Edit tour

Windows Analysis Report
Setup_10024.exe

Overview

General Information

Sample name:Setup_10024.exe
Analysis ID:1606440
MD5:bfad6caba29a22aa27a440152efbd209
SHA1:c6412638a55ef72620a80b1094314e57d606b791
SHA256:04b664179383f4a07083bb61829edf904f2909f621b76ca2bbd64285bbe594a5
Infos:

Detection

Score:36
Range:0 - 100
Confidence:40%

Compliance

Score:47
Range:0 - 100

Signatures

Antivirus detection for URL or domain
Detected non-DNS traffic on DNS port
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Setup_10024.exe (PID: 4048 cmdline: "C:\Users\user\Desktop\Setup_10024.exe" MD5: BFAD6CABA29A22AA27A440152EFBD209)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://appstalation.com/7104A12B017289DF/03034061431/24F3D2C94E09B5D1/73866997400?8DC009539E55612A1738669974Avira URL Cloud: Label: malware
Source: Setup_10024.exe, 00000004.00000000.1272721694.00000000010F0000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_9ad28667-1

Compliance

barindex
Source: Setup_10024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Setup_10024.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 104.26.13.137:443 -> 192.168.2.7:49704 version: TLS 1.2
Source: Setup_10024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficTCP traffic: 192.168.2.7:59214 -> 162.159.36.2:53
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /7104A12B017289DF/03034061431/24F3D2C94E09B5D1/73866997400?8DC009539E55612A1738669974 HTTP/1.1Host: appstalation.comUser-Agent: NSIS_InetLoad (Mozilla)Accept: */*
Source: global trafficDNS traffic detected: DNS query: appstalation.com
Source: Setup_10024.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Setup_10024.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Setup_10024.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Setup_10024.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Setup_10024.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Setup_10024.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Setup_10024.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Setup_10024.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Setup_10024.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: Setup_10024.exeString found in binary or memory: http://ocsp.digicert.com0
Source: Setup_10024.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: Setup_10024.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Setup_10024.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: Setup_10024.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: TeXworks0.6.2.exe.4.drString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: Setup_10024.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Setup_10024.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Setup_10024.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 104.26.13.137:443 -> 192.168.2.7:49704 version: TLS 1.2
Source: Setup_10024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus36.winEXE@1/1@1/2
Source: C:\Users\user\Desktop\Setup_10024.exeFile created: C:\Users\user\AppData\Local\LovingImpulsedqvApplicationJump to behavior
Source: Setup_10024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Setup_10024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Setup_10024.exeString found in binary or memory: easy handle already used in multi handleSet-Cookie:RELOADFLUSHSESSALL%dgetaddrinfo() thread failed to startAddDllDirectory\/LoadLibraryExWkernel32if_nametoindexiphlpapi.dllmultiH
Source: Setup_10024.exeString found in binary or memory: */adD
Source: C:\Users\user\Desktop\Setup_10024.exeFile read: C:\Users\user\Desktop\Setup_10024.exeJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Setup_10024.exeStatic PE information: certificate valid
Source: Setup_10024.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Setup_10024.exeStatic file information: File size 71918304 > 1048576
Source: Setup_10024.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x59ec00
Source: Setup_10024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Setup_10024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Setup_10024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Setup_10024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Setup_10024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Setup_10024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Setup_10024.exeFile created: C:\Users\user\Desktop\TeXworks0.6.2.exeJump to dropped file
Source: C:\Users\user\Desktop\Setup_10024.exeDropped PE file which has not been started: C:\Users\user\Desktop\TeXworks0.6.2.exeJump to dropped file
Source: Setup_10024.exe, 00000004.00000003.1285673894.0000000003515000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V VHDPMEM BTT Filter
