0043EB68 | |
Source: | Code function: | 4_2_0041630C | |
Source: | Code function: | 4_2_0042E315 | |
Source: | Code function: | 4_2_00439B20 | |
Source: | Code function: | 4_2_00440BA0 | |
Source: | Code function: | 4_2_0042E3B2 | |
Source: | Code function: | 4_2_0042FBB0 | |
Source: | Code function: | 4_2_00414BBB | |
Source: | Code function: | 4_2_0041C460 | |
Source: | Code function: | 4_2_0041CC70 | |
Source: | Code function: | 4_2_00426C74 | |
Source: | Code function: | 4_2_00404C00 | |
Source: | Code function: | 4_2_00416C19 | |
Source: | Code function: | 4_2_0042E41D | |
Source: | Code function: | 4_2_00432C2F | |
Source: | Code function: | 4_2_00402430 | |
Source: | Code function: | 4_2_0041D430 | |
Source: | Code function: | 4_2_00407490 | |
Source: | Code function: | 4_2_0041FC90 | |
Source: | Code function: | 4_2_00431492 | |
Source: | Code function: | 4_2_0043B4A0 | |
Source: | Code function: | 4_2_00438CA7 | |
Source: | Code function: | 4_2_004214B0 | |
Source: | Code function: | 4_2_00425D67 | |
Source: | Code function: | 4_2_0041AD0C | |
Source: | Code function: | 4_2_0041BDC0 | |
Source: | Code function: | 4_2_00417DC3 | |
Source: | Code function: | 4_2_004262F7 | |
Source: | Code function: | 4_2_0043E59E | |
Source: | Code function: | 4_2_00418DA0 | |
Source: | Code function: | 4_2_00437E56 | |
Source: | Code function: | 4_2_0042966F | |
Source: | Code function: | 4_2_0041A616 | |
Source: | Code function: | 4_2_0042A630 | |
Source: | Code function: | 4_2_004326C0 | |
Source: | Code function: | 4_2_004416D0 | |
Source: | Code function: | 4_2_004346FA | |
Source: | Code function: | 4_2_00405E80 | |
Source: | Code function: | 4_2_0040EE85 | |
Source: | Code function: | 4_2_0042AE8C | |
Source: | Code function: | 4_2_004096B0 | |
Source: | Code function: | 4_2_004066B0 | |
Source: | Code function: | 4_2_00402EB0 | |
Source: | Code function: | 4_2_0041C770 | |
Source: | Code function: | 4_2_0042F775 | |
Source: | Code function: | 4_2_0042C710 | |
Source: | Code function: | 4_2_00434F23 | |
Source: | Code function: | 4_2_0040E7F0 | |
Source: | Code function: | 4_2_004407FD | |
Source: | Code function: | 4_2_0043AF80 | |
Source: | Code function: | 4_2_0043B789 | |
Source: | Code function: | 4_2_004237A1 | |
Source: | Code function: | 4_2_004167BD |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 4_2_0043A2B0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 4_2_004407A1 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_4-13739 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 4_2_0043F050 |
Source: | Code function: | 0_2_029E8125 | |
Source: | Code function: | 0_2_029E82A2 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_029E8125 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 22 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
28% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sobrattyeu.bond | 104.21.64.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.64.1 | sobrattyeu.bond | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1592068 |
Start date and time: | 2025-01-15 18:10:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | EZsrFTi.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@8/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.159.68, 13.107.246.45, 4.245.163.56
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
12:11:05 | API Interceptor | |
12:11:23 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.64.1 | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sobrattyeu.bond | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_EZsrFTi.exe_8bde2ce7b05c3e4d9823037f951ae1af74e29a_082384c3_4539f800-7d38-42ed-b13d-55fd9ae4ddfd\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9060038100507476 |
Encrypted: | false |
SSDEEP: | 96:ynFhX5oe0c9sggKjTOAqyS3QXIDcQlc6VcEdcw3V+BHUHZ0ownOgHkEwH3dEFYAz:wTJoe0c98A0LR3EauOzuiFfZ24IO8m |
MD5: | C1EA77C174EF9DD3DAAF96FF92F67308 |
SHA1: | 74BE34262591D28195A3EB9E2BAA54B9C64DCEC3 |
SHA-256: | 0E974B58A4891DE1A3A4D990368D0671C1B7BCDBE60BEEBCA479E9B78200C70E |
SHA-512: | 710C755FD28F5F461F218B5AB4513D266071E5A9160DCBAE73D7697611B4351979CDA20AB91BBEDE6E27D3BDFA437F27D79FB375F113A29A1696B6FCEAC5E6B2 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 165980 |
Entropy (8bit): | 3.8834800197683697 |
Encrypted: | false |
SSDEEP: | 1536:2xaYX2AftW3d5GtTcTSVXsQ0pN4uE2aO497RCDYuBojRpLTg3B9Sb:2cXAOyG4uEq49gMpLTgx9S |
MD5: | D304F23484F023B7F044BE40310FFE95 |
SHA1: | 894FB80D16209B5E5FFA20D2BA88223EB0874545 |
SHA-256: | 95BCB02960B8D816473E1DABEE6605DC8DEC7F3468FCFFB4D9924032A601EDA4 |
SHA-512: | 1EAD925090D77449DB44392C2937E28D64EE654BB8A72EE85B2DE47E77A40127EEC35C162E414BEDEA195040627623490CD1F02F44BEAFD221FF18DCEBCE2F2A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8374 |
Entropy (8bit): | 3.6923975730946084 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJqv6+WB6YeYSU92AwgmfhVJQpr789b5Jsf6Tm:R6lXJS6Z6YBSU9ugmfhVJp5if3 |
MD5: | 4E47FAA92BA22D13F1EF05E4BC743A2E |
SHA1: | EB01A8A6970A7D2EE316B89C5D3B22C09BEEE41A |
SHA-256: | 56E3792C785B5D9770F2A8B120ACC5CD1999B9AF2E85EA7BEFA6F064DAAA94B3 |
SHA-512: | 0EE6AC289E6765ECB1E69F15DD143F96606F8AB4A8BDE8E2506DA552D94754EACF0909570D7B5595E9F0A1DCE12C79B279E845818D1782EABF922D3B245B964C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4735 |
Entropy (8bit): | 4.454138419477644 |
Encrypted: | false |
SSDEEP: | 96:uIjfaI7VN7VrFJBggfbKygfl5QcSe0S6d:uIWYVN75PBgg7g/xSFS4 |
MD5: | 67630439E54FCF39B3E6089412628C31 |
SHA1: | FB66FAC3420D9D934F47507EEE34CB5EF10042C6 |
SHA-256: | F2A2C72F299478B77517816CD9C13B6CC5B096AE0ACE466909F990675CD2833B |
SHA-512: | 3CF4C19FAD35173EDC3F0E668F17C57A977830270FFEB0AB687CC87BC1E312EE2495113E50988568032D650E21548FDDB20FE7D97404AE67B00EBEDDAC9A47B6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.298865512078589 |
Encrypted: | false |
SSDEEP: | 6144:aECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8lR6SD6VJSRiT:HCsL6seqD5Sm6SWVARi |
MD5: | AE6421EA78D8B678A2265828E5DED4BB |
SHA1: | 386E3711C197D8739651EC83137B9787CA97816B |
SHA-256: | 96BA84652E8A30D560FABD28D40351107AA24D79FB3DDC588C1C929B6B71A0D8 |
SHA-512: | 67E931F55B7D8646833C1C8322925BB32687BE4CF229D4481B2E6AF34785C86B27B8E885400B0652AEDF35DBC63CB2C36A2A0354B33973E114B419C79C6674CC |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.868327806136689 |
TrID: |
|
File name: | EZsrFTi.exe |
File size: | 376'320 bytes |
MD5: | c0a15c8328d0eb6c48c194ca52787560 |
SHA1: | 79c65b0b78d7d28729e3ece99e888ca3acdd47e7 |
SHA256: | cf6e4051d20e654347161dc77b59840a6270cad5e63b4a59a59148c37e776f99 |
SHA512: | 67662b0ab1afbaf4d6dfd9733b6a3eda160b5e5d36049dabda1f668992ab8c9f0f80112c117ad1e5c891b17e8715674dae0d28888157f1c725bb422e64aa4b5a |
SSDEEP: | 6144:HyJN9fU7GJcGosSgutOEUv340hN9DEGzjgoujWjOI0uf+yf8bErafbonXPajR8dc:SJN9HoD9qv34uN9DHsouaB0ufHazoXCt |
