Windows
Analysis Report
nbtypsfikkad.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
svchost.exe (PID: 7756 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
nbtypsfikkad.exe (PID: 7812 cmdline:
"C:\Users\ user\Deskt op\nbtypsf ikkad.exe" MD5: 8BBC3CCA3905E7ADA419A806DE48006C) sc.exe (PID: 7844 cmdline:
C:\Windows \system32\ sc.exe del ete "HELPE R" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) conhost.exe (PID: 7852 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) sc.exe (PID: 7896 cmdline:
C:\Windows \system32\ sc.exe cre ate "HELPE R" binpath = "C:\Prog ramData\he lper\helpe r.exe" sta rt= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) conhost.exe (PID: 7904 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) sc.exe (PID: 7944 cmdline:
C:\Windows \system32\ sc.exe sto p eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80) conhost.exe (PID: 7960 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) sc.exe (PID: 7952 cmdline:
C:\Windows \system32\ sc.exe sta rt "HELPER " MD5: 3FB5CF71F7E7EB49790CB0E663434D80) conhost.exe (PID: 7968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
helper.exe (PID: 8032 cmdline:
C:\Program Data\helpe r\helper.e xe MD5: 8BBC3CCA3905E7ADA419A806DE48006C) conhost.exe (PID: 8060 cmdline:
C:\Windows \system32\ conhost.ex e MD5: 0D698AF330FD17BEE3BF90011D49251D) svchost.exe (PID: 8072 cmdline:
svchost.ex e MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 7236 cmdline:
C:\Windows \System32\ svchost.ex e -k Netwo rkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
SgrmBroker.exe (PID: 7328 cmdline:
C:\Windows \system32\ SgrmBroker .exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
svchost.exe (PID: 7404 cmdline:
C:\Windows \system32\ svchost.ex e -k Unist ackSvcGrou p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 7512 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 3640 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A) MpCmdRun.exe (PID: 2304 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: B3676839B2EE96983F9ED735CD044159) conhost.exe (PID: 2496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
| |
MAL_XMR_Miner_May19_1 | Detects Monero Crypto Coin Miner | Florian Roth |
| |
MALWARE_Win_CoinMiner02 | Detects coinmining malware | ditekSHen |
| |
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
Click to see the 7 entries |
System Summary |
---|
Source: | Author: David Burkett, @signalblur: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: vburov: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T17:45:00.975564+0100 | 2054247 | 1 | A Network Trojan was detected | 104.20.3.235 | 443 | 192.168.2.4 | 49712 | TCP |
- • AV Detection
- • Bitcoin Miner
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Bitcoin Miner |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 11_2_0000000140001394 |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Code function: | 11_2_0000000140003150 | |
Source: | Code function: | 11_2_00000001400026E0 |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 11_2_0000000140001403 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File opened / queried: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 11_2_0000000140001160 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Thread register set: | Jump to behavior | ||
Source: | Thread register set: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 12_2_00000001403274D0 |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | Key value created or modified: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 11 Windows Service | 11 Windows Service | 2 Masquerading | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Service Execution | 1 DLL Side-Loading | 111 Process Injection | 1 Disable or Modify Tools | LSASS Memory | 351 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 14 Virtualization/Sandbox Evasion | Security Account Manager | 14 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Process Injection | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | 2 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 24 System Information Discovery | VNC | GUI Input Capture | 3 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
70% | Virustotal | Browse | ||
76% | ReversingLabs | Win64.Packed.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
76% | ReversingLabs | Win64.Packed.Generic | ||
5% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
xmr-eu1.nanopool.org | 146.59.154.106 | true | false | high | |
pastebin.com | 104.20.3.235 | true | false | high | |
206.23.85.13.in-addr.arpa | unknown | unknown | false | high | |
212.20.149.52.in-addr.arpa | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.20.3.235 | pastebin.com | United States | 13335 | CLOUDFLARENETUS | false | |
141.94.23.83 | unknown | Germany | 680 | DFNVereinzurFoerderungeinesDeutschenForschungsnetzese | false | |
162.19.224.121 | unknown | United States | 209 | CENTURYLINK-US-LEGACY-QWESTUS | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1635471 |