Source: Setup_10024.exe, 00000004.00000003.1285783878.0000000003511000.00000004.00000020.00020000.00000000.sdmp, Setup_10024.exe, 00000004.00000003.1285631133.000000000352B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Storage Accelerator
Source: Setup_10024.exeBinary or memory string: Au1Ofc?1:q.HgfS)1IU7ma!o~6qyzuz
Source: Setup_10024.exe, 00000004.00000003.1285783878.0000000003511000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ner ExtensionVerifierExterExtMicrosoft Virtual Drive EnumeratorDrive EnumeratorvdrvrootootUSB xHCI Compliant Host Controller Host ControllerUSBXHCIHCIMicrosoft USB Universal Host Controller Miniport Driver Controller Miniport DriverusbuhcihciUSB Mass Storage Driverrage DriverUSBSTORTORMicrosoft USB Serial DriverSerial DriverusbsererMicrosoft USB PRINTER ClassPRINTER ClassusbprintintMicrosoft USB Open Host Controller Miniport Driverntroller Miniport DriverusbohcihciSuperSpeed Hubed HubUSBHUB3UB3Microsoft USB Standard Hub Driverndard Hub DriverusbhububMicrosoft USB 2.0 Enhanced Host Controller Miniport Drivert Controller Miniport DriverusbehcihcieHome Infrared Receiver (USBCIR)ceiver (USBCIR)usbcirirMicrosoft USB Generic Parent Driverric Parent DriverusbccgpcgpUSB Audio 2.0 Service.0 Serviceusbaudio2dio2USB Audio Driver (WDM)iver (WDM)usbaudiodioSynopsys USB Role-Switch Drivere-Switch DriverUrsSynopsysopsysUSB Role-Switch Support LibrarySupport LibraryUrsCx010001000Chipidea USB Role-Switch Drivere-Switch DriverUrsChipideapideaMicrosoft UMPass DriverPass DriverUmPassssUMBus Enumerator Driverator DriverumbususUSB Synopsys Controller ControllerufxsynopsysopsysUSB Chipidea Controller ControllerUfxChipideapideaUSB Function Class Extensionass ExtensionUfx01000000UevAgentDriverDriverUevAgentDriverDriverMicrosoft UEFI DriverEFI DriverUEFIIudfssudfssUSB Device Emulation Support Libraryn Support LibraryUdeCxCxUSB Host Support Libraryort LibraryUcx01000000UCM-UCSI KMDF Class Extensionlass ExtensionUcmUcsiCx0101Cx0101UCM-UCSI ACPI ClientPI ClientUcmUcsiAcpiClientpiClientUCM-TCPCI KMDF Class Extensionlass ExtensionUcmTcpciCx0101Cx0101USB Connector Manager KMDF Class ExtensionKMDF Class ExtensionUcmCx01010101USB Attached SCSI (UAS) DriverI (UAS) DriverUASPStortorMicrosoft Tunnel Miniport Adapter Driverport Adapter DrivertunnelelRemote Desktop USB Hubop USB HubtsusbhubhubRemote Desktop Generic USB Deviceneric USB DeviceTsUsbGDbGDRemote Desktop USB Hub Class Filter Driver Class Filter DriverTsUsbFltFltTPMMTPMMMicrosoft Remote Desktop Input Driversktop Input DriverterminptnptIntel(R) Telemetry Serviceetry ServiceTelemetryetryNetIO Legacy TDI Support Driver Support DrivertdxxTCP/IP Registry Compatibility Compatibilitytcpipregreg@todo.dll,-100;Microsoft IPv6 Protocol Drivert IPv6 Protocol DriverTcpip6p6TCP/IP Protocol Drivercol DriverTcpipipSynth3dVscdVscSynth3dVscdVscSoftware Bus Driverus DriverswenumumstorvscvscstorvscvscMicrosoft Universal Flash Storage (UFS) Driverh Storage (UFS) DriverstorufsufsStorage QoS Filter Driverilter DriverstorqosfltsfltMicrosoft Standard NVM Express DriverNVM Express DriverstornvmevmeMicrosoft Hyper-V Storage Acceleratortorage AcceleratorstorfltfltMicrosoft Standard SATA AHCI Driver SATA AHCI Driverstorahci
Source: Setup_10024.exe, 00000004.00000003.1285673894.0000000003515000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Setup_10024.exe, 00000004.00000003.1285783878.0000000003511000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Virtual PCI Bus
Source: Setup_10024.exe, 00000004.00000003.1285631133.000000000352B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft USB 2.0 Enhanced Host Controller Miniport Drivert Controller Miniport DriverusbehcihcieHome Infrared Receiver (USBCIR)ceiver (USBCIR)usbcirirMicrosoft USB Generic Parent Driverric Parent DriverusbccgpcgpUSB Audio 2.0 Service.0 Serviceusbaudio2dio2USB Audio Driver (WDM)iver (WDM)usbaudiodioSynopsys USB Role-Switch Drivere-Switch DriverUrsSynopsysopsysUSB Role-Switch Support LibrarySupport LibraryUrsCx010001000Chipidea USB Role-Switch Drivere-Switch DriverUrsChipideapideaMicrosoft UMPass DriverPass DriverUmPassssUMBus Enumerator Driverator DriverumbususUSB Synopsys Controller ControllerufxsynopsysopsysUSB Chipidea Controller ControllerUfxChipideapideaUSB Function Class Extensionass ExtensionUfx01000000UevAgentDriverDriverUevAgentDriverDriverMicrosoft UEFI DriverEFI DriverUEFIIudfssudfssUSB Device Emulation Support Libraryn Support LibraryUdeCxCxUSB Host Support Libraryort LibraryUcx01000000UCM-UCSI KMDF Class Extensionlass ExtensionUcmUcsiCx0101Cx0101UCM-UCSI ACPI ClientPI ClientUcmUcsiAcpiClientpiClientUCM-TCPCI KMDF Class Extensionlass ExtensionUcmTcpciCx0101Cx0101USB Connector Manager KMDF Class ExtensionKMDF Class ExtensionUcmCx01010101USB Attached SCSI (UAS) DriverI (UAS) DriverUASPStortorMicrosoft Tunnel Miniport Adapter Driverport Adapter DrivertunnelelRemote Desktop USB Hubop USB HubtsusbhubhubRemote Desktop Generic USB Deviceneric USB DeviceTsUsbGDbGDRemote Desktop USB Hub Class Filter Driver Class Filter DriverTsUsbFltFltTPMMTPMMMicrosoft Remote Desktop Input Driversktop Input DriverterminptnptIntel(R) Telemetry Serviceetry ServiceTelemetryetryNetIO Legacy TDI Support Driver Support DrivertdxxTCP/IP Registry Compatibility Compatibilitytcpipregreg@todo.dll,-100;Microsoft IPv6 Protocol Drivert IPv6 Protocol DriverTcpip6p6TCP/IP Protocol Drivercol DriverTcpipipSynth3dVscdVscSynth3dVscdVscSoftware Bus Driverus DriverswenumumstorvscvscstorvscvscMicrosoft Universal Flash Storage (UFS) Driverh Storage (UFS) DriverstorufsufsStorage QoS Filter Driverilter DriverstorqosfltsfltMicrosoft Standard NVM Express DriverNVM Express DriverstornvmevmeMicrosoft Hyper-V Storage Acceleratortorage AcceleratorstorfltfltMicrosoft Standard SATA AHCI Driver SATA AHCI DriverstorahcihcistexstortorstexstortorsrvnetetsrvnetetServer SMB 2.x8Q
Source: Setup_10024.exe, 00000004.00000003.1285783878.0000000003511000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Guest Infrastructure Driver
Source: Setup_10024.exe, 00000004.00000003.1285783878.0000000003511000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware VMCI Bus Driver
Source: Setup_10024.exe, 00000004.00000003.1285783878.0000000003511000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XINPUT HID Filter Driverlter DriverxinputhidthidXbox Game Input Protocol DriverProtocol DriverxboxgipgipWindows Driver Foundation - User-mode Driver Framework Reflectormode Driver Framework ReflectorWUDFRdRdUser Mode Driver Frameworks Platform Driverworks Platform DriverWudfPfPfWinsock IFS DriverS Driverws2ifslfslWPD Upper Class Filter Driver Filter DriverWpdUpFltrFltrWindows Overlay File System Filter DriverSystem Filter DriverWoffMicrosoft Windows Management Interface for ACPIment Interface for ACPIWmiAcpicpiWinVerbs ServiceServiceWinVerbsrbsWinUsb DriverDriverWINUSBSBWindows NAT DriverT DriverWinNatatWinMad ServiceerviceWinMadadMicrosoft Windows Trusted Runtime Secure Service Runtime Secure ServiceWindowsTrustedRTProxytedRTProxyWindows Trusted Execution Environment Class Extensionnvironment Class ExtensionWindowsTrustedRTustedRTWIMMountuntWIMMountuntMicrosoft Windows Filtering Platformiltering PlatformWFPLWFSWFSMicrosoft Defender Antivirus Network Inspection System Drivertwork Inspection System DriverWdNisDrvDrvWdmCompanionFilteronFilterWdmCompanionFilteronFilterWDI Driver FrameworkFrameworkwdiwifiifiMicrosoft Defender Antivirus Mini-Filter Driverirus Mini-Filter DriverWdFilterterKernel Mode Driver Frameworks serviceFrameworks serviceWdf01000000Microsoft Defender Antivirus Boot Drivertivirus Boot DriverWdBoototWindows Container Name Virtualizationame VirtualizationwcnfsfsWindows Container Isolationner IsolationwcifsfsRemote Access IPv6 ARP DriverPv6 ARP Driverwanarpv6pv6Remote Access IP ARP DriverIP ARP DriverwanarprpWacom Serial Pen HID Driveren HID DriverWacomPenPenVirtual WiFi Filter Driverilter DrivervwififltfltVirtual Wireless Bus Driverss Bus DrivervwifibusbusVIA StorX Storage RAID Controller Windows Driverntroller Windows DriverVSTXRAIDAIDvsmraidaidvsmraidaidMicrosoft Hyper-V Virtual PCI Bus Virtual PCI BusvpciiVolume driverdrivervolumemeVolume Shadow Copy driver Copy drivervolsnapnapDynamic Volume Managerme ManagervolmgrxgrxVolume Manager Driverger DrivervolmgrgrMicrosoft Hyper-V Guest Infrastructure Driver Infrastructure DrivervmgididVMware VMCI Bus DriverBus DrivervmciiVMBusHIDHIDVMBusHIDHIDVirtual Machine Buschine BusvmbususVirtualRenderRenderVirtualRenderRenderViddViddVirtual HID Framework (VHF) Driverork (VHF) DrivervhffvhdmpmpvhdmpmpDriver V
Source: C:\Users\user\Desktop\Setup_10024.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Setup_10024.exeProcess token adjusted: DebugJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1606440 Sample: Setup_10024.exe Startdate: 04/02/2025 Architecture: WINDOWS Score: 36 12 appstalation.com 2->12 18 Antivirus detection for URL or domain 2->18 6 Setup_10024.exe 2 2->6         started        signatures3 process4 dnsIp5 14 appstalation.com 104.26.13.137, 443, 49704 CLOUDFLARENETUS United States 6->14 16 127.0.0.1 unknown unknown 6->16 10 C:\Users\user\Desktop\TeXworks0.6.2.exe, PE32 6->10 dropped file6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\TeXworks0.6.2.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://appstalation.com/7104A12B017289DF/03034061431/24F3D2C94E09B5D1/73866997400?8DC009539E55612A1738669974100%Avira URL Cloudmalware