TLSH: | FF8412057A93B772C5388778D4E3851406B697D72A33E25B3D4872BA9D233C0DA42FB9 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...|G................0.................. ... ....@.. .......................@............`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x41039e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xC6FB477C [Tue Oct 15 09:16:44 2075 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x10350 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x12000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x14000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x10309 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xe3a4 | 0xe400 | a477556f10e0f94ff07851ab21409ae9 | False | 0.520764802631579 | data | 6.042242922628573 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x12000 | 0x598 | 0x600 | 123aca95e4555687b41c2cebfd368cb4 | False | 0.41015625 | data | 4.0349728002939855 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x14000 | 0xc | 0x200 | 8afa85677c54490f83975db63dd0f5e1 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.idata | 0x16000 | 0x4ce00 | 0x4ce00 | 9cbc06c4dc8eca9f425eb754efac65ff | False | 1.0003366361788617 | data | 7.999394932403458 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x120a0 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0x123ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T18:11:05.442760+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49707 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:05.949857+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.11 | 49707 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:05.949857+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.11 | 49707 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:06.693913+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49708 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:07.501941+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.11 | 49708 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:07.501941+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.11 | 49708 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:08.156911+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49710 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:08.917043+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.11 | 49710 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:09.451195+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49715 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:10.735748+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49727 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:12.853049+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:14.284231+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49750 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:16.693086+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49769 | 104.21.64.1 | 443 | TCP |
2025-01-15T18:11:17.494241+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.11 | 49769 | 104.21.64.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 18:11:04.956841946 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:04.956890106 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:04.957000971 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:04.959758997 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:04.959775925 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:05.442672014 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:05.442759991 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:05.448326111 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:05.448365927 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:05.448621988 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:05.491581917 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:05.513354063 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:05.513437986 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:05.513514996 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:05.949846029 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:05.949924946 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:05.949990988 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:05.969974041 CET | 49707 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:05.969995022 CET | 443 | 49707 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:06.050548077 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:06.050573111 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:06.050643921 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:06.050951958 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:06.050961971 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:06.693810940 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:06.693912983 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:06.754641056 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:06.754666090 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:06.755105972 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:06.756645918 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:06.757102013 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:06.757122993 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.501921892 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.501983881 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502034903 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.502052069 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502093077 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502119064 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502135038 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.502141953 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502178907 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.502494097 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502840996 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502881050 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.502911091 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.502916098 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.503006935 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.503014088 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.506563902 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.506640911 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.506647110 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.554088116 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.592329025 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.592398882 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.592453003 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.592461109 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.592515945 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.592562914 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.592828989 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.592842102 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.592864990 CET | 49708 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.592869997 CET | 443 | 49708 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.692011118 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.692049980 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:07.692136049 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.692481995 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:07.692493916 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.156826019 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.156910896 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.158406019 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.158410072 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.158734083 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.160480022 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.160480022 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.160542965 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.917066097 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.917196989 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.917257071 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.940087080 CET | 49710 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.940107107 CET | 443 | 49710 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.971963882 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.972007990 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:08.972369909 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.972486973 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:08.972505093 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:09.451107025 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:09.451195002 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:09.509351969 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:09.509377956 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:09.509772062 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:09.557487965 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:09.561263084 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:09.561414003 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:09.561454058 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:09.561702013 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:09.561709881 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.130712986 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.130796909 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.130871058 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.131344080 CET | 49715 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.131362915 CET | 443 | 49715 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.271572113 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.271605968 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.271863937 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.272106886 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.272119045 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.735682964 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.735748053 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.737234116 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.737238884 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.737490892 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.738748074 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.739013910 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.739052057 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:10.739125013 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:10.739134073 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:11.972405910 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:11.972523928 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:11.977282047 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.033809900 CET | 49727 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.033885002 CET | 443 | 49727 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:12.362092972 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.362133026 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:12.362201929 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.362651110 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.362662077 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:12.852915049 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:12.853049040 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.865864992 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.865906000 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:12.866163969 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:12.867679119 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.867763996 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:12.867773056 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:13.412492037 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:13.412627935 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:13.412899017 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:13.412998915 CET | 49742 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:13.413022995 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:13.808569908 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:13.808614969 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:13.808705091 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:13.809075117 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:13.809092999 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.284128904 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.284230947 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.286001921 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.286015034 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.286365986 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.288238049 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.289294004 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.289350986 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.289465904 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.289501905 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.289598942 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.289680958 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.289797068 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.289834976 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.289967060 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.289999008 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.290122986 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.290154934 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.290169001 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.290293932 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.290332079 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.299617052 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.299808025 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.299849987 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.299856901 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.299880028 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.299895048 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.300035954 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.300091982 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.300121069 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.305604935 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:14.305704117 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:14.305721998 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.227771997 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.227890015 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.227965117 