Start date and time: | 2025-03-11 17:43:55 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 21 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | nbtypsfikkad.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.mine.winEXE@27/7@4/4 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 23.199.214.10, 52. 149.20.212, 13.85.23.206, 4.24 5.163.56 - Excluded domains from analysis
(whitelisted): a-ring-fallbac k.msedge.net, fs.microsoft.com , slscr.update.microsoft.com, ctldl.windowsupdate.com, prod. fs.microsoft.com.akadns.net, f s-wildcard.microsoft.com.edgek ey.net, fs-wildcard.microsoft. com.edgekey.net.globalredir.ak adns.net, e16604.dscf.akamaied ge.net, c.pki.goog, fe3cr.deli very.mp.microsoft.com - Execution Graph export aborted
for target helper.exe, PID 80 32 because it is empty - Execution Graph export aborted
for target nbtypsfikkad.exe, PID 7812 because it is empty - Execution Graph export aborted
for target svchost.exe, PID 8 072 because there are no execu ted function - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
12:44:55 | API Interceptor | |
12:44:55 | API Interceptor | |
12:46:04 | API Interceptor |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 1.307376690246451 |
Encrypted: | false |
SSDEEP: | 3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrL:KooCEYhgYEL0In |
MD5: | F0F2FDE424E62828131921D14DB760D8 |
SHA1: | A116A1B3E79E6C8BFE8068754E72C20596A155AC |
SHA-256: | 87A4F0490DF096461F0E55400978ABA763771794B096BBC03E5A62084E0A3898 |
SHA-512: | 457DFD71BF8E87F6C9CE801589DEB794EB686C90D2DECFA891CBE8CE42D7D8ADE8379CF13459BAF1B9BF93D68611A432165ED1EBD438EF953D622ACAF1306A9B |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 0.42217127831250373 |
Encrypted: | false |
SSDEEP: | 1536:pSB2ESB2SSjlK/dvmdMrSU0OrsJzvdYkr3g16T2UPkLk+kTX/Iw4KKCzAkUk1kI6:paza/vMUM2Uvz7DO |
MD5: | 21AD49D71CAACE20D66150186CE30152 |
SHA1: | F335D728DEE93E550979D872DBB03457E6DD39F1 |
SHA-256: | 579EA16A23CD98BF036102D94213D827E796791922A6127F63A84EC14413968A |
SHA-512: | D2D1D909C1740ACB37255AB4C2E3F267AC6BFE1A63DD161E762CA30583F46E05B151F7B888C493DF08B9A525B98F349C97F21F176F34536058B37B90A0318404 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.07694654765132056 |
Encrypted: | false |
SSDEEP: | 3:il6Yeldouajn13a/E/llollcVO/lnlZMxZNQl:pzlKua53qkAOewk |
MD5: | 4E7A7C34001732115314692BDC204011 |
SHA1: | 17812F9E39D8A000A17920284C787C467B8FFFC4 |
SHA-256: | 3127D89BA452B95B99AA040D9BDDEF63288495292D54FD6A6D355FB3CF0E6766 |
SHA-512: | D9CB84C449C2C7FE1A70995371B67D735DE800D55665CA0A5CEB2487D2EA0C1420C7A98AE24E32211D5138DBC97A714C702DFF149B13C53A26D40F54100176FF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\nbtypsfikkad.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7113728 |
Entropy (8bit): | 6.4701650998152225 |
Encrypted: | false |
SSDEEP: | 196608:FMk+nb1nuqMbwhIEkfnpmLA9EFRJouTX:FSrkfnsLAeRr |
MD5: | 8BBC3CCA3905E7ADA419A806DE48006C |
SHA1: | D9527797784197257A37C743DA36F4DE8197E924 |
SHA-256: | 76DE12FC1C2446150168CCB2520DEA6B5F30AB53FB5CFAE8926ABCEBF5C8364D |
SHA-512: | 66F9D6BD184BE4E70ACDA9EA2A5757FB6FF31E76CF895B01143E2FBF3A342F1A14492EF8AD08BA27F323AB1EDE351EAB7F1F57EFA35EF7978A2E80442D11BFCD |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55 |
Entropy (8bit): | 4.306461250274409 |
Encrypted: | false |
SSDEEP: | 3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y |
MD5: | DCA83F08D448911A14C22EBCACC5AD57 |
SHA1: | 91270525521B7FE0D986DB19747F47D34B6318AD |
SHA-256: | 2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9 |
SHA-512: | 96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Windows Defender\MpCmdRun.exe |
File Type: | |
Category: | modified |
Size (bytes): | 7388 |
Entropy (8bit): | 3.2409833955289535 |
Encrypted: | false |
SSDEEP: | 96:cEi+AAsoJjykzEJ+AAsoJjykHEx+AAsoJjykr:cN+SoJbO+SoJvm+SoJj |
MD5: | 682A9FE6CA2009782166CEF700D54985 |
SHA1: | 42F93CDD541A4D41B188232514F27B2329529BF0 |
SHA-256: | 0C0347B295B4F06AAA03B0A1C4732AAC2B206DF3AB8C08162C162529899FCCB2 |
SHA-512: | F102595C5CFD5984163EEEA77778A994B44A455EFB9A1A1A438123EC4617D41A62E75561BFEB7CF4B4F6D9A69C779139BBEA75F92435E96FACD174DBC06A5C90 |
Malicious: | false |
Preview: |
Process: | C:\ProgramData\helper\helper.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14544 |
Entropy (8bit): | 6.2660301556221185 |
Encrypted: | false |
SSDEEP: | 192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ |
MD5: | 0C0195C48B6B8582FA6F6373032118DA |
SHA1: | D25340AE8E92A6D29F599FEF426A2BC1B5217299 |
SHA-256: | 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5 |
SHA-512: | AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D |
Malicious: | true |
Antivirus: |
|
Preview: |
File type: | |
Entropy (8bit): | 6.4701650998152225 |
TrID: |
|
File name: | nbtypsfikkad.exe |
File size: | 7'113'728 bytes |
MD5: | 8bbc3cca3905e7ada419a806de48006c |
SHA1: | d9527797784197257a37c743da36f4de8197e924 |
SHA256: | 76de12fc1c2446150168ccb2520dea6b5f30ab53fb5cfae8926abcebf5c8364d |
SHA512: | 66f9d6bd184be4e70acda9ea2a5757fb6ff31e76cf895b01143e2fbf3a342f1a14492ef8ad08ba27f323ab1ede351eab7f1f57efa35ef7978a2e80442d11bfcd |
SSDEEP: | 196608:FMk+nb1nuqMbwhIEkfnpmLA9EFRJouTX:FSrkfnsLAeRr |
