Edit tour
Windows
Analysis Report
Ao88ZLN0Wi.exe
Overview
General Information
Detection
Laplas Clipper
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Yara detected Laplas Clipper
Snort IDS alert for network traffic
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Yara signature match
Drops PE files
Contains functionality to read the PEB
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
PE file contains executable resources (Code or Archives)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Abnormal high CPU Usage
Classification
- System is w10x64
- Ao88ZLN0Wi.exe (PID: 5536 cmdline:
C:\Users\u ser\Deskto p\Ao88ZLN0 Wi.exe MD5: 24774C7B900E0A51DF665776B502CFC9) - cmd.exe (PID: 2040 cmdline:
cmd.exe /C schtasks /create /t n jicTFBav sm /tr C:\ Users\user \AppData\R oaming\jic TFBavsm\PN cznLwIMl.e xe /st 00: 00 /du 999 9:59 /sc o nce /ri 1 /f MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 5308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - schtasks.exe (PID: 3216 cmdline:
schtasks / create /tn jicTFBavs m /tr C:\U sers\user\ AppData\Ro aming\jicT FBavsm\PNc znLwIMl.ex e /st 00:0 0 /du 9999 :59 /sc on ce /ri 1 / f MD5: 15FF7D8324231381BAD48A052F85DF04)
- PNcznLwIMl.exe (PID: 5376 cmdline:
C:\Users\u ser\AppDat a\Roaming\ jicTFBavsm \PNcznLwIM l.exe MD5: 6CE4DAC5A778F8E717E5C9C1222AE0DF)
- cleanup
{"C2 url": ["http://clipper.guru/bot/online"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown |
| |
Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown |
| