Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 6124 cmdline:
C:\Users\u ser\Deskto p\file.exe MD5: 74CFFC19A09979E23BFD9F5A5378508B) - conhost.exe (PID: 6120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - relaunch_app.exe (PID: 5140 cmdline:
"C:\Users\ Public\Doc uments\rel aunch_app. exe" MD5: 161D5CCDF1F7563E92D36AD1D5492CCC)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_000Stealer | Yara detected 000Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_000Stealer | Yara detected 000Stealer | Joe Security | ||
JoeSecurity_000Stealer | Yara detected 000Stealer | Joe Security | ||
JoeSecurity_000Stealer | Yara detected 000Stealer | Joe Security | ||
Click to see the 1 entries |
Timestamp: | 192.168.2.6194.190.152.19349712515682037085 10/19/22-18:11:13.648788 |
SID: | 2037085 |
Source Port: | 49712 |
Destination Port: | 51568 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.6194.190.152.19349705515682037086 10/19/22-18:11:11.925460 |
SID: | 2037086 |
Source Port: | 49705 |
Destination Port: | 51568 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.6194.190.152.19349706515682037084 10/19/22-18:11:12.053781 |
SID: | 2037084 |
Source Port: | 49706 |
Destination Port: | 51568 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 194.190.152.193192.168.2.651568497062037089 10/19/22-18:11:12.115808 |
SID: | 2037089 |
Source Port: | 51568 |
Destination Port: | 49706 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.6194.190.152.19349708515682037087 10/19/22-18:11:12.367036 |
SID: | 2037087 |
Source Port: | 49708 |
Destination Port: | 51568 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
AV Detection |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Avira: |
Source: | Static PE information: |
Source: | Code function: | 2_2_015C3220 |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | ASN Name: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 2_2_015C1060 |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | Last function: |
Source: | WMI Queries: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 2_2_015C3220 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 2_2_012A11A0 |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 2_2_015C14C0 |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FF6EB3776B4 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 311 Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | LSASS Memory | 311 Security Software Discovery | Remote Desktop Protocol | 41 Data from Local System | Exfiltration Over Bluetooth | 1 Non-Standard Port | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 DLL Side-Loading | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 12 File and Directory Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | 24 System Information Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1216915 |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
194.190.152.193 | unknown | Russian Federation | 41615 | RSHB-ASRU | true |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 726254 |
Start date and time: | 2022-10-19 18:10:11 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 32s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | file.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal92.troj.spyw.evad.winEXE@4/2@0/1 |
EGA Information: |
|
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): fs.microsoft.com
- Execution Graph export aborted for target file.exe, PID 6124 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
18:11:05 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
RSHB-ASRU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | modified |
Size (bytes): | 5681152 |
Entropy (8bit): | 6.357945782642932 |
Encrypted: | false |
SSDEEP: | 49152:6tSHkCyvh0uhRLTxd+K7EIrbgGCpLXadU/8IrOZHZVRcfM62d7Ep4W/61jn+E0tE:65veub/x6ebgGCpLXSRZ0xsx97Du |
MD5: | 161D5CCDF1F7563E92D36AD1D5492CCC |
SHA1: | F7A40D9EAF5FB2278C4F7D317AF52ADCB3EBBDC9 |
SHA-256: | 1A4C9E4B1DC160BCAA56F915F07CCCC84F61111B04219A075A7091CF3808BFC1 |
SHA-512: | A81F40173CF1DEC0C8CE28E91F878493E6494E8A88DE13637026A7EAE4948232708033C80F26240DC52B6988575717A93A0805740FCD7E5A4A7CCD3B8084FAA1 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:B:B |
MD5: | 8277E0910D750195B448797616E091AD |
SHA1: | 3C363836CF4E16666669A25DA280A1865C2D2874 |
SHA-256: | 18AC3E7343F016890C510E93F935261169D9E3F565436429830FAF0934F4F8E4 |
SHA-512: | 48FB10B15F3D44A09DC82D02B06581E0C0C69478C9FD2CF8F9093659019A1687BAECDBB38C9E72B12169DC4148690F87467F9154F5931C5DF665C6496CBFD5F5 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 7.755747600848576 |
TrID: |
|
File name: | file.exe |
File size: | 5916672 |
MD5: | 74cffc19a09979e23bfd9f5a5378508b |
SHA1: | 54e1969a3f4000a610aec127bf2d9028e0dc7588 |
SHA256: | 203f591e084a2ece60b2be5c13fbafa673ecac10ef91055ad7bd73fddc656b5d |
SHA512: | be1aa3e40639201f9f5eb6a476ac8a4ca8381eb92c116f4b472d661e435b2b4115337879b59caec4ee397df0adaba5011054cfb425eb9978e82bdb1dea9aaae5 |
SSDEEP: | 98304:cdqxlydvAURQUc6QSiSbgOOzVbRRtYoa5JSY8ANYCfBeGO:cdkqAURQUc6QSgOOnA7lhBo |
TLSH: | 1556BE8DCB26656ADED00A340D797D95F8F0246FFC5662C923CEB1AF9C62022F55C6E0 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........t9...W...W...W..~T...W..~S...W..~R.{.W..oS...W..oT...W..oR...W..~V...W...V...W..o^...W..o....W..oU...W.Rich..W.........PE..d.. |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x140007010 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x634FCE01 [Wed Oct 19 10:14:25 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 0721ccf5c6e6216d478ef8b62a185a8b |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F0D4D2D3DE0h |
dec eax |
add esp, 28h |
jmp 00007F0D4D2D35B7h |
int3 |
int3 |
dec eax |
sub esp, 28h |
call 00007F0D4D2D4310h |
test eax, eax |
je 00007F0D4D2D3763h |
dec eax |
mov eax, dword ptr [00000030h] |
dec eax |
mov ecx, dword ptr [eax+08h] |
jmp 00007F0D4D2D3747h |
dec eax |
cmp ecx, eax |
je 00007F0D4D2D3756h |
xor eax, eax |
dec eax |
cmpxchg dword ptr [0059C658h], ecx |
jne 00007F0D4D2D3730h |
xor al, al |
dec eax |
add esp, 28h |
ret |
mov al, 01h |
jmp 00007F0D4D2D3739h |
int3 |
int3 |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
movzx eax, byte ptr [0059C643h] |
test ecx, ecx |
mov ebx, 00000001h |
cmove eax, ebx |
mov byte ptr [0059C633h], al |
call 00007F0D4D2D410Fh |
call 00007F0D4D2D604Eh |
test al, al |
jne 00007F0D4D2D3746h |
xor al, al |
jmp 00007F0D4D2D3756h |
call 00007F0D4D2E15C5h |
test al, al |
jne 00007F0D4D2D374Bh |
xor ecx, ecx |
call 00007F0D4D2D605Eh |
jmp 00007F0D4D2D372Ch |
mov al, bl |
dec eax |
add esp, 20h |
pop ebx |
ret |
int3 |
int3 |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
cmp byte ptr [0059C5F8h], 00000000h |
mov ebx, ecx |
jne 00007F0D4D2D37A9h |
cmp ecx, 01h |
jnbe 00007F0D4D2D37ACh |
call 00007F0D4D2D4276h |
test eax, eax |
je 00007F0D4D2D376Ah |
test ebx, ebx |
jne 00007F0D4D2D3766h |
dec eax |
lea ecx, dword ptr [0059C5E2h] |
call 00007F0D4D2D37E2h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x35b54 | 0x50 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x5a9000 | 0x0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x5a5000 | 0x22c8 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x5aa000 | 0x924 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x325f0 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x324b0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x25000 | 0x2b8 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x23a00 | 0x23a00 | False | 0.5471148574561403 | data | 6.451749786578579 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x25000 | 0x114a2 | 0x11600 | False | 0.4529142311151079 | data | 5.0725987080444 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x37000 | 0x56d970 | 0x56c200 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x5a5000 | 0x22c8 | 0x2400 | False | 0.4708116319444444 | data | 5.23134130430715 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
_RDATA | 0x5a8000 | 0x15c | 0x200 | False | 0.388671875 | data | 2.789737013974924 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x5a9000 | 0x1e0 | 0x200 | False | 0.533203125 | data | 4.7176788329467545 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x5aa000 | 0x924 | 0xa00 | False | 0.507421875 | data | 5.265914724175377 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_MANIFEST | 0x5a9060 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States |
DLL | Import |
---|---|
KERNEL32.dll | GetCurrentThreadId, GetCurrentProcessId, WriteConsoleW, SetEndOfFile, HeapSize, CreateFileW, GetProcessHeap, SetStdHandle, EncodePointer, DecodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetStringTypeW, GetCPInfo, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapFree, CloseHandle, GetConsoleOutputCP, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, RtlUnwind |
USER32.dll | GetForegroundWindow, PostMessageA |
SHELL32.dll | ShellExecuteA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
192.168.2.6194.190.152.19349712515682037085 10/19/22-18:11:13.648788 | TCP | 2037085 | ET TROJAN Win32/Unknown Stealer Command (loader) (Outbound) | 49712 | 51568 | 192.168.2.6 | 194.190.152.193 |
192.168.2.6194.190.152.19349705515682037086 10/19/22-18:11:11.925460 | TCP | 2037086 | ET TROJAN Win32/Unknown Stealer Command (domaindetect) (Outbound) | 49705 | 51568 | 192.168.2.6 | 194.190.152.193 |
192.168.2.6194.190.152.19349706515682037084 10/19/22-18:11:12.053781 | TCP | 2037084 | ET TROJAN Win32/Unknown Stealer Command (filegrab) (Outbound) | 49706 | 51568 | 192.168.2.6 | 194.190.152.193 |
194.190.152.193192.168.2.651568497062037089 10/19/22-18:11:12.115808 | TCP | 2037089 | ET TROJAN Win32/Unknown Stealer Command Response (filegrab) (Inbound) | 51568 | 49706 | 194.190.152.193 | 192.168.2.6 |
192.168.2.6194.190.152.19349708515682037087 10/19/22-18:11:12.367036 | TCP | 2037087 | ET TROJAN Win32/Unknown Stealer Command (geoblock) (Outbound) | 49708 | 51568 | 192.168.2.6 | 194.190.152.193 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 19, 2022 18:11:11.864528894 CEST | 49705 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:11.924096107 CEST | 51568 | 49705 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:11.924210072 CEST | 49705 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:11.925460100 CEST | 49705 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:11.925522089 CEST | 49705 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:11.984785080 CEST | 51568 | 49705 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:11.985114098 CEST | 51568 | 49705 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:11.985136032 CEST | 51568 | 49705 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:11.985203028 CEST | 49705 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:11.988929987 CEST | 49706 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.050807953 CEST | 51568 | 49706 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.050991058 CEST | 49706 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.053781033 CEST | 49706 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.053817987 CEST | 49706 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.115638018 CEST | 51568 | 49706 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.115808010 CEST | 51568 | 49706 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.115824938 CEST | 51568 | 49706 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.115907907 CEST | 49706 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.172266960 CEST | 49707 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.229562998 CEST | 51568 | 49707 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.229676008 CEST | 49707 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.232882977 CEST | 49707 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.232933044 CEST | 49707 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.289764881 CEST | 51568 | 49707 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.293674946 CEST | 51568 | 49707 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.293690920 CEST | 51568 | 49707 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.293821096 CEST | 49707 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.303889990 CEST | 49708 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.366411924 CEST | 51568 | 49708 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.366560936 CEST | 49708 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.367036104 CEST | 49708 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.367106915 CEST | 49708 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:12.429174900 CEST | 51568 | 49708 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.429796934 CEST | 51568 | 49708 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.429862022 CEST | 51568 | 49708 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:12.429956913 CEST | 49708 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.508861065 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.568319082 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.568495989 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.569443941 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.570205927 CEST | 49712 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.646967888 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.646994114 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.647006989 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.647013903 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.647026062 CEST | 51568 | 49712 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.647320986 CEST | 49712 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.647357941 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.648787975 CEST | 49712 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.649127960 CEST | 49712 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.710519075 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.710685968 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.710817099 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.710882902 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.710962057 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.711069107 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.711132050 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.711273909 