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
appstalation.com
104.26.13.137
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://appstalation.com/7104A12B017289DF/03034061431/24F3D2C94E09B5D1/73866997400?8DC009539E55612A1738669974false
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://curl.se/docs/hsts.htmlSetup_10024.exefalse
      high
      https://curl.se/docs/alt-svc.htmlSetup_10024.exefalse
        high
        https://curl.se/docs/http-cookies.htmlSetup_10024.exefalse
          high
          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUTeXworks0.6.2.exe.4.drfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            104.26.13.137
            appstalation.comUnited States
            13335CLOUDFLARENETUSfalse
            IP
            127.0.0.1
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1606440
            Start date and time:2025-02-04 12:51:58 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 40s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Setup_10024.exe
            Detection:SUS
            Classification:sus36.winEXE@1/1@1/2
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            No simulations
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUSSWIFT.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
            • 104.21.16.1
            https://gffd-5ru.pages.dev/?email=nobody@wp.pl&mail=wp.plGet hashmaliciousHTMLPhisherBrowse
            • 188.114.97.3
            FD69000089087654567800009876545678900.pif.exeGet hashmaliciousSnake KeyloggerBrowse
            • 104.21.80.1
            CONFIDENTIAL_PAYMENT_CONFIRMATION_TRANSACTION_DETAILS_022025.PDF.EXE.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            Pre-alert documents.exeGet hashmaliciousFormBookBrowse
            • 104.21.35.208
            Rfq_quality_purchase_product_specification_order_list_04_02_2025_000000000000000.vbsGet hashmaliciousFormBookBrowse
            • 172.67.197.221
            proforma invoice.exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            https://boxesiamanorhornas.com/4439750220Get hashmaliciousUnknownBrowse
            • 104.17.25.14
            H-CaseFile987763403 Hc Doc.pdfGet hashmaliciousUnknownBrowse
            • 104.26.4.170
            ORDER 000227APD.exeGet hashmaliciousFormBookBrowse
            • 188.114.96.3
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            3b5074b1b5d032e5620f69f9f700ff0ehttps://proveedores.veochile.netGet hashmaliciousUnknownBrowse
            • 104.26.13.137
            http://80.64.30.238/evix.xllGet hashmaliciousUnknownBrowse
            • 104.26.13.137
            CONFIDENTIAL_PAYMENT_CONFIRMATION_TRANSACTION_DETAILS_022025.PDF.EXE.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.137
            Rfq_quality_purchase_product_specification_order_list_04_02_2025_000000000000000.vbsGet hashmaliciousFormBookBrowse
            • 104.26.13.137
            proforma invoice.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.137
            BBVA S.A.,PDF.vbsGet hashmaliciousRemcosBrowse
            • 104.26.13.137
            https://links.gupd.marketgainsupdates.com/track?uid=30ea94e6-865b-421e-ba6c-e375addd3b67&txnid=df182e0a-ee0c-43a0-9c6a-de7587a3d304&eid=2d72fd75-75d2-48dd-9f40-508cdd1145ed&mid=32fe6f62-b035-4b1e-b06d-9915d5916d07&bsft_ek=2025-02-03T21%3A28%3A11Z&bsft_mime_type=html&bsft_tv=7&bsft_lx=8&bsft_aaid=2b681735-0241-464e-9928-6f7f561dab54&a=click&redir=https%3A%2F%2Ftrack.marketgainsupdates.com%2F6790d5c4865e7f7867f0af5b%3Femail%3Dcliff.pettit%2540technipfmc.com%26domain%3D092MGU%26type%3Dunsub%26utm_campaign%3Dmgu-adsr1-03-02-3%26utm_source%3Dblueshift%26utm_medium%3Demail%26utm_content%3Dmgu-adsr1-03-02-3-nocopyGet hashmaliciousUnknownBrowse
            • 104.26.13.137
            Nowe zam#U00f3wienie 06645478721 - PRODUCEL POLSKA.com.exeGet hashmaliciousQuasarBrowse
            • 104.26.13.137
            130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
            • 104.26.13.137
            http://form.runGet hashmaliciousUnknownBrowse
            • 104.26.13.137
            No context
            Process:C:\Users\user\Desktop\Setup_10024.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):15680108
            Entropy (8bit):7.99867394510982
            Encrypted:true
            SSDEEP:393216:6EZ4UtuDZy1VABW1d5pKYcun8WUusjhIjIppfBugo0:6EZ4UtuDZy1ye3n8jusjhI2YgN
            MD5:DADEC2CE17A256082B1AB0ECC92A01E8
            SHA1:4EAD9DCEFD976862F68FDFF26F5A6C80EF11AAFA
            SHA-256:E5847ADB23DFB0944D20890CF0F027A322BCEF323CC98F658D89A16F9CB22AB7
            SHA-512:55FB9872DE9C98BD4BDFA0298F3273A8F76C138D1D18FC1984CEB6AEF25C82198C69B834F9480F9A90744A6728C7BACCB167595B539D3F3679F7137BD4101533
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......W.....................r............... ....@.......................... ............@......@.......................................P...........................................................................................................text...D........................... ..`.itext..d........................... ..`.data........ ......................@....bss.....V...0...........................idata..............................@....tls.................&...................rdata...............&..............@..@.rsrc....`.......R...(..............@..@....................................@..@........................................................................................................................................
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):3.913419666383093
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Setup_10024.exe
            File size:71'918'304 bytes
            MD5:bfad6caba29a22aa27a440152efbd209
            SHA1:c6412638a55ef72620a80b1094314e57d606b791
            SHA256:04b664179383f4a07083bb61829edf904f2909f621b76ca2bbd64285bbe594a5
            SHA512:fc58e2f2db12cbccee9a87657ece27e6b6bf031713a05dd172f6515e724d411b161881de688ac12e4a269cee72d5453d6460b3a059a41de31eb50011bbc98955
            SSDEEP:393216:nHlKgQ0KjRLjx+kpOJBO39wqjJdPrwZxhYSE/5rQpjIOsv/+Nj2:nFKgQlpOJBO3COiYSI5rQpjc8j
            TLSH:88F7CFEAC7ADF491EFF240F07B1B96D03659D5F8182A46E77F8753412820E42E260E97
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........B....................)...............................................................Rich............................PE..L..
            Icon Hash:b8868baba9aba2d8
            Entrypoint:0x939cca
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x67223DA0 [Wed Oct 30 14:07:28 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:ea425b7c70eb4c9431e5bb4f75b4971b
            Signature Valid:true
            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
            Signature Validation Error:The operation completed successfully
            Error Number:0
            Not Before, Not After
            • 28/02/2024 19:00:00 18/12/2024 18:59:59
            Subject Chain
            • CN=Jackson Developments LLC, O=Jackson Developments LLC, L=Dover, S=Delaware, C=US, SERIALNUMBER=3701621, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
            Version:3
            Thumbprint MD5:5A11C551A8D20A8C5238A62B74CAC438
            Thumbprint SHA-1:48CBF673067F3ED932E4A3EB963769A38585282A
            Thumbprint SHA-256:B04E2F1A13F12F9ECBAAB781B377C2A6E47BE389EAC501DF4F71E037E13DDAD9
            Serial:01C1631B482989063EA7E766EA023FA2
            Instruction
            call 00007F4E113E0BFEh
            jmp 00007F4E113D903Eh
            push edi
            mov eax, esi
            and eax, 0Fh
            test eax, eax
            jne 00007F4E113D9277h
            mov edx, ecx
            and ecx, 7Fh
            shr edx, 07h
            je 00007F4E113D9217h
            jmp 00007F4E113D91B8h
            lea ebx, dword ptr [ebx+00000000h]
            movdqa xmm0, dqword ptr [esi]
            movdqa xmm1, dqword ptr [esi+10h]
            movdqa xmm2, dqword ptr [esi+20h]
            movdqa xmm3, dqword ptr [esi+30h]
            movdqa dqword ptr [edi], xmm0
            movdqa dqword ptr [edi+10h], xmm1
            movdqa dqword ptr [edi+20h], xmm2
            movdqa dqword ptr [edi+30h], xmm3
            movdqa xmm4, dqword ptr [esi+40h]
            movdqa xmm5, dqword ptr [esi+50h]
            movdqa xmm6, dqword ptr [esi+60h]
            movdqa xmm7, dqword ptr [esi+70h]
            movdqa dqword ptr [edi+40h], xmm4
            movdqa dqword ptr [edi+50h], xmm5
            movdqa dqword ptr [edi+60h], xmm6
            movdqa dqword ptr [edi+70h], xmm7
            lea esi, dword ptr [esi+00000080h]
            lea edi, dword ptr [edi+00000080h]
            dec edx
            jne 00007F4E113D9155h
            test ecx, ecx
            je 00007F4E113D91FBh
            mov edx, ecx
            shr edx, 04h
            test edx, edx
            je 00007F4E113D91C9h
            lea ebx, dword ptr [ebx+00000000h]