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.229231119 CET | 49750 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.229254961 CET | 443 | 49750 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.233359098 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.233393908 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.233645916 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.234106064 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.234122992 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.692862034 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.693085909 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.695091009 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.695108891 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.695360899 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:16.696856976 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.696856976 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:16.696928024 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494245052 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494308949 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494343996 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494379997 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494379044 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.494411945 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494430065 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.494445086 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494483948 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494484901 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.494497061 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494534016 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.494540930 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494863033 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494895935 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494903088 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.494910002 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.494965076 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.494971037 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.495003939 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.495053053 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.495220900 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.495235920 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Jan 15, 2025 18:11:17.495248079 CET | 49769 | 443 | 192.168.2.11 | 104.21.64.1 |
Jan 15, 2025 18:11:17.495254040 CET | 443 | 49769 | 104.21.64.1 | 192.168.2.11 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 18:11:04.932427883 CET | 61134 | 53 | 192.168.2.11 | 1.1.1.1 |
Jan 15, 2025 18:11:04.951430082 CET | 53 | 61134 | 1.1.1.1 | 192.168.2.11 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 18:11:04.932427883 CET | 192.168.2.11 | 1.1.1.1 | 0x7eb6 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 18:11:04.951430082 CET | 1.1.1.1 | 192.168.2.11 | 0x7eb6 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 18:11:04.951430082 CET | 1.1.1.1 | 192.168.2.11 | 0x7eb6 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 18:11:04.951430082 CET | 1.1.1.1 | 192.168.2.11 | 0x7eb6 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 18:11:04.951430082 CET | 1.1.1.1 | 192.168.2.11 | 0x7eb6 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 18:11:04.951430082 CET | 1.1.1.1 | 192.168.2.11 | 0x7eb6 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 18:11:04.951430082 CET | 1.1.1.1 | 192.168.2.11 | 0x7eb6 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 18:11:04.951430082 CET | 1.1.1.1 | 192.168.2.11 | 0x7eb6 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.11 | 49707 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:05 UTC | 262 | OUT | |
2025-01-15 17:11:05 UTC | 8 | OUT | |
2025-01-15 17:11:05 UTC | 1121 | IN | |
2025-01-15 17:11:05 UTC | 7 | IN | |
2025-01-15 17:11:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.11 | 49708 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:06 UTC | 263 | OUT | |
2025-01-15 17:11:06 UTC | 52 | OUT | |
2025-01-15 17:11:07 UTC | 1131 | IN | |
2025-01-15 17:11:07 UTC | 238 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN | |
2025-01-15 17:11:07 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.11 | 49710 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:08 UTC | 280 | OUT | |
2025-01-15 17:11:08 UTC | 12846 | OUT | |
2025-01-15 17:11:08 UTC | 1124 | IN | |
2025-01-15 17:11:08 UTC | 20 | IN | |
2025-01-15 17:11:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.11 | 49715 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:09 UTC | 281 | OUT | |
2025-01-15 17:11:09 UTC | 15064 | OUT | |
2025-01-15 17:11:10 UTC | 1123 | IN | |
2025-01-15 17:11:10 UTC | 20 | IN | |
2025-01-15 17:11:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.11 | 49727 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:10 UTC | 282 | OUT | |
2025-01-15 17:11:10 UTC | 15331 | OUT | |
2025-01-15 17:11:10 UTC | 5108 | OUT | |
2025-01-15 17:11:11 UTC | 1130 | IN | |
2025-01-15 17:11:11 UTC | 20 | IN | |
2025-01-15 17:11:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.11 | 49742 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:12 UTC | 273 | OUT | |
2025-01-15 17:11:12 UTC | 1343 | OUT | |
2025-01-15 17:11:13 UTC | 1124 | IN | |
2025-01-15 17:11:13 UTC | 20 | IN | |
2025-01-15 17:11:13 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.11 | 49750 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:14 UTC | 282 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:14 UTC | 15331 | OUT | |
2025-01-15 17:11:16 UTC | 1127 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.11 | 49769 | 104.21.64.1 | 443 | 7732 | C:\Users\user\Desktop\EZsrFTi.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 17:11:16 UTC | 263 | OUT | |
2025-01-15 17:11:16 UTC | 87 | OUT | |
2025-01-15 17:11:17 UTC | 1129 | IN | |
2025-01-15 17:11:17 UTC | 240 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN | |
2025-01-15 17:11:17 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 12:11:03 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\EZsrFTi.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x620000 |
File size: | 376'320 bytes |
MD5 hash: | C0A15C8328D0EB6C48C194CA52787560 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 12:11:04 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\EZsrFTi.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa0000 |
File size: | 376'320 bytes |
MD5 hash: | C0A15C8328D0EB6C48C194CA52787560 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 12:11:04 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\EZsrFTi.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x110000 |
File size: | 376'320 bytes |
MD5 hash: | C0A15C8328D0EB6C48C194CA52787560 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 12:11:04 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\EZsrFTi.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe50000 |
File size: | 376'320 bytes |
MD5 hash: | C0A15C8328D0EB6C48C194CA52787560 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 7 |