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.711389065 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.711504936 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.711520910 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.711622953 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.711879015 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.711966038 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.713484049 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.713669062 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.715138912 CEST | 51568 | 49712 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.715616941 CEST | 51568 | 49712 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.715759993 CEST | 49712 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.772422075 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772484064 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772512913 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772542953 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772572041 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772602081 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772634029 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772661924 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772758007 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.772842884 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.772849083 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.772881985 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.772954941 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.773081064 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.773176908 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.773392916 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.773521900 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.773708105 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.773818970 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.773997068 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.774027109 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.774096966 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.774135113 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.774311066 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.774405003 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.774621010 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.774719000 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.774904013 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.775018930 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.775181055 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.775264978 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.836395025 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.836450100 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.836483955 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.836646080 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.836646080 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.836875916 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.836950064 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.837194920 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.837225914 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.837260008 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.837295055 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.837512016 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.837583065 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.837913990 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.837944984 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.838044882 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.838044882 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.838342905 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.838372946 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.838514090 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.838514090 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.838641882 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.838671923 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.838761091 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.838761091 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.839052916 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.839133978 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.839445114 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.839519978 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.839701891 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.839730978 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.839761972 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.839797020 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.839797020 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.839843035 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.840158939 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.840190887 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.840225935 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.840305090 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.840507984 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.840591908 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.840766907 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.840797901 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.840874910 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.840874910 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.841203928 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.841283083 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.841581106 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.841610909 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.841677904 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.841677904 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.841876030 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.841903925 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.841973066 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.841973066 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.842298985 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.842370033 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.842694998 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.842722893 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.842796087 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.842796087 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.843003035 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.843034029 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.843067884 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:13.843431950 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.843461037 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.843810081 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.843839884 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.843869925 