TLSH: | BC66F1D90E3E8DF2CFE95C248B418ECFBD4B12EFAB270254C486D1566471AF952B10DA |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....T.g.........."......d...$l.....@..........@..............................l...........`........................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x140001140 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67CA54B7 [Fri Mar 7 02:06:47 2025 UTC] |
TLS Callbacks: | 0x40001760, 0x1, 0x400017e0, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | de41d4e0545d977de6ca665131bb479a |
Instruction |
---|
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00006ED5h] |
mov dword ptr [eax], 00000001h |
call 00007F17B91B36FFh |
nop |
nop |
nop |
dec eax |
add esp, 28h |
ret |
nop |
inc ecx |
push edi |
inc ecx |
push esi |
push esi |
push edi |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov eax, dword ptr [00000030h] |
dec eax |
mov edi, dword ptr [eax+08h] |
dec eax |
mov esi, dword ptr [00006EC9h] |
xor eax, eax |
dec eax |
cmpxchg dword ptr [esi], edi |
sete bl |
je 00007F17B91B3720h |
dec eax |
cmp edi, eax |
je 00007F17B91B371Bh |
dec esp |
mov esi, dword ptr [000083F1h] |
nop word ptr [eax+eax+00000000h] |
mov ecx, 000003E8h |
inc ecx |
call esi |
xor eax, eax |
dec eax |
cmpxchg dword ptr [esi], edi |
sete bl |
je 00007F17B91B36F7h |
dec eax |
cmp edi, eax |
jne 00007F17B91B36D9h |
dec eax |
mov edi, dword ptr [00006E90h] |
mov eax, dword ptr [edi] |
cmp eax, 01h |
jne 00007F17B91B36FEh |
mov ecx, 0000001Fh |
call 00007F17B91B9624h |
jmp 00007F17B91B3719h |
cmp dword ptr [edi], 00000000h |
je 00007F17B91B36FBh |
mov byte ptr [006C8D29h], 00000001h |
jmp 00007F17B91B370Bh |
mov dword ptr [edi], 00000001h |
dec eax |
mov ecx, dword ptr [00006E7Ah] |
dec eax |
mov edx, dword ptr [00006E7Bh] |
call 00007F17B91B961Bh |
mov eax, dword ptr [edi] |
cmp eax, 01h |
jne 00007F17B91B370Bh |
dec eax |
mov ecx, dword ptr [00006E50h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x92c0 | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x6cb000 | 0x180 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x6ce000 | 0x78 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x80a0 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x8410 | 0x138 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9458 | 0x158 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6286 | 0x6400 | 1218910da0445e0467bfb2995a260769 | False | 0.5308203125 | data | 6.187745106550639 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x1a08 | 0x1c00 | 0c54c604631b020fadefd99d165c63e1 | False | 0.42578125 | data | 4.472246696483044 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x6c0bb0 | 0x6c0000 | 3347be04ef4a6f03d827a3bb80135ab5 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x6cb000 | 0x180 | 0x200 | eb746a6bc05f7362fd466ea70e0e0860 | False | 0.5 | data | 3.0961664664652 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.00cfg | 0x6cc000 | 0x10 | 0x200 | b18c7380298e104adf73576fa46bccc1 | False | 0.04296875 | data | 0.15127132530476972 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0x6cd000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x6ce000 | 0x78 | 0x200 | 727189ddcf948e46f76c26a13679f9d5 | False | 0.228515625 | data | 1.429863764287425 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
msvcrt.dll | __C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, _wcsicmp, _wcsnicmp, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, memset, signal, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp |
KERNEL32.dll | DeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T17:45:00.975564+0100 | 2054247 | ET MALWARE SilentCryptoMiner Agent Config Inbound | 1 | 104.20.3.235 | 443 | 192.168.2.4 | 49712 | TCP |
- Total Packets: 45
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 11, 2025 17:44:57.178384066 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:44:57.183706045 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:44:57.183779955 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:44:57.184079885 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:44:57.189140081 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:44:57.785767078 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:44:57.785783052 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:44:57.785841942 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:44:57.786921978 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:44:57.791611910 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:44:57.958487034 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:44:58.004882097 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:44:58.093157053 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:44:58.145490885 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:44:58.259345055 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:44:58.259381056 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:44:58.259466887 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:44:58.294018984 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:44:58.294053078 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:44:59.998817921 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.011708021 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:45:00.011744022 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.013386011 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.013458967 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:45:00.031857967 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:45:00.032063961 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.032146931 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:45:00.032165051 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.082956076 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:45:00.975352049 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.975454092 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.975498915 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:45:00.989563942 CET | 49712 | 443 | 192.168.2.4 | 104.20.3.235 |
Mar 11, 2025 17:45:00.989582062 CET | 443 | 49712 | 104.20.3.235 | 192.168.2.4 |
Mar 11, 2025 17:45:00.990386963 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:45:00.990791082 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:00.997186899 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:00.997251034 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:00.997687101 CET | 10343 | 49711 | 141.94.23.83 | 192.168.2.4 |
Mar 11, 2025 17:45:00.997734070 CET | 49711 | 10343 | 192.168.2.4 | 141.94.23.83 |
Mar 11, 2025 17:45:01.108392954 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:01.114398956 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:01.615525961 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:01.615555048 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:01.615607977 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:01.616529942 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:01.623898029 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:01.804585934 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:01.895622969 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:01.938381910 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:02.098622084 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:02.680334091 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:02.895494938 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:11.545799971 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:11.692378998 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:25.592222929 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:25.645553112 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:27.497186899 CET | 56569 | 53 | 192.168.2.4 | 162.159.36.2 |
Mar 11, 2025 17:45:27.501890898 CET | 53 | 56569 | 162.159.36.2 | 192.168.2.4 |
Mar 11, 2025 17:45:27.501971960 CET | 56569 | 53 | 192.168.2.4 | 162.159.36.2 |
Mar 11, 2025 17:45:27.506738901 CET | 53 | 56569 | 162.159.36.2 | 192.168.2.4 |
Mar 11, 2025 17:45:27.973084927 CET | 56569 | 53 | 192.168.2.4 | 162.159.36.2 |
Mar 11, 2025 17:45:27.978022099 CET | 53 | 56569 | 162.159.36.2 | 192.168.2.4 |
Mar 11, 2025 17:45:27.978075981 CET | 56569 | 53 | 192.168.2.4 | 162.159.36.2 |
Mar 11, 2025 17:45:35.449527979 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:35.583229065 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:47.482414007 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:47.583143950 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:45:57.432411909 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:45:57.583204985 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:46:07.582026005 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:46:07.692591906 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:46:18.421878099 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:46:18.489490032 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:46:39.534849882 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:46:39.583261967 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:46:49.537266016 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:46:49.583277941 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Mar 11, 2025 17:46:59.561530113 CET | 10343 | 49715 | 162.19.224.121 | 192.168.2.4 |
Mar 11, 2025 17:46:59.692704916 CET | 49715 | 10343 | 192.168.2.4 | 162.19.224.121 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 11, 2025 17:44:57.168720961 CET | 52056 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 17:44:57.175885916 CET | 53 | 52056 | 1.1.1.1 | 192.168.2.4 |
Mar 11, 2025 17:44:58.250401020 CET | 51602 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 17:44:58.257987022 CET | 53 | 51602 | 1.1.1.1 | 192.168.2.4 |
Mar 11, 2025 17:45:27.496390104 CET | 53 | 62161 | 162.159.36.2 | 192.168.2.4 |
Mar 11, 2025 17:45:27.985584021 CET | 55179 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 17:45:27.992680073 CET | 53 | 55179 | 1.1.1.1 | 192.168.2.4 |
Mar 11, 2025 17:45:31.084453106 CET | 50237 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 17:45:31.091360092 CET | 53 | 50237 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 11, 2025 17:44:57.168720961 CET | 192.168.2.4 | 1.1.1.1 | 0xfd31 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 11, 2025 17:44:58.250401020 CET | 192.168.2.4 | 1.1.1.1 | 0xf50a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 11, 2025 17:45:27.985584021 CET | 192.168.2.4 | 1.1.1.1 | 0x6de5 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false | |