            movdqa xmm0, dqword ptr [esi]
            movdqa dqword ptr [edi], xmm0
            lea esi, dword ptr [esi+10h]
            lea edi, dword ptr [edi+10h]
            dec edx
            jne 00007F4E113D91A1h
            and ecx, 0Fh
            je 00007F4E113D91D6h
            mov eax, ecx
            shr ecx, 02h
            je 00007F4E113D91BFh
            mov edx, dword ptr [esi]
            mov dword ptr [edi], edx
            lea esi, dword ptr [esi+04h]
            lea edi, dword ptr [edi+04h]
            dec ecx
            jne 00007F4E113D91A5h
            mov ecx, eax
            and ecx, 00000000h
            Programming Language:
            • [ASM] VS2005 build 50727
            • [IMP] VS2005 build 50727
            • [ C ] VS2005 build 50727
            • [C++] VS2005 build 50727
            • [RES] VS2005 build 50727
            • [LNK] VS2005 build 50727
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x5d3b540xc8.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5df0000x2548.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x14ca5e00x2fcbd00
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e20000x14cf8.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5cbfa00x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x5a00000x460.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x59ea9c0x59ec004e8e2070662fb1f1b862554e5ed481b7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x5a00000x351140x352006b72797e4f2940752d77ee6cce93dfe0False0.4638465073529412data5.575404213470285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x5d60000x8bec0x2800379ac5897895e03b9d53ff25e69af227False0.2853515625data4.423791020840206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x5df0000x25480x2600e7d863cae69777cd49f951deda479947False0.3195929276315789data3.8420086869927177IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x5e20000x171920x1720070038d4d7075355a13eb8a7385b2758bFalse0.5490920608108109data6.2094324351967565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x5df8280x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.16532258064516128
            RT_ICON0x5dfb100x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.32094594594594594
            RT_DIALOG0x5e01b00x2b8dataEnglishUnited States0.4755747126436782
            RT_DIALOG0x5dfc600x12edataEnglishUnited States0.6225165562913907
            RT_DIALOG0x5dfd900x2f4dataEnglishUnited States0.48148148148148145
            RT_DIALOG0x5e00880x126dataEnglishUnited States0.5850340136054422
            RT_STRING0x5e0ac80x3eMatlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.6774193548387096
            RT_STRING0x5e0a800x42dataEnglishUnited States0.7121212121212122
            RT_STRING0x5e0b080x60dataEnglishUnited States0.5625
            RT_STRING0x5e15180x30dataEnglishUnited States0.5833333333333334
            RT_STRING0x5e0b680x208Matlab v4 mat-file (little endian) h, numeric, rows 0, columns 0EnglishUnited States0.4269230769230769
            RT_STRING0x5e0d700xe2Matlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.43805309734513276
            RT_STRING0x5e0e580x34dataEnglishUnited States0.6538461538461539
            RT_STRING0x5e0e900x30dataEnglishUnited States0.6041666666666666
            RT_STRING0x5e0ec00x6eMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0EnglishUnited States0.6818181818181818
            RT_STRING0x5e0f300x11adataEnglishUnited States0.5035460992907801
            RT_STRING0x5e10500x6adataEnglishUnited States0.5471698113207547
            RT_STRING0x5e0a480x32dataEnglishUnited States0.58
            RT_STRING0x5e10c00x1eadataEnglishUnited States0.363265306122449
            RT_STRING0x5e12b00x156Matlab v4 mat-file (little endian) U, numeric, rows 0, columns 0EnglishUnited States0.5175438596491229
            RT_STRING0x5e14080x56dataEnglishUnited States0.6162790697674418
            RT_STRING0x5e14600xb6dataEnglishUnited States0.5164835164835165
            RT_GROUP_ICON0x5dfc380x22dataEnglishUnited States1.0
            RT_VERSION0x5df5500x2d4dataEnglishUnited States0.4212707182320442
            RT_MANIFEST0x5e04680x5deXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.46604527296937415
            DLLImport