Start time: | 12:11:04 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x10000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 52.9% |
Total number of Nodes: | 17 |
Total number of Limit Nodes: | 1 |
Graph
Function 029E8125 Relevance: 42.3, APIs: 11, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E82A2 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA7138 Relevance: 1.7, APIs: 1, Instructions: 244COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA3CA9 Relevance: 2.7, Strings: 2, Instructions: 159COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA3CB8 Relevance: 2.6, Strings: 2, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA6CB0 Relevance: .3, Instructions: 325COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.7% |
Dynamic/Decrypted Code Coverage: | 4.3% |
Signature Coverage: | 42% |
Total number of Nodes: | 374 |
Total number of Limit Nodes: | 23 |
Graph
Function 0043A2B0 Relevance: 27.0, APIs: 11, Strings: 4, Instructions: 785memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03941000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408660 Relevance: 7.7, APIs: 5, Instructions: 232threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409BB0 Relevance: 2.6, Strings: 2, Instructions: 65COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DC65 Relevance: 1.6, APIs: 1, Instructions: 84COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F050 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441230 Relevance: 1.3, Strings: 1, Instructions: 73COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427520 Relevance: .4, Instructions: 436COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441310 Relevance: .3, Instructions: 334COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E301 Relevance: 3.1, APIs: 2, Instructions: 114COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CCA3 Relevance: 3.0, APIs: 2, Instructions: 31COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FC02 Relevance: 3.0, APIs: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413F06 Relevance: 1.8, APIs: 1, Instructions: 253threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DB61 Relevance: 1.6, APIs: 1, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DC5F Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414057 Relevance: 1.6, APIs: 1, Instructions: 62threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413F25 Relevance: 1.6, APIs: 1, Instructions: 60threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043898F Relevance: 1.5, APIs: 1, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EFE0 Relevance: 1.5, APIs: 1, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004313CF Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433689 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D480 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D460 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435A30 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 114clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041812C Relevance: 9.8, Strings: 7, Instructions: 1028COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042966F Relevance: 6.7, Strings: 5, Instructions: 475COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A9E0 Relevance: 5.4, Strings: 4, Instructions: 383COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417DC3 Relevance: 5.2, Strings: 4, Instructions: 200COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A3B1 Relevance: 5.1, Strings: 4, Instructions: 60COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BDC0 Relevance: 4.3, Strings: 3, Instructions: 553COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420FB0 Relevance: 4.2, Strings: 3, Instructions: 450COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004096B0 Relevance: 4.1, Strings: 3, Instructions: 393COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E8A9 Relevance: 3.8, Strings: 3, Instructions: 36COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B789 Relevance: 3.2, Strings: 2, Instructions: 684COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004167BD Relevance: 3.0, Strings: 2, Instructions: 512COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425D67 Relevance: 2.9, Strings: 2, Instructions: 402COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AF80 Relevance: 2.9, Strings: 2, Instructions: 352COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BACA Relevance: 2.8, Strings: 2, Instructions: 280COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043ACEA Relevance: 2.7, Strings: 2, Instructions: 217COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414BBB Relevance: 1.8, Strings: 1, Instructions: 527COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426C74 Relevance: 1.7, Strings: 1, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C710 Relevance: 1.7, Strings: 1, Instructions: 409COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004262F7 Relevance: 1.6, Strings: 1, Instructions: 399COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C09C Relevance: 1.4, Strings: 1, Instructions: 188COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004272D8 Relevance: 1.4, Strings: 1, Instructions: 187COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E7AE Relevance: 1.4, Strings: 1, Instructions: 176COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429665 Relevance: 1.4, Strings: 1, Instructions: 169COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D9D0 Relevance: 1.3, Strings: 1, Instructions: 46COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004407FD Relevance: .6, Instructions: 631COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407490 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440910 Relevance: .5, Instructions: 541COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405930 Relevance: .4, Instructions: 448COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B21B Relevance: .4, Instructions: 425COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440AF0 Relevance: .4, Instructions: 422COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440BA0 Relevance: .4, Instructions: 421COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D5AC Relevance: .2, Instructions: 182COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0044046D Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440ED0 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042EF3F Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B300 Relevance: .2, Instructions: 151COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004330F0 Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CAB2 Relevance: .1, Instructions: 115COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042EC6B Relevance: .1, Instructions: 106COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A28A Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B240 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A7F6 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A60C Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004180AC Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B70 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EA02 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E790 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|