Mar 11, 2025 17:45:31.084453106 CET | 192.168.2.4 | 1.1.1.1 | 0x2ca5 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 146.59.154.106 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 51.15.65.182 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 51.15.58.224 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 54.37.232.103 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 54.37.137.114 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 162.19.224.121 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 51.15.193.130 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 163.172.154.142 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 212.47.253.124 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 141.94.23.83 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:57.175885916 CET | 1.1.1.1 | 192.168.2.4 | 0xfd31 | No error (0) | 51.89.23.91 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:58.257987022 CET | 1.1.1.1 | 192.168.2.4 | 0xf50a | No error (0) | 104.20.3.235 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:58.257987022 CET | 1.1.1.1 | 192.168.2.4 | 0xf50a | No error (0) | 104.20.4.235 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:44:58.257987022 CET | 1.1.1.1 | 192.168.2.4 | 0xf50a | No error (0) | 172.67.19.24 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 17:45:27.992680073 CET | 1.1.1.1 | 192.168.2.4 | 0x6de5 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false | |
Mar 11, 2025 17:45:31.091360092 CET | 1.1.1.1 | 192.168.2.4 | 0x2ca5 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49712 | 104.20.3.235 | 443 | 8072 | C:\Windows\System32\svchost.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-11 16:45:00 UTC | 114 | OUT | |
2025-03-11 16:45:00 UTC | 391 | IN | |
2025-03-11 16:45:00 UTC | 483 | IN | |
2025-03-11 16:45:00 UTC | 5 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 12:44:55 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 12:44:55 |
Start date: | 11/03/2025 |
Path: | C:\Users\user\Desktop\nbtypsfikkad.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff72e5f0000 |
File size: | 7'113'728 bytes |
MD5 hash: | 8BBC3CCA3905E7ADA419A806DE48006C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 2 |
Start time: | 12:44:55 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ec9a0000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 3 |
Start time: | 12:44:55 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 4 |
Start time: | 12:44:55 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ec9a0000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 5 |
Start time: | 12:44:55 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 6 |
Start time: | 12:44:56 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ec9a0000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 7 |
Start time: | 12:44:56 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\sc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ec9a0000 |
File size: | 72'192 bytes |
MD5 hash: | 3FB5CF71F7E7EB49790CB0E663434D80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 8 |
Start time: | 12:44:56 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 9 |
Start time: | 12:44:56 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 10 |
Start time: | 12:44:56 |
Start date: | 11/03/2025 |
Path: | C:\ProgramData\helper\helper.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff734aa0000 |
File size: | 7'113'728 bytes |
MD5 hash: | 8BBC3CCA3905E7ADA419A806DE48006C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Has exited: | true |
Target ID: | 11 |
Start time: | 12:44:56 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | false |
Target ID: | 12 |
Start time: | 12:44:56 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Has exited: | false |
Target ID: | 13 |
Start time: | 12:45:01 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 14 |
Start time: | 12:45:01 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\SgrmBroker.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75f3c0000 |
File size: | 329'504 bytes |
MD5 hash: | 3BA1A18A0DC30A0545E7765CB97D8E63 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | false |
Target ID: | 15 |
Start time: | 12:45:01 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | false |
Target ID: | 16 |
Start time: | 12:45:03 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | false |
Target ID: | 17 |
Start time: | 12:45:03 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | false |
Target ID: | 19 |
Start time: | 12:46:04 |
Start date: | 11/03/2025 |
Path: | C:\Program Files\Windows Defender\MpCmdRun.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6732f0000 |
File size: | 468'120 bytes |
MD5 hash: | B3676839B2EE96983F9ED735CD044159 |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 20 |
Start time: | 12:46:04 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 2.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 11.3% |
Total number of Nodes: | 859 |
Total number of Limit Nodes: | 2 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|