Edit tour

Windows Analysis Report
furra.exe

Overview

General Information

Sample name:furra.exe
Analysis ID:1610179
MD5:05f42a351356393179165a84086f8c07
SHA1:71093fd05686d6202bf4144f94920deefe551f96
SHA256:2959ff0bf986bddeb56abf2f54d30ecdc8a645311bba6c674f0aedaaa7594912
Tags:CryptBotexeLummaStealeruser-aachum
Infos:

Detection

LummaC, Cryptbot, LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Cryptbot
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • furra.exe (PID: 1048 cmdline: "C:\Users\user\Desktop\furra.exe" MD5: 05F42A351356393179165A84086F8C07)
    • LummaC2.exe (PID: 500 cmdline: "C:\Users\user\AppData\Local\Temp\LummaC2.exe" MD5: 8DA89B163D506BE4A73B987517A1B9E4)
    • start-this-724.exe (PID: 6968 cmdline: "C:\Users\user\AppData\Local\Temp\start-this-724.exe" MD5: C411BEF822305589785B18BD83A3CB89)
      • WerFault.exe (PID: 2864 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 736 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
CryptBotA typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cryptbot
{
  "C2 url": [
    "berserkyfir.click",
    "noisycuttej.shop",
    "rabidcowse.shop",
    "cloudewahsj.shop",
    "nearycrepso.shop",
    "wholersorie.shop",
    "abruptyopsn.shop",
    "tirepublicerj.shop",
    "framekgirus.shop"
  ],
  "Build id": "MeHdy4--pl14vs02"
}
{
  "C2 list": [
    ".1.1home.twelveff20pn.top",
    "ope.twelveff20pn.top",
    "a.zdnscloud.comn.top",
    "home.twelveff20pn.top",
    "indohome.twelveff20pn.top"
  ]
}
SourceRuleDescriptionAuthorStrings
furra.exeMALWARE_Win_DLInjector04Detects downloader / injectorditekSHen
  • 0x800ce1:$s1: Runner
  • 0x800e46:$s3: RunOnStartup
  • 0x800cf5:$a1: Antis
  • 0x800d22:$a2: antiVM
  • 0x800d29:$a3: antiSandbox
  • 0x800d35:$a4: antiDebug
  • 0x800d3f:$a5: antiEmulator
  • 0x800d4c:$a6: enablePersistence
  • 0x800d5e:$a7: enableFakeError
  • 0x800e6f:$a8: DetectVirtualMachine
  • 0x800e94:$a9: DetectSandboxie
  • 0x800ebf:$a10: DetectDebugger
  • 0x800ece:$a11: CheckEmulator
SourceRuleDescriptionAuthorStrings
Process Memory Space: start-this-724.exe PID: 6968JoeSecurity_Cryptbot_1Yara detected CryptbotJoe Security
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.0.furra.exe.910000.0.unpackMALWARE_Win_DLInjector04Detects downloader / injectorditekSHen
      • 0x800ce1:$s1: Runner
      • 0x800e46:$s3: RunOnStartup
      • 0x800cf5:$a1: Antis
      • 0x800d22:$a2: antiVM
      • 0x800d29:$a3: antiSandbox
      • 0x800d35:$a4: antiDebug
      • 0x800d3f:$a5: antiEmulator
      • 0x800d4c:$a6: enablePersistence
      • 0x800d5e:$a7: enableFakeError
      • 0x800e6f:$a8: DetectVirtualMachine
      • 0x800e94:$a9: DetectSandboxie
      • 0x800ebf:$a10: DetectDebugger
      • 0x800ece:$a11: CheckEmulator
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: furra.exeAvira: detected
      Source: ope.twelveff20pn.topAvira URL Cloud: Label: malware
      Source: indohome.twelveff20pn.topAvira URL Cloud: Label: malware
      Source: home.twelveff20pn.topAvira URL Cloud: Label: malware
      Source: http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805http://home.twelveff20pn.top/HfqvZFTxgmZzAvira URL Cloud: Label: malware
      Source: .1.1home.twelveff20pn.topAvira URL Cloud: Label: malware
      Source: http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805Avira URL Cloud: Label: malware
      Source: http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805senAvira URL Cloud: Label: malware
      Source: berserkyfir.clickAvira URL Cloud: Label: malware
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["berserkyfir.click", "noisycuttej.shop", "rabidcowse.shop", "cloudewahsj.shop", "nearycrepso.shop", "wholersorie.shop", "abruptyopsn.shop", "tirepublicerj.shop", "framekgirus.shop"], "Build id": "MeHdy4--pl14vs02"}
      Source: start-this-724.exe.6968.3.memstrminMalware Configuration Extractor: Cryptbot {"C2 list": [".1.1home.twelveff20pn.top", "ope.twelveff20pn.top", "a.zdnscloud.comn.top", "home.twelveff20pn.top", "indohome.twelveff20pn.top"]}
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeReversingLabs: Detection: 95%
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeReversingLabs: Detection: 70%
      Source: furra.exeReversingLabs: Detection: 76%
      Source: furra.exeVirustotal: Detection: 76%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeJoe Sandbox ML: detected
      Source: furra.exeJoe Sandbox ML: detected
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: rabidcowse.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: noisycuttej.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: framekgirus.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: wholersorie.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: nearycrepso.shop
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: berserkyfir.click
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString decryptor: MeHdy4--pl14vs02
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----
      Source: furra.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: furra.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+09h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then xor byte ptr [esp+eax+01h], al
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ebx, esp
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then jmp eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, edi
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 9B8995CDh
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx esi, byte ptr [eax]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edx, word ptr [eax]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then test esi, esi
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp word ptr [esi+ecx+02h], 0000h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov byte ptr [edi], cl
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov byte ptr [eax], cl
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov word ptr [ebx], ax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov byte ptr [edi], cl
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ebx, esp
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then jmp eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then jmp eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov byte ptr [edi], cl
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov word ptr [eax], cx
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, dword ptr [esi+3Ch]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov edx, eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then jmp eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi+000001F0h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, ebx
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov word ptr [edx], di
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov word ptr [eax], cx
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov word ptr [edx], cx
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov edx, esi
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+23h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-5650DC85h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+50h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx+03h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then inc eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx ebx, byte ptr [edx]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov byte ptr [eax], cl
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp dword ptr [edi+ecx*8], F68AC6D1h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov byte ptr [edi], cl
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+20h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov edx, ecx