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.844084978 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.844151020 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.844537973 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899631023 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899708986 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899804115 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899836063 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899863005 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899892092 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899920940 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899949074 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.899976969 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900007010 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900034904 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900063038 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900090933 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900120020 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900149107 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900177002 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900206089 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900237083 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900418043 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900446892 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900634050 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.900847912 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.901071072 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.904083014 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.904115915 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.904711008 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.904741049 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.904939890 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905172110 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905201912 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905229092 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905260086 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905288935 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905318975 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905339003 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905359030 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905386925 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905654907 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.905884027 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.906140089 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.906440020 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.906662941 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.906939030 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.907176018 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.907207012 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.907444954 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.907890081 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.907923937 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.907994986 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.908541918 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.908576012 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.908754110 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.908783913 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.909048080 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.909312010 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.909548998 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.909866095 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.910140038 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:13.910172939 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:28.921581030 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:28.921710968 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:28.931274891 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Oct 19, 2022 18:11:28.990482092 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:29.789763927 CEST | 51568 | 49711 | 194.190.152.193 | 192.168.2.6 |
Oct 19, 2022 18:11:29.791908979 CEST | 49711 | 51568 | 192.168.2.6 | 194.190.152.193 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 18:11:01 |
Start date: | 19/10/2022 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6eb370000 |
File size: | 5916672 bytes |
MD5 hash: | 74CFFC19A09979E23BFD9F5A5378508B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 1 |
Start time: | 18:11:01 |
Start date: | 19/10/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6da640000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 2 |
Start time: | 18:11:03 |
Start date: | 19/10/2022 |
Path: | C:\Users\Public\Documents\relaunch_app.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x12a0000 |
File size: | 5681152 bytes |
MD5 hash: | 161D5CCDF1F7563E92D36AD1D5492CCC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Execution Graph
Execution Coverage: | 9.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 10.9% |
Total number of Nodes: | 294 |
Total number of Limit Nodes: | 16 |
Graph
Callgraph
Function 015C1060 Relevance: 21.3, APIs: 7, Strings: 5, Instructions: 307stringCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C3220 Relevance: 12.1, APIs: 8, Instructions: 68fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 012A11A0 Relevance: 12.1, APIs: 8, Instructions: 56COMMON
Control-flow Graph
C-Code - Quality: 36% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C2400 Relevance: 37.4, APIs: 18, Strings: 3, Instructions: 637stringCOMMON
C-Code - Quality: 30% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C2E00 Relevance: 19.8, APIs: 13, Instructions: 270COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
C-Code - Quality: 62% |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C3310 Relevance: 4.6, APIs: 3, Instructions: 57fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C3620 Relevance: 3.0, APIs: 2, Instructions: 21COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C0E90 Relevance: 1.3, APIs: 1, Instructions: 10COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C14C0 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C19D0 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 90memoryfileCOMMON
Control-flow Graph
C-Code - Quality: 26% |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C0950 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 34fileCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
C-Code - Quality: 100% |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C09D0 Relevance: 9.0, APIs: 6, Instructions: 35COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C33D0 Relevance: 7.6, APIs: 5, Instructions: 140COMMON
Control-flow Graph
C-Code - Quality: 60% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015C17A0 Relevance: 5.0, APIs: 4, Instructions: 33COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |