Windows
Analysis Report
pumpkin-2.7.3.exe
Overview
General Information
Detection
Score: | 4 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
pumpkin-2.7.3.exe (PID: 7672 cmdline:
"C:\Users\ user\Deskt op\pumpkin -2.7.3.exe " MD5: C70DF19686F26DEBC376CCCD7CE301A3)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00404C60 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004016E0 |
Source: | Code function: | 0_2_00401BE0 |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Evasive API call chain: | graph_0-2542 |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: |
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | Code function: | 0_2_00407740 |
Source: | Code function: | 0_2_0040834E |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00407740 |
Source: | Code function: | 0_2_00406080 | |
Source: | Code function: | 0_2_00406110 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00402FC0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Process Injection | 3 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 11 Native API | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
4% | Virustotal | Browse | ||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true | false | high | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1601024 |
Start date and time: | 2025-01-28 08:52:32 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 30s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 2 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | pumpkin-2.7.3.exe |
Detection: | CLEAN |
Classification: | clean4.winEXE@1/9@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe - Excluded IPs from analysis (wh
itelisted): 52.149.20.212, 13. 107.246.45 - Excluded domains from analysis
(whitelisted): otelrules.azur eedge.net, slscr.update.micros oft.com, ctldl.windowsupdate.c om.delivery.microsoft.com, ote lrules.afd.azureedge.net, sls. update.microsoft.com, azureedg e-t-prod.trafficmanager.net, c tldl.windowsupdate.com, wu-b-n et.trafficmanager.net, glb.sls .prod.dcat.dsp.trafficmanager. net - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
bg.microsoft.map.fastly.net | Get hash | malicious | Strela Downloader | Browse |
| |
Get hash | malicious | DcRat | Browse |
| ||
Get hash | malicious | Tinba | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1146 |
Entropy (8bit): | 5.167911779779853 |
Encrypted: | false |
SSDEEP: | 24:BWIBPVzAI5iV5VzAjVzArVzAIsVzAFHlVzALVzAv4ZVpVJsV2ja0:B551AIA71Aj1Ar1AIs1AL1AL1Av4ZXHh |
MD5: | 7665936CB568C2F8A877A6466732373B |
SHA1: | BF968C6F3B69575AA3B53CF6F3ED3DBE32AC4F12 |
SHA-256: | 0BB3C0164D3774F6212036EDC2C95F106BDD8027D7D37DE4364D48C32418EC14 |
SHA-512: | 06FF88F92E26DFC61843E0FAC3B755EDEF9C2B14614FE201631525956622C173D75B77F77DDF270C4476447A79B259608E217B240D8D895B49DCCD0CC91E1361 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 387 |
Entropy (8bit): | 5.073065676859333 |
Encrypted: | false |
SSDEEP: | 12:QdFTVS1IpnJFbHWeQmAhqq9LV7he9LGjH73epFpT:y2M5kmeY6cFpT |
MD5: | 685BAB4BE28BA2839D7303F1D4559504 |
SHA1: | C4E9B1E755A99257AA7529D40485C748CE8BCDB1 |
SHA-256: | C0AF4774AC5FD0B81C3C8596B906DA726A4003B0630DD7F773A66B87D1B22505 |
SHA-512: | AB6229E1B12967FA1CD84ACBA3AE369A8224D58C97DE473DBBEB131F1AF0374AF72922C568F6AB8068F0666080B882B5EBD85D8C88858A3FF516389848C144B7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 387 |
Entropy (8bit): | 5.073065676859333 |
Encrypted: | false |
SSDEEP: | 12:QdFTVS1IpnJFbHWeQmAhqq9LV7he9LGjH73epFpT:y2M5kmeY6cFpT |
MD5: | 685BAB4BE28BA2839D7303F1D4559504 |
SHA1: | C4E9B1E755A99257AA7529D40485C748CE8BCDB1 |
SHA-256: | C0AF4774AC5FD0B81C3C8596B906DA726A4003B0630DD7F773A66B87D1B22505 |
SHA-512: | AB6229E1B12967FA1CD84ACBA3AE369A8224D58C97DE473DBBEB131F1AF0374AF72922C568F6AB8068F0666080B882B5EBD85D8C88858A3FF516389848C144B7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 387 |
Entropy (8bit): | 5.073065676859333 |
Encrypted: | false |
SSDEEP: | 12:QdFTVS1IpnJFbHWeQmAhqq9LV7he9LGjH73epFpT:y2M5kmeY6cFpT |
MD5: | 685BAB4BE28BA2839D7303F1D4559504 |
SHA1: | C4E9B1E755A99257AA7529D40485C748CE8BCDB1 |
SHA-256: | C0AF4774AC5FD0B81C3C8596B906DA726A4003B0630DD7F773A66B87D1B22505 |
SHA-512: | AB6229E1B12967FA1CD84ACBA3AE369A8224D58C97DE473DBBEB131F1AF0374AF72922C568F6AB8068F0666080B882B5EBD85D8C88858A3FF516389848C144B7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 387 |
Entropy (8bit): | 5.073065676859333 |
Encrypted: | false |
SSDEEP: | 12:QdFTVS1IpnJFbHWeQmAhqq9LV7he9LGjH73epFpT:y2M5kmeY6cFpT |
MD5: | 685BAB4BE28BA2839D7303F1D4559504 |
SHA1: | C4E9B1E755A99257AA7529D40485C748CE8BCDB1 |
SHA-256: | C0AF4774AC5FD0B81C3C8596B906DA726A4003B0630DD7F773A66B87D1B22505 |
SHA-512: | AB6229E1B12967FA1CD84ACBA3AE369A8224D58C97DE473DBBEB131F1AF0374AF72922C568F6AB8068F0666080B882B5EBD85D8C88858A3FF516389848C144B7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 85779 |
Entropy (8bit): | 7.7270537166978075 |
Encrypted: | false |
SSDEEP: | 1536:P+g1p6mABSTo9Yg530qkmD5N+eBNNIcP7MSRp/7RjNP5L5cxq:PnP+9530FqiONtoMp/7ZNPHGq |
MD5: | C2370A72343CF15E419D90C6F008021D |
SHA1: | 5A446AA9411FF2AA5AC1844D5F5A5D7D7EE99BC0 |
SHA-256: | C848B5729691B5663D621EA219C14D8D327F3505E4AC9EE16884A0515904E22B |
SHA-512: | D518A4346F868E45411FE036C4F6C57811139EA35D79C8E3EA9086D5944EF951EBFED972437CB0385426DDD2E4D4FC05F288CC79905E5B766C153E2B4762853F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11407 |
Entropy (8bit): | 7.240541475148362 |
Encrypted: | false |
SSDEEP: | 192:1r6ndgAfV4PN7TjSsOuKASU52q4jh+wqs+Alj1Rnb/wtkX:1rgdgoq17T3GU56MuJRb8kX |
MD5: | 01BC4905C85045112238A8343C2D56A3 |
SHA1: | E5C60451C17DFA2E59776E44D1475FBC639EE081 |
SHA-256: | 5616BFC4813A4D4523B2FD9011CAE6F913A374B8D1597B9009D31CFE0A6C9262 |
SHA-512: | A48EDF82F8ECA88400A1228B41C1BF9E81D7B1D107413A5457EB0E8550CD51B787BE4C01E971FD02D0973E9244CA94BFBD98736F3F7D1DAF664E03FFF8CAD717 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 236 |
Entropy (8bit): | 6.164144774614526 |
Encrypted: | false |
SSDEEP: | 6:gFIP45nqFQkC7WvKqKqtkM6BlhXrE4Llf5vDWJNzgy7Cg:gFIP4N4oDqKNBPjldDWLgSCg |
MD5: | 1D71B99090BF3373C607D8A57316621B |
SHA1: | 0CB3746E3DAF70CC8988CB82DF9FAC7788A24EE9 |
SHA-256: | 37EDC94DDC0D78E4588C60F1ECCD4D8B4301BC6FFB745693B23589F4C75420A0 |
SHA-512: | C2B0FCA5B3D1DCA8DC2625C9A048597EBE3212F2C0A5CE4BB83FBAF5F20EE3C676E2564E984A32616C878EF7F4DE1A909845A6EAF6215E2133BBA21FB29CF633 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 951 |
Entropy (8bit): | 4.575188011323708 |
Encrypted: | false |
SSDEEP: | 12:8il0RYXxjh9wTbdpF44e2OaOdrNXexKxx0fnzjAfV/Q2bdp5JSPcEhEfmV:8Agbdzcr2K3cAfV1dHFZm |
MD5: | CB49794FA6BF765873CCFCBB13E68A91 |
SHA1: | 8A071ECB655A89F9AF130B6524AE80B9E090F984 |
SHA-256: | 66DB4A32DEB62F5D83E45967A6C441069911B2B8D2DA0B747BEE9E216E954426 |
SHA-512: | 5D8901665CC8E04965775239048F9BACB3842C3668F678404B79A8941D627DB7B4490B110F61AFA029482E9DF701F39E22D308B16E222F404467739A664C99E3 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.262668404624566 |
TrID: |
|
File name: | pumpkin-2.7.3.exe |
File size: | 147'968 bytes |
MD5: | c70df19686f26debc376cccd7ce301a3 |
SHA1: | c7ab4a5b2a34bb9702f55ecedc17a9fa7debc59a |
SHA256: | a1b0099a0bc502993158f6bb8daf3c96506f2362418aa78c1fe9b8425376aee9 |
SHA512: | 0c8a0afedef47cb61ab569934d0ade02b9dde5fdced07ff9e96b9df00279d62365cee40f8f1fb28466ed8db4aa5daeb5749d1809060cb4de0205974d6ed6555e |
SSDEEP: | 3072:dGIjgwfvvGVnP+9530FqiONtoMp/7ZNPHGuOLR:dxjPvcG95kcNmgznPHGP |
TLSH: | 4BE3E07BE59A8CB1D5E6067D00B9379A8E37AF70E7254DD7D3902838DC339D0663824A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C.M.................t.........../............@........................................................................ |
Icon Hash: | 0b1fb7964b363b0e |
Entrypoint: | 0x402fc0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x4DB8439E [Wed Apr 27 16:26:06 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 62281f8202617fbdebbadcac219b8e81 |
Instruction |
---|
mov eax, dword ptr fs:[00000000h] |
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 00409450h |
push 00405D64h |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 60h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
call dword ptr [0040D268h] |
mov dword ptr [0040A69Ch], eax |
xor eax, eax |
mov al, byte ptr [0040A69Dh] |
mov dword ptr [0040A6A8h], eax |
mov eax, dword ptr [0040A69Ch] |
shr dword ptr [0040A69Ch], 10h |
and eax, 000000FFh |
mov dword ptr [0040A6A4h], eax |
shl eax, 08h |
add eax, dword ptr [0040A6A8h] |
mov dword ptr [0040A6A0h], eax |
call 00007F03C0B952BFh |
test eax, eax |
jne 00007F03C0B925CCh |
push 0000001Ch |
call 00007F03C0B926F4h |
add esp, 04h |
mov dword ptr [ebp-04h], 00000000h |
call 00007F03C0B950C5h |
call 00007F03C0B950B0h |
call dword ptr [0040D264h] |
mov dword ptr [0040CC20h], eax |
call 00007F03C0B94C50h |
mov dword ptr [0040A650h], eax |
test eax, eax |
je 00007F03C0B925CBh |
cmp dword ptr [0040CC20h], 00000000h |
jne 00007F03C0B925CCh |
push FFFFFFFFh |
call 00007F03C0B945C7h |
add esp, 04h |
call 00007F03C0B949AFh |
call 00007F03C0B948BAh |
call 00007F03C0B94585h |
mov esi, dword ptr [0040CC20h] |
mov al, byte ptr [esi] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xd000 | 0x8c | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0x18f7c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x27000 | 0x738 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xd1c8 | 0x13c | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x7356 | 0x7400 | 6cda577795530a6bdb8e5ac96377b65e | False | 0.5414870689655172 | data | 6.378140211666413 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0xa70 | 0xc00 | c26d19dc65337ad5fc37f9a3f0e93f8d | False | 0.310546875 | data | 3.8405315488358767 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x2c24 | 0x1a00 | c6e07bbc1ea42cbac1515ac79b15f24b | False | 0.193359375 | Matlab v4 mat-file (little endian) \200y@, numeric, rows 4219008, columns 0 | 2.6305171993722247 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xd000 | 0x82c | 0xa00 | d9877bd20f29611bb50f027619bdb1cd | False | 0.3984375 | data | 4.453418786815203 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xe000 | 0x18f7c | 0x19000 | 00a1a7a8089b5f9d1155b21364bb1f2a | False | 0.92599609375 | data | 7.641612169076372 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x27000 | 0x9da | 0xa00 | ef86229b9e53e4b6920544bb3ac7b65c | False | 0.640625 | data | 5.499141507211834 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xe358 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.4112903225806452 |
RT_ICON | 0xe640 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024 | English | United States | 0.4129061371841155 |
RT_DIALOG | 0xe250 | 0x108 | data | English | United States | 0.5946969696969697 |
RT_RCDATA | 0x24200 | 0xec | MS Compress archive data, SZDD variant, original size: 387 bytes | English | United States | 1.0466101694915255 |
RT_RCDATA | 0xf2ec | 0x14f13 | MS Compress archive data, SZDD variant, original size: 149504 bytes | English | United States | 0.9542312220939857 |
RT_RCDATA | 0x242ec | 0x2c8f | MS Compress archive data, SZDD variant, original size: 17064 bytes | English | United States | 0.9118962040852109 |
RT_GROUP_ICON | 0xeee8 | 0x22 | data | English | United States | 1.0588235294117647 |
RT_VERSION | 0xef0c | 0x3e0 | data | English | United States | 0.4153225806451613 |
DLL | Import |
---|---|
KERNEL32.dll | LockResource, LoadResource, SizeofResource, FindResourceA, GetTempFileNameA, GetTempPathA, GetShortPathNameA, CreateFileA, HeapReAlloc, ReadFile, SetEndOfFile, LoadLibraryA, GetProcAddress, SetFilePointer, FlushFileBuffers, WriteFile, DeleteFileA, CloseHandle, MultiByteToWideChar, CreateDirectoryA, SetStdHandle, VirtualAlloc, IsBadCodePtr, IsBadWritePtr, IsBadReadPtr, SetUnhandledExceptionFilter, VirtualFree, HeapCreate, HeapDestroy, GetStdHandle, RtlUnwind, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, HeapFree, GetLastError, HeapAlloc, ExitProcess, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, WideCharToMultiByte, GetCPInfo, GetACP, GetOEMCP, SetHandleCount, GetFileType, HeapSize |
USER32.dll | SetWindowTextA, MessageBoxA, SetDlgItemTextA, EndDialog, SetWindowPos, DialogBoxParamA, GetDlgItemTextA |
ADVAPI32.dll | RegSetValueExA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey, RegCreateKeyExA |
SHELL32.dll | SHGetPathFromIDListA, SHBrowseForFolderA |
ole32.dll | CoInitialize, CoUninitialize, CoCreateInstance |
VERSION.dll | VerInstallFileA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 28, 2025 08:53:29.968595028 CET | 1.1.1.1 | 192.168.2.10 | 0x36d8 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 28, 2025 08:53:29.968595028 CET | 1.1.1.1 | 192.168.2.10 | 0x36d8 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false | ||
Jan 28, 2025 08:53:49.301665068 CET | 1.1.1.1 | 192.168.2.10 | 0x463b | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Jan 28, 2025 08:53:49.301665068 CET | 1.1.1.1 | 192.168.2.10 | 0x463b | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 02:53:31 |
Start date: | 28/01/2025 |
Path: | C:\Users\user\Desktop\pumpkin-2.7.3.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 147'968 bytes |
MD5 hash: | C70DF19686F26DEBC376CCCD7CE301A3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 25.2% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 8.8% |
Total number of Nodes: | 749 |
Total number of Limit Nodes: | 49 |
Graph
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|