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then inc eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-6282CB83h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+04h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov word ptr [eax], cx
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-5650DC85h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-294BBCC4h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then push 869608D1h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then inc eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ebx, esp
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then jmp eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-72F9EF2Bh]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebx+38h]
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, ebp
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 27BE92A4h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 53585096h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov word ptr [ebx], ax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov byte ptr [edi], al
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then mov ecx, eax
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 4x nop then inc eax

      Networking

      barindex
      Source: Malware configuration extractorURLs: berserkyfir.click
      Source: Malware configuration extractorURLs: noisycuttej.shop
      Source: Malware configuration extractorURLs: rabidcowse.shop
      Source: Malware configuration extractorURLs: cloudewahsj.shop
      Source: Malware configuration extractorURLs: nearycrepso.shop
      Source: Malware configuration extractorURLs: wholersorie.shop
      Source: Malware configuration extractorURLs: abruptyopsn.shop
      Source: Malware configuration extractorURLs: tirepublicerj.shop
      Source: Malware configuration extractorURLs: framekgirus.shop
      Source: Malware configuration extractorURLs: .1.1home.twelveff20pn.top
      Source: Malware configuration extractorURLs: ope.twelveff20pn.top
      Source: Malware configuration extractorURLs: a.zdnscloud.comn.top
      Source: Malware configuration extractorURLs: home.twelveff20pn.top
      Source: Malware configuration extractorURLs: indohome.twelveff20pn.top
      Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
      Source: Joe Sandbox ViewIP Address: 3.230.67.98 3.230.67.98
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
      Source: global trafficDNS traffic detected: DNS query: httpbin.org
      Source: global trafficDNS traffic detected: DNS query: home.twelveff20pn.top
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drString found in binary or memory: http://.css
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drString found in binary or memory: http://.jpg
      Source: start-this-724.exe.0.drString found in binary or memory: http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805
      Source: start-this-724.exe, 00000003.00000002.2200786036.00000000009DF000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805http://home.twelveff20pn.top/HfqvZFTxgmZz
      Source: start-this-724.exe, 00000003.00000002.2201273842.00000000010F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805sen
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drString found in binary or memory: http://html4/loose.dtd
      Source: furra.exe, 00000000.00000002.2135003829.0000000006AEC000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe.0.drString found in binary or memory: http://timestamp.digicert.com0
      Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
      Source: start-this-724.exe.0.drString found in binary or memory: https://curl.se/docs/alt-svc.html
      Source: start-this-724.exe.0.drString found in binary or memory: https://curl.se/docs/hsts.html
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drString found in binary or memory: https://curl.se/docs/http-cookies.html
      Source: start-this-724.exe, 00000003.00000003.2140872770.00000000010F5000.00000004.00000020.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drString found in binary or memory: https://httpbin.org/ip
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drString found in binary or memory: https://httpbin.org/ipbefore
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A678A0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A678A0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A67A20 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,

      System Summary

      barindex
      Source: furra.exe, type: SAMPLEMatched rule: Detects downloader / injector Author: ditekSHen
      Source: 0.0.furra.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Detects downloader / injector Author: ditekSHen
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6C010
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A38730
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6C8A0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A338B0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A598B0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A49880
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6D0E0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6B8C5
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A570D0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A74860
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5686D
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A49043
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6D9A0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4C9F0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6B1FB
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A651C0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A46100
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A32910
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A61168
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A75150
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A46100
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A35A80
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A32AE0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A362E0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A392F0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4DAF0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5B2C3
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A472C9
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A42ACB
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A54ADF
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4E230
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A34260
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A57261
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A38A70
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A42246
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A3DA4C
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A71250
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5CB91
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A74BE0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A3B330
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A3F330
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A48B3B
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A58B70
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6EB40
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A3EB5F
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5C4A0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4C4B6
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A50CB1
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5BC9A
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A454C0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6ECD9