            KERNEL32.dllMoveFileW, IsValidCodePage, GetLocaleInfoW, CreateDirectoryW, CreateSemaphoreW, WriteConsoleW, VirtualAlloc, CompareStringW, GetProcessAffinityMask, FlushFileBuffers, GetTimeZoneInformation, InitializeCriticalSectionAndSpinCount, LCMapStringW, GlobalFree, GetTimeFormatA, RaiseException, TlsSetValue, RtlUnwind, DeleteFileA, Sleep, GetFileSizeEx, GetLastError, CompareFileTime, GetDateFormatA, HeapAlloc, WriteFile, HeapReAlloc, TlsFree, DecodePointer, CloseHandle, GetStdHandle, GetModuleFileNameA, VerifyVersionInfoW, IsValidLocale, GlobalLock, GetFileType, EnterCriticalSection, SetStdHandle, FindFirstFileW, IsProcessorFeaturePresent, GetCommandLineW, LoadLibraryA, GetEnvironmentVariableA, GetModuleHandleW, LoadLibraryExW, DeleteCriticalSection, IsDebuggerPresent, CreateThread, GetEnvironmentStringsW, SetLastError, GetSystemTimeAsFileTime, MoveFileExW, GetCurrentProcessId, GetFileInformationByHandle, HeapSize, PeekNamedPipe, GetModuleHandleA, WideCharToMultiByte, TlsAlloc, GetSystemInfo, FindClose, GetCurrentProcess, GlobalMemoryStatus, WaitForMultipleObjects, FormatMessageW, SetEndOfFile, QueryPerformanceFrequency, EncodePointer, GetUserDefaultLCID, FileTimeToLocalFileTime, TlsGetValue, ReleaseSemaphore, lstrlenA, QueryPerformanceCounter, RemoveDirectoryW, GetStringTypeW, FreeLibrary, MultiByteToWideChar, FreeEnvironmentStringsW, InterlockedDecrement, GlobalUnlock, GetConsoleCP, GetCurrentDirectoryW, SetUnhandledExceptionFilter, SleepEx, CreateFileW, ResetEvent, VirtualFree, UnhandledExceptionFilter, EnumSystemLocalesA, LocalFree, DeleteFileW, GetConsoleMode, GetVersion, GetTickCount, ReadFile, GetDriveTypeW, WaitForSingleObject, SetFileAttributesW, SetEvent, CreateEventW, SetHandleCount, GetProcAddress, HeapFree, GetVersionExW, GlobalAlloc, GetFileAttributesW, HeapSetInformation, GetTickCount64, HeapCreate, LoadLibraryW, LeaveCriticalSection, VerSetConditionMask, GetCurrentThreadId, GetLogicalDriveStringsW, SetPriorityClass, TerminateProcess, GetOEMCP, ExitThread, InterlockedExchange, GetACP, InitializeCriticalSection, GetFileSize, FileTimeToSystemTime, GetSystemDirectoryW, GetCommandLineA, GetLocaleInfoA, GetModuleFileNameW, GetCPInfo, FindNextFileW, ExitProcess, SetEnvironmentVariableA, VirtualQuery, GetStartupInfoW, FindFirstFileExW, InterlockedIncrement, GetProcessHeap, SetFileTime, GetFullPathNameW, SetFilePointer
            USER32.dllSetWindowLongW, GetParent, EmptyClipboard, MonitorFromWindow, GetWindowRect, EndDialog, SetFocus, IsDlgButtonChecked, MoveWindow, CheckDlgButton, ShowWindow, EnableWindow, SetWindowTextW, GetDlgItem, SetDlgItemTextW, ScreenToClient, PostMessageW, GetWindowLongW, KillTimer, GetWindowTextLengthW, CharUpperW, SetCursor, wsprintfA, SetClipboardData, InvalidateRect, LoadStringW, SetTimer, GetWindowTextW, SendMessageW, OpenClipboard, DialogBoxParamW, CloseClipboard, GetMonitorInfoA, LoadCursorW, GetFocus, SystemParametersInfoW, GetKeyState, MapDialogRect, LoadIconW, MessageBoxW
            ADVAPI32.dllCryptDestroyHash, CryptDestroyKey, CryptHashData, CloseServiceHandle, CryptGetHashParam, CryptReleaseContext, CryptCreateHash, CryptEncrypt, CryptImportKey, CryptAcquireContextW, CryptGenRandom
            SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW
            ole32.dllCoTaskMemFree, CoCreateInstance, OleInitialize, CoInitialize, CoUninitialize
            OLEAUT32.dllSysAllocString, SysStringLen, SysAllocStringLen, VariantClear, SysFreeString
            WS2_32.dllWSAEnumNetworkEvents, WSAWaitForMultipleEvents, WSAIoctl, WSACreateEvent, getaddrinfo, WSAEventSelect, WSAStartup, recvfrom, WSACleanup, WSAGetLastError, send, closesocket, gethostname, ioctlsocket, __WSAFDIsSet, select, recv, WSAResetEvent, setsockopt, getsockname, ntohs, bind, htons, getsockopt, getpeername, socket, connect, WSASetLastError, freeaddrinfo, WSACloseEvent, accept, listen, sendto, htonl
            CRYPT32.dllCertOpenStore, CertAddCertificateContextToStore, CertCloseStore, CryptQueryObject, CertFreeCertificateChainEngine, CertEnumCertificatesInStore, CryptDecodeObjectEx, CertFreeCertificateChain, CertFreeCertificateContext, CertFindExtension, CertGetCertificateChain, CryptStringToBinaryW, CertCreateCertificateChainEngine, CertFindCertificateInStore, PFXImportCertStore
            WLDAP32.dll
            DescriptionData
            CompanyNameLoving Impulse Studios
            FileDescriptionTeX work Loving Impulse Studios
            FileVersion1.0.0.0
            ProductVersion1.0.0.0
            LegalCopyrightCopyright 2010-2024 Loving Impulse Studios
            ProductNameTeX work Loving Impulse Studio
            Translation0x0409 0x04b0
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Download Network PCAP: filteredfull

            • Total Packets: 13
            • 443 (HTTPS)
            • 53 (DNS)
            TimestampSource PortDest PortSource IPDest IP
            Feb 4, 2025 12:52:55.541482925 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:55.541516066 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:55.541618109 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:55.591660976 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:55.591676950 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:56.054897070 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:56.054960966 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:56.066931009 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:56.066943884 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:56.067178965 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:56.096885920 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:56.139333963 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:56.263935089 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:56.264045000 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:52:56.264142036 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:56.289908886 CET49704443192.168.2.7104.26.13.137
            Feb 4, 2025 12:52:56.289937973 CET44349704104.26.13.137192.168.2.7
            Feb 4, 2025 12:53:38.755935907 CET5921453192.168.2.7162.159.36.2
            Feb 4, 2025 12:53:38.761723042 CET5359214162.159.36.2192.168.2.7
            Feb 4, 2025 12:53:38.761820078 CET5921453192.168.2.7162.159.36.2
            Feb 4, 2025 12:53:38.766638994 CET5359214162.159.36.2192.168.2.7
            Feb 4, 2025 12:53:39.216804981 CET5921453192.168.2.7162.159.36.2
            Feb 4, 2025 12:53:39.221767902 CET5359214162.159.36.2192.168.2.7
            Feb 4, 2025 12:53:39.221822023 CET5921453192.168.2.7162.159.36.2
            TimestampSource PortDest PortSource IPDest IP
            Feb 4, 2025 12:52:55.507365942 CET6219653192.168.2.71.1.1.1
            Feb 4, 2025 12:52:55.521495104 CET53621961.1.1.1192.168.2.7
            Feb 4, 2025 12:53:38.755347013 CET5365514162.159.36.2192.168.2.7
            Feb 4, 2025 12:53:39.232336044 CET53564621.1.1.1192.168.2.7
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Feb 4, 2025 12:52:55.507365942 CET192.168.2.71.1.1.10x2b2bStandard query (0)appstalation.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Feb 4, 2025 12:52:55.521495104 CET1.1.1.1192.168.2.70x2b2bNo error (0)appstalation.com104.26.13.137A (IP address)IN (0x0001)false
            Feb 4, 2025 12:52:55.521495104 CET1.1.1.1192.168.2.70x2b2bNo error (0)appstalation.com172.67.71.182A (IP address)IN (0x0001)false
            Feb 4, 2025 12:52:55.521495104 CET1.1.1.1192.168.2.70x2b2bNo error (0)appstalation.com104.26.12.137A (IP address)IN (0x0001)false
            • appstalation.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.749704104.26.13.1374434048C:\Users\user\Desktop\Setup_10024.exe
            TimestampBytes transferredDirectionData
            2025-02-04 11:52:56 UTC176OUTGET /7104A12B017289DF/03034061431/24F3D2C94E09B5D1/73866997400?8DC009539E55612A1738669974 HTTP/1.1
            Host: appstalation.com
            User-Agent: NSIS_InetLoad (Mozilla)
            Accept: */*
            2025-02-04 11:52:56 UTC771INHTTP/1.1 200 OK
            Date: Tue, 04 Feb 2025 11:52:56 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            cf-cache-status: DYNAMIC
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s%2Blgs5Ij%2FCuhn8sVMsxMqMtlA0lBQJLJca6B%2FZcDaiMII%2FTk3rY017EZ%2BQDDc%2F9CV4Vlqq2vol9%2FxZbTeyympufDNnv%2F56A4uDlxNgSl7IlMSWCmFDvScYAXHOSxYjL%2F%2FOo%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 90ca7516e8d30f87-EWR
            server-timing: cfL4;desc="?proto=TCP&rtt=1483&min_rtt=1474&rtt_var=570&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2842&recv_bytes=814&delivery_rate=1888745&cwnd=229&unsent_bytes=0&cid=71d3ac35f7fcd1dd&ts=222&x=0"
            2025-02-04 11:52:56 UTC38INData Raw: 32 30 0d 0a 30 39 36 41 43 41 38 41 42 42 34 35 34 39 31 45 37 39 38 45 43 34 45 44 44 36 32 30 42 41 37 45 0d 0a
            Data Ascii: 20096ACA8ABB45491E798EC4EDD620BA7E
            2025-02-04 11:52:56 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            050100s020406080100

            Click to jump to process

            050100s0.0010203040MB

            Click to jump to process

            • File
            • Registry
            • Network

            Click to dive into process behavior distribution

            Target ID:4
            Start time:06:52:54
            Start date:04/02/2025
            Path:C:\Users\user\Desktop\Setup_10024.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\Setup_10024.exe"
            Imagebase:0xb50000
            File size:71'918'304 bytes
            MD5 hash:BFAD6CABA29A22AA27A440152EFBD209
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

            No disassembly