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A67420
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A59C30
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A59C10
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A73C60
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A65470
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A46444
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4B5A0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A62DA3
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A735AA
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A3D5AD
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A34D80
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4A580
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5BD9A
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A61DE0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A615EE
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6E5F0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A73DC0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A3ADD0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A53500
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4151F
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A74560
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5057D
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A37540
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A73EA0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A32EB0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6CE80
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A74E80
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A506EF
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4DE20
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A56E20
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A61607
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A42E60
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A67640
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5A648
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A397B0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5EFB0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A52FE0
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A587F7
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A58F30
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A47703
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A4E710
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A36770
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A5B770
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A35F40
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A73F40
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A64757
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\LummaC2.exe EA56E7F640355598346FA0B356699298314E25D809F3AA7CFCE1804A3D1964E5
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: String function: 00A454B0 appears 110 times
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: String function: 00A37FE0 appears 45 times
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 736
      Source: furra.exe, 00000000.00000000.2120012709.0000000000F78000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamefulfil.exe4 vs furra.exe
      Source: furra.exe, 00000000.00000002.2128418571.00000000016AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs furra.exe
      Source: furra.exeBinary or memory string: OriginalFilenamefulfil.exe4 vs furra.exe
      Source: furra.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: furra.exe, type: SAMPLEMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
      Source: 0.0.furra.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
      Source: furra.exe, Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
      Source: start-this-724.exe.0.drBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
      Source: furra.exeBinary or memory string: .SlN9
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/8@14/1
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6D9A0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,
      Source: C:\Users\user\Desktop\furra.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\furra.exe.logJump to behavior
      Source: C:\Users\user\Desktop\furra.exeMutant created: NULL
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6968
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
      Source: C:\Users\user\Desktop\furra.exeFile created: C:\Users\user\AppData\Local\Temp\LummaC2.exeJump to behavior
      Source: furra.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: furra.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\furra.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\furra.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: furra.exeReversingLabs: Detection: 76%
      Source: furra.exeVirustotal: Detection: 76%
      Source: furra.exeString found in binary or memory: eS/AdD<
      Source: unknownProcess created: C:\Users\user\Desktop\furra.exe "C:\Users\user\Desktop\furra.exe"
      Source: C:\Users\user\Desktop\furra.exeProcess created: C:\Users\user\AppData\Local\Temp\LummaC2.exe "C:\Users\user\AppData\Local\Temp\LummaC2.exe"
      Source: C:\Users\user\Desktop\furra.exeProcess created: C:\Users\user\AppData\Local\Temp\start-this-724.exe "C:\Users\user\AppData\Local\Temp\start-this-724.exe"
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 736
      Source: C:\Users\user\Desktop\furra.exeProcess created: C:\Users\user\AppData\Local\Temp\LummaC2.exe "C:\Users\user\AppData\Local\Temp\LummaC2.exe"
      Source: C:\Users\user\Desktop\furra.exeProcess created: C:\Users\user\AppData\Local\Temp\start-this-724.exe "C:\Users\user\AppData\Local\Temp\start-this-724.exe"
      Source: C:\Users\user\Desktop\furra.exeSection loaded: mscoree.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: apphelp.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: kernel.appcore.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: version.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: uxtheme.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: windows.storage.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: wldp.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: propsys.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: profapi.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: edputil.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: urlmon.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: iertutil.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: srvcli.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: netutils.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: windows.staterepositoryps.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: sspicli.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: appresolver.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: bcp47langs.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: slc.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: userenv.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: sppc.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: onecorecommonproxystub.dll
      Source: C:\Users\user\Desktop\furra.exeSection loaded: onecoreuapcommonproxystub.dll
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeSection loaded: apphelp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: apphelp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: iphlpapi.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: cryptbase.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: cryptsp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: rsaenh.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: dhcpcsvc6.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: dhcpcsvc.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: dnsapi.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: napinsp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: pnrpnsp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: wshbth.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: nlaapi.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: mswsock.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: winrnr.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: uxtheme.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: windows.storage.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: wldp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: windowscodecs.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: napinsp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: pnrpnsp.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: wshbth.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: nlaapi.dll
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeSection loaded: winrnr.dll
      Source: C:\Users\user\Desktop\furra.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
      Source: C:\Users\user\Desktop\furra.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: furra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: furra.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: furra.exeStatic file information: File size 8397824 > 1048576
      Source: furra.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x801a00
      Source: furra.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: start-this-724.exe.0.drStatic PE information: section name: .eh_fram
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A6616A push edx; ret
      Source: C:\Users\user\Desktop\furra.exeFile created: C:\Users\user\AppData\Local\Temp\start-this-724.exeJump to dropped file
      Source: C:\Users\user\Desktop\furra.exeFile created: C:\Users\user\AppData\Local\Temp\LummaC2.exeJump to dropped file
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\furra.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drBinary or memory string: PROCMON.EXE
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drBinary or memory string: X64DBG.EXE
      Source: furra.exeBinary or memory string: SBIEDLL.DLL
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drBinary or memory string: WINDBG.EXE
      Source: start-this-724.exe.0.drBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drBinary or memory string: WIRESHARK.EXE
      Source: C:\Users\user\Desktop\furra.exeMemory allocated: 1980000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\furra.exeMemory allocated: 3400000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\furra.exeMemory allocated: 5400000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\furra.exeMemory allocated: 6390000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\furra.exeMemory allocated: 7390000 memory reserve | memory write watch
      Source: C:\Users\user\Desktop\furra.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeAPI coverage: 7.2 %
      Source: C:\Users\user\Desktop\furra.exe TID: 6188Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exe TID: 828Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exe TID: 828Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeFile Volume queried: C:\ FullSizeInformation
      Source: C:\Users\user\Desktop\furra.exeThread delayed: delay time: 922337203685477
      Source: Amcache.hve.6.drBinary or memory string: VMware
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: start-this-724.exe, 00000003.00000002.2201551354.0000000003440000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllR
      Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
      Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: furra.exeBinary or memory string: DetectVirtualMachine
      Source: start-this-724.exe, 00000003.00000003.2141260254.0000000000F47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
      Source: start-this-724.exe.0.drBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
      Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: furra.exeBinary or memory string: <Module>fulfil.exeProgramStubWriterRunnerRunTimeAntiAntismscorlibSystemObjectdelaydelayTimeantiVMantiSandboxantiDebugantiEmulatorenablePersistenceenableFakeErrorencryptTypecompressedcversSystem.Collections.GenericList`1fileNamesfileTypesfileRunTypesfileDropPathsMainDecompressEncryptOrDecryptXORDecryptEncryptInitalizeIEnumerable`1EncryptOutputSwapGetResourceRunOnStartup.ctorWriteAllBytesExecuteDetectVirtualMachineGetModuleHandleDetectSandboxieCheckRemoteDebuggerPresentDetectDebuggerCheckEmulatordatatextkeysijfileregNameAppPathHidefileBytesfinalPathpathrunTypelpModuleNamehProcessisDebuggerPresentSystem.ReflectionAssemblyTitleAttributeAssemblyDescriptionAttributeAssemblyCompanyAttributeAssemblyProductAttributeAssemblyCopyrightAttributeAssemblyTrademarkAttributeAssemblyFileVersionAttributeAssemblyVersionAttributeSystem.Runtime.InteropServicesComVisibleAttributeGuidAttributeSystem.Runtime.CompilerServicesCompilationRelaxationsAttributeRuntimeCompatibilityAttributefulfilEnvironmentExitSystem.ThreadingThreadSleepget_ItemStringop_EqualitySystem.TextEncodingget_UnicodeGetBytesConcatSystem.IOPathCombineget_CountMemoryStreamSystem.IO.CompressionDeflateStreamStreamCompressionModeCopyToIDisposableDisposeToArrayByteSystem.CoreSystem.LinqEnumerable<EncryptInitalize>b__0Func`2CS$<>9__CachedAnonymousMethodDelegate1CompilerGeneratedAttributeRangeSelect<>c__DisplayClass3<EncryptOutput>b__2bAssemblyGetExecutingAssemblySystem.ResourcesResourceManagerGetObjectAppDomainget_CurrentDomainget_FriendlyNameFileExistsGetEntryAssemblyget_Locationop_InequalityCopyFileAttributesGetAttributesSetAttributesMicrosoft.Win32RegistryRegistryKeyLocalMachineget_UTF8GetStringOpenSubKeySetValueCurrentUserException.cctorConvertFromBase64StringAddGetTempPathSystem.DiagnosticsProcessProcessStartInfoget_StartInfoset_FileNameStartSystem.ManagementManagementObjectSearcherManagementObjectCollectionGetManagementObjectEnumeratorGetEnumeratorManagementBaseObjectget_CurrentToStringToLowerToUpperInvariantContainsMoveNextDllImportAttributekernel32.dllIntPtrToInt32GetCurrentProcessget_HandleDateTimeget_Nowget_Ticks0g5aq55quiu.resources
      Source: start-this-724.exe, 00000003.00000003.2140872770.00000000010F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll99
      Source: Amcache.hve.6.drBinary or memory string: vmci.sys
      Source: start-this-724.exe.0.drBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
      Source: furra.exeBinary or memory string: vmware
      Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeProcess queried: DebugPort
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeProcess queried: DebugPort
      Source: C:\Users\user\AppData\Local\Temp\LummaC2.exeCode function: 2_2_00A723F0 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\furra.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
      Source: furra.exe, 00000000.00000002.2129550042.0000000004405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: berserkyfir.click
      Source: C:\Users\user\Desktop\furra.exeProcess created: C:\Users\user\AppData\Local\Temp\LummaC2.exe "C:\Users\user\AppData\Local\Temp\LummaC2.exe"
      Source: C:\Users\user\Desktop\furra.exeProcess created: C:\Users\user\AppData\Local\Temp\start-this-724.exe "C:\Users\user\AppData\Local\Temp\start-this-724.exe"
      Source: C:\Users\user\Desktop\furra.exeQueries volume information: C:\Users\user\Desktop\furra.exe VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
      Source: C:\Users\user\AppData\Local\Temp\start-this-724.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drBinary or memory string: procmon.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
      Source: furra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drBinary or memory string: wireshark.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: start-this-724.exe PID: 6968, type: MEMORYSTR
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: start-this-724.exe PID: 6968, type: MEMORYSTR
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      11
      Process Injection
      1
      Masquerading
      OS Credential Dumping221
      Security Software Discovery
      Remote Services1
      Screen Capture
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      PowerShell
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
      Virtualization/Sandbox Evasion
      Security Account Manager41
      Virtualization/Sandbox Evasion
      SMB/Windows Admin Shares2
      Clipboard Data
      2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS1
      Remote System Discovery
      Distributed Component Object ModelInput Capture13
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
      Obfuscated Files or Information
      Cached Domain Credentials13
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1610179 Sample: furra.exe Startdate: 08/02/2025 Architecture: WINDOWS Score: 100 29 Found malware configuration 2->29 31 Malicious sample detected (through community Yara rule) 2->31 33 Antivirus detection for URL or domain 2->33 35 9 other signatures 2->35 7 furra.exe 4 2->7         started        process3 file4 19 C:\Users\user\AppData\...\start-this-724.exe, PE32 7->19 dropped 21 C:\Users\user\AppData\Local\...\LummaC2.exe, PE32 7->21 dropped 23 C:\Users\user\AppData\Local\...\furra.exe.log, CSV 7->23 dropped 37 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->37 39 LummaC encrypted strings found 7->39 11 LummaC2.exe 7->11         started        14 start-this-724.exe 7->14         started        signatures5 process6 dnsIp7 41 Multi AV Scanner detection for dropped file 11->41 43 Machine Learning detection for dropped file 11->43 25 httpbin.org 3.230.67.98, 443, 49709 AMAZON-AESUS United States 14->25 27 home.twelveff20pn.top 14->27 17 WerFault.exe 22 16 14->17         started        signatures8 process9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      furra.exe76%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
      furra.exe76%VirustotalBrowse
      furra.exe100%AviraHEUR/AGEN.1357339
      furra.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\LummaC2.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\LummaC2.exe96%ReversingLabsWin32.Trojan.LummaStealer
      C:\Users\user\AppData\Local\Temp\start-this-724.exe71%ReversingLabsWin32.Trojan.LummaStealer
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      ope.twelveff20pn.top100%Avira URL Cloudmalware
      indohome.twelveff20pn.top100%Avira URL Cloudmalware
      home.twelveff20pn.top100%Avira URL Cloudmalware
      http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805http://home.twelveff20pn.top/HfqvZFTxgmZz100%Avira URL Cloudmalware
      .1.1home.twelveff20pn.top100%Avira URL Cloudmalware
      http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805100%Avira URL Cloudmalware
      http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805sen100%Avira URL Cloudmalware
      a.zdnscloud.comn.top0%Avira URL Cloudsafe
      berserkyfir.click100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      httpbin.org
      3.230.67.98
      truefalse
        high
        home.twelveff20pn.top
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          a.zdnscloud.comn.toptrue
          • Avira URL Cloud: safe
          unknown
          rabidcowse.shopfalse
            high
            indohome.twelveff20pn.toptrue
            • Avira URL Cloud: malware
            unknown
            wholersorie.shopfalse
              high
              https://httpbin.org/ipfalse
                high
                cloudewahsj.shopfalse
                  high
                  noisycuttej.shopfalse
                    high
                    berserkyfir.clicktrue
                    • Avira URL Cloud: malware
                    unknown
                    nearycrepso.shopfalse
                      high
                      ope.twelveff20pn.toptrue
                      • Avira URL Cloud: malware
                      unknown
                      home.twelveff20pn.toptrue
                      • Avira URL Cloud: malware
                      unknown
                      .1.1home.twelveff20pn.toptrue
                      • Avira URL Cloud: malware
                      unknown
                      framekgirus.shopfalse
                        high
                        tirepublicerj.shopfalse
                          high
                          abruptyopsn.shopfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://html4/loose.dtdfurra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drfalse
                              high
                              https://curl.se/docs/http-cookies.htmlfurra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drfalse
                                high
                                http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805http://home.twelveff20pn.top/HfqvZFTxgmZzstart-this-724.exe, 00000003.00000002.2200786036.00000000009DF000.00000004.00000001.01000000.00000007.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://upx.sf.netAmcache.hve.6.drfalse
                                  high
                                  https://curl.se/docs/alt-svc.htmlstart-this-724.exe.0.drfalse
                                    high
                                    http://.cssfurra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drfalse
                                      high
                                      https://curl.se/docs/hsts.htmlstart-this-724.exe.0.drfalse
                                        high
                                        https://httpbin.org/ipbeforefurra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drfalse
                                          high
                                          http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805senstart-this-724.exe, 00000003.00000002.2201273842.00000000010F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://.jpgfurra.exe, 00000000.00000002.2135003829.00000000069A7000.00000004.00000800.00020000.00000000.sdmp, start-this-724.exe, 00000003.00000000.2127581160.00000000009E2000.00000002.00000001.01000000.00000007.sdmp, start-this-724.exe.0.drfalse
                                            high
                                            http://home.twelveff20pn.top/HfqvZFTxgmZzemQbMMGA1736773805start-this-724.exe.0.drfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            3.230.67.98
                                            httpbin.orgUnited States
                                            14618AMAZON-AESUSfalse
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1610179
                                            Start date and time:2025-02-08 18:09:21 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 5m 52s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:11
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:furra.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@6/8@14/1
                                            EGA Information:
                                            • Successful, ratio: 33.3%
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.190.159.0, 13.107.246.45, 20.109.210.53
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target furra.exe, PID 1048 because it is empty
                                            • Execution Graph export aborted for target start-this-724.exe, PID 6968 because there are no executed function
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            12:10:14API Interceptor6x Sleep call for process: start-this-724.exe modified
                                            12:10:19API Interceptor1x Sleep call for process: WerFault.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.9451726162141048
                                            Encrypted:false
                                            SSDEEP:192:6UNE8c+0BU/UVJj4ZrMso5wzuiF3Z24IO8RP:Hy8clBU/UVJjuzuiF3Y4IO8RP
                                            MD5:71F73FA7891D838EE9C5F2FFAB7F80B0
                                            SHA1:85BE23930A4DF0101705F716F842ED663BD93D17
                                            SHA-256:C97C083FF87DE321A82567D17FD8EAD370E2CB2DC82F9E518BF0E59BE0D68EE9
                                            SHA-512:81C5C37EDEE66B87A4A9E6AD58777B0AB1124D8169B78E0A4A4AA7830DD37B6CCED9D6450045B15E2E1814287F787926BF31BCA19674F527C9E504FFCF63615C
                                            Malicious:false
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.3.5.0.8.2.1.6.7.9.1.3.8.0.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.3.5.0.8.2.1.7.2.2.8.8.9.8.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.a.7.9.9.e.f.-.2.6.0.c.-.4.f.a.b.-.8.5.f.5.-.3.6.4.1.b.e.7.d.2.6.4.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.6.0.7.6.a.5.-.b.0.b.6.-.4.b.0.2.-.b.5.b.4.-.b.8.a.3.7.b.f.5.8.4.f.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.t.a.r.t.-.t.h.i.s.-.7.2.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.3.8.-.0.0.0.1.-.0.0.1.5.-.0.1.8.4.-.6.1.5.0.4.c.7.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.6.c.e.0.1.8.8.0.1.8.f.5.8.6.8.7.4.e.f.4.1.2.1.5.f.9.9.1.0.1.b.0.0.0.0.f.f.f.f.!.0.0.0.0.8.9.0.b.2.b.d.d.6.e.8.8.a.4.5.1.9.2.d.3.5.5.2.8.7.9.a.f.b.e.d.9.9.5.5.e.9.b.8.c.!.s.t.a.r.t.-.t.h.i.s.-.7.2.4...e.x.e.....T.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 15 streams, Sat Feb 8 17:10:16 2025, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):50566
                                            Entropy (8bit):2.189166324444524
                                            Encrypted:false
                                            SSDEEP:192:gTL8LYyLPc0pOQdw6g6BrHClfun+2OSGWGkIg8ALuNYqwgtcR1xl6dA34+YwefC:CYcyLPqQ2tungSAkr8YPUcRMAtnj
                                            MD5:A466D250D967A4D483E9FC5B9E5F2D18
                                            SHA1:57D5B9A80D85E1519CCF285701F7DD8952B30271
                                            SHA-256:1CED8813F70BF6B42484C850D94E51F4B92F3A352D0AF6D031FC5E75F7B5F9D4
                                            SHA-512:FE37C5EBC94D395B59E61F349B3B107CBF13DA6BC84A089CA05CA956B077834839DBF674CE0F2EE75774851915F90D73E511BE430019FDC5B976F397F951AEC3
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP..a..... ..........g................................................4..../..........`.......8...........T............$.........................................................................................................eJ..............GenuineIntel............T.......8....g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8304
                                            Entropy (8bit):3.6883964093160237
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJ3r6In5he6YEOD6ngmf2bMprp89bUKsfVicm:R6lXJ76I546YEK6ngmf2bnUpfVY
                                            MD5:45C6D444A9733739DD879364162BF846
                                            SHA1:3F282A72C7B8B88FE36FB7FBD691E815B3270A21
                                            SHA-256:37FF350EEDC6D83BF5029A6F5DBDDAEBF77BD71C27A5CB3744ACE79B87E436A7
                                            SHA-512:60DC21337265C93B6AAD44592FB3A11EF8570BDA4DD408A435F46DDC437CE24D7F39D4CE57EC3290AB00B10B53FDE9DD5B1BB66B59798FFF3CFF5F0EF4870544
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.6.8.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4614
                                            Entropy (8bit):4.459152857574298
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zs0Jg77aI9KlWpW8VYCYm8M4JxIA5FK+q8Yh1PA3YLdd:uIjfyI74U7VWJxIhhjPA3YLdd
                                            MD5:D69BD8918973F42C6006F5DD959DA293
                                            SHA1:FC3230055BC9C22FBA337F636459EBC5EBFC95C3
                                            SHA-256:41F7DD7F39CBFFB209E73DE57435EC2DDAB268BB0DB94B715AFA34054E142938
                                            SHA-512:9D0F51B7011DEF25DA4F73CC8FF5C5B7899A10CD854E41FB3B8EAE2A2B6BB394E0ECB97F02C37FF8BECF7D58E24789DC17BD0EDBA6EFA8C82448F19B67DD2E3D
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="711852" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Users\user\Desktop\furra.exe
                                            File Type:CSV text
                                            Category:dropped
                                            Size (bytes):425
                                            Entropy (8bit):5.353683843266035
                                            Encrypted:false
                                            SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                            MD5:859802284B12C59DDBB85B0AC64C08F0
                                            SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                            SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                            SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                            Process:C:\Users\user\Desktop\furra.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):328192
                                            Entropy (8bit):6.7838215637977495
                                            Encrypted:false
                                            SSDEEP:6144:a3VUD8LkbASEQJYMm+l0s0UddmR6ZPcF3tVOTjoBwS0vEA:auDYkbAtQJ30udEyPq3iTjo2Lr
                                            MD5:8DA89B163D506BE4A73B987517A1B9E4
                                            SHA1:2E110CF5160C511FA3D5843E890B8E9316754F34
                                            SHA-256:EA56E7F640355598346FA0B356699298314E25D809F3AA7CFCE1804A3D1964E5
                                            SHA-512:A85969BCDA0B31CAF0CEC79F45BEC068A498C7AC190FE17D7B7C03F88F5C91F5F6221FCC4FCB46604695D5B95E9047DFC1D2CF31207540C23E929FCCA08D14F5
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 96%
                                            Reputation:low
                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....vg.................L..........0.............@.......................................@..................................~...............................p...<..................................................D................................text....K.......L.................. ..`.rdata...#...`...$...P..............@..@.data...|........R...t..............@....reloc...<...p...<..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\furra.exe
                                            File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                            Category:dropped
                                            Size (bytes):8059016
                                            Entropy (8bit):5.8486070310145415
                                            Encrypted:false
                                            SSDEEP:49152:Bm1ddnDl/UOLUhzPvta13s564P0RmwcMsWLMUVIz1pPRif8QWchshbioKxbMhPyJ:Bm9DEzPIsA4ycTWIUuzXv1KMyz8+
                                            MD5:C411BEF822305589785B18BD83A3CB89
                                            SHA1:890B2BDD6E88A45192D3552879AFBED9955E9B8C
                                            SHA-256:B60B783764D2C193EEC80661E43A512FAD2FFC56A56EE1A190B6AAC0CAD33B8E
                                            SHA-512:B2503B11B0FFC28118C45490B6C7C148EA034D3FA82805FE4AA3F986DDD9C473DD1CC323AFA19CEA39319F75DEC5BF6E39BDC97FED4D9F4C7CEF48A55363D1A6
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 71%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g...............(..M...z..2............M...@...........................{.....a.z...@... ...............................w..-....................z......0x..I..........................`.v.......................w. ............................text.....M.......M.................`..`.data....A....M..B....M.............@....rdata...!... b.."....b.............@..@.eh_framdM...Pw..N...(w.............@..@.bss.....1....w..........................idata...-....w......vw.............@....CRT....0.....x.......w.............@....tls......... x.......w.............@....reloc...I...0x..J....w.............@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.468659351931986
                                            Encrypted:false
                                            SSDEEP:6144:1zZfpi6ceLPx9skLmb0fdZWSP3aJG8nAgeiJRMMhA2zX4WABluuN9jDH5S:NZHtdZWOKnMM6bFpXj4
                                            MD5:B86AD4447ABA04A25492988C760B9A66
                                            SHA1:BA20D5AD0B1203211EF077A10B7DA2C3D74A3B85
                                            SHA-256:A49964D33478C22B8F3B5D24E9CA4EAF17E71CF8B4362057320140932C082D92
                                            SHA-512:A5C1162A5A2358461FF8BE5F98D24CBECB7A7F3834CB4B4BBA6CD28056AEF0F3E4192CD52B6AE444A7E3EC93E36E885D9B9DF674155B385E530BC8930920E61E
                                            Malicious:false
                                            Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.u.SLz..............................................................................................................................................................................................................................................................................................................................................\e.g........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):6.913779677924732
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:furra.exe
                                            File size:8'397'824 bytes
                                            MD5:05f42a351356393179165a84086f8c07
                                            SHA1:71093fd05686d6202bf4144f94920deefe551f96
                                            SHA256:2959ff0bf986bddeb56abf2f54d30ecdc8a645311bba6c674f0aedaaa7594912
                                            SHA512:b6fe9334bbd7dcd55f9b997e502839dd8c26d058ada49a3b804d7e41ee335abb2ab4e5ab0974da5fed3532a0beb8ca9e57b1cb5e416a94803a52a5f4ba9d4c08
                                            SSDEEP:98304:s4IeiLEkjp/ABP9X6OmtVtNjgpiM+txC1xcTP8cY1JusPWBGu7oBCN7c4J+Rt+x9:s4tCpwJcY1JufL7oBH2IQxLLiU6
                                            TLSH:C086592D63326C9AF3D20764D564B5A597240B2A7C27CFF58A93056D8D20E39D0B83BF
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.g.............................8... ...@....@.. ....................................@................................
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0xc038ee
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x678973C2 [Thu Jan 16 21:01:54 2025 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8038940x57.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x8040000x4d8.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x8060000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x8018f40x801a006abe53f1352924e414c30c6a219633d5unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0x8040000x4d80x600067076876ab129a192c55e8517284108False0.3743489583333333data3.7174563596210497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x8060000xc0x200479d8ba52c1674b22eed7a9b6b0407adFalse0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "\200"0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_VERSION0x8040a00x244data0.4706896551724138
                                            RT_MANIFEST0x8042e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            FileDescription
                                            FileVersion1.0.0.0
                                            InternalNamefulfil.exe
                                            LegalCopyright
                                            OriginalFilenamefulfil.exe
                                            ProductVersion1.0.0.0
                                            Assembly Version1.0.0.0
                                            • Total Packets: 25
                                            • 443 (HTTPS)
                                            • 53 (DNS)
                                            TimestampSource PortDest PortSource IPDest IP
                                            Feb 8, 2025 18:10:12.894427061 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:12.894474030 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:12.894536018 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:12.897497892 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:12.897511959 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.589061022 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.642899990 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.645565987 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.645574093 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.647274017 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.647289991 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.647345066 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.649821997 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.649903059 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.664679050 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.664697886 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.705399036 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.769620895 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.769721031 CET443497093.230.67.98192.168.2.6
                                            Feb 8, 2025 18:10:13.769798994 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.782196999 CET49709443192.168.2.63.230.67.98
                                            Feb 8, 2025 18:10:13.782217026 CET443497093.230.67.98192.168.2.6
                                            TimestampSource PortDest PortSource IPDest IP
                                            Feb 8, 2025 18:10:12.875533104 CET5244753192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:12.875756025 CET5244753192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:12.882889986 CET53524471.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:12.893241882 CET53524471.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:14.965868950 CET5245053192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:14.965903997 CET5245053192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:14.976577044 CET53524501.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.114005089 CET53524501.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.255815983 CET5245153192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.255871058 CET5245153192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.265638113 CET53524511.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.265918970 CET53524511.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.383496046 CET5245253192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.383543015 CET5245253192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.392632961 CET53524521.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.392661095 CET53524521.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.508399010 CET5152453192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.508480072 CET5152453192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.691864967 CET53515241.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.692231894 CET53515241.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.805768013 CET5152553192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.805818081 CET5152553192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:15.815924883 CET53515251.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:15.946170092 CET53515251.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:16.055516958 CET5152653192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:16.055592060 CET5152653192.168.2.61.1.1.1
                                            Feb 8, 2025 18:10:16.231532097 CET53515261.1.1.1192.168.2.6
                                            Feb 8, 2025 18:10:16.231538057 CET53515261.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Feb 8, 2025 18:10:12.875533104 CET192.168.2.61.1.1.10x7a45Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:12.875756025 CET192.168.2.61.1.1.10xca51Standard query (0)httpbin.org28IN (0x0001)false
                                            Feb 8, 2025 18:10:14.965868950 CET192.168.2.61.1.1.10x638aStandard query (0)home.twelveff20pn.topA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:14.965903997 CET192.168.2.61.1.1.10xe378Standard query (0)home.twelveff20pn.top28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.255815983 CET192.168.2.61.1.1.10xa529Standard query (0)home.twelveff20pn.topA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.255871058 CET192.168.2.61.1.1.10x2ddeStandard query (0)home.twelveff20pn.top28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.383496046 CET192.168.2.61.1.1.10xd1c7Standard query (0)home.twelveff20pn.topA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.383543015 CET192.168.2.61.1.1.10x2ce2Standard query (0)home.twelveff20pn.top28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.508399010 CET192.168.2.61.1.1.10xa8cdStandard query (0)home.twelveff20pn.topA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.508480072 CET192.168.2.61.1.1.10x1a33Standard query (0)home.twelveff20pn.top28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.805768013 CET192.168.2.61.1.1.10xb753Standard query (0)home.twelveff20pn.topA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.805818081 CET192.168.2.61.1.1.10xff24Standard query (0)home.twelveff20pn.top28IN (0x0001)false
                                            Feb 8, 2025 18:10:16.055516958 CET192.168.2.61.1.1.10xd541Standard query (0)home.twelveff20pn.topA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:16.055592060 CET192.168.2.61.1.1.10xdd94Standard query (0)home.twelveff20pn.top28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Feb 8, 2025 18:10:12.893241882 CET1.1.1.1192.168.2.60x7a45No error (0)httpbin.org3.230.67.98A (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:12.893241882 CET1.1.1.1192.168.2.60x7a45No error (0)httpbin.org3.211.25.71A (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:14.976577044 CET1.1.1.1192.168.2.60x638aName error (3)home.twelveff20pn.topnonenoneA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.114005089 CET1.1.1.1192.168.2.60xe378Name error (3)home.twelveff20pn.topnonenone28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.265638113 CET1.1.1.1192.168.2.60xa529Name error (3)home.twelveff20pn.topnonenoneA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.265918970 CET1.1.1.1192.168.2.60x2ddeName error (3)home.twelveff20pn.topnonenone28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.392632961 CET1.1.1.1192.168.2.60xd1c7Name error (3)home.twelveff20pn.topnonenoneA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.392661095 CET1.1.1.1192.168.2.60x2ce2Name error (3)home.twelveff20pn.topnonenone28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.691864967 CET1.1.1.1192.168.2.60x1a33Name error (3)home.twelveff20pn.topnonenone28IN (0x0001)false
                                            Feb 8, 2025 18:10:15.692231894 CET1.1.1.1192.168.2.60xa8cdName error (3)home.twelveff20pn.topnonenoneA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.815924883 CET1.1.1.1192.168.2.60xb753Name error (3)home.twelveff20pn.topnonenoneA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:15.946170092 CET1.1.1.1192.168.2.60xff24Name error (3)home.twelveff20pn.topnonenone28IN (0x0001)false
                                            Feb 8, 2025 18:10:16.231532097 CET1.1.1.1192.168.2.60xd541Name error (3)home.twelveff20pn.topnonenoneA (IP address)IN (0x0001)false
                                            Feb 8, 2025 18:10:16.231538057 CET1.1.1.1192.168.2.60xdd94Name error (3)home.twelveff20pn.topnonenone28IN (0x0001)false
                                            • httpbin.org
                                            Target ID:0
                                            Start time:12:10:11
                                            Start date:08/02/2025
                                            Path:C:\Users\user\Desktop\furra.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\furra.exe"
                                            Imagebase:0x910000
                                            File size:8'397'824 bytes
                                            MD5 hash:05F42A351356393179165A84086F8C07
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:12:10:11
                                            Start date:08/02/2025
                                            Path:C:\Users\user\AppData\Local\Temp\LummaC2.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\Temp\LummaC2.exe"
                                            Imagebase:0xa30000
                                            File size:328'192 bytes
                                            MD5 hash:8DA89B163D506BE4A73B987517A1B9E4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 96%, ReversingLabs
                                            Reputation:low
                                            Has exited:false
                                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                            Target ID:3
                                            Start time:12:10:12
                                            Start date:08/02/2025
                                            Path:C:\Users\user\AppData\Local\Temp\start-this-724.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\Temp\start-this-724.exe"
                                            Imagebase:0x3c0000
                                            File size:8'059'016 bytes
                                            MD5 hash:C411BEF822305589785B18BD83A3CB89
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 71%, ReversingLabs
                                            Reputation:low
                                            Has exited:true
                                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                            Target ID:6
                                            Start time:12:10:16
                                            Start date:08/02/2025
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 736
                                            Imagebase:0xf00000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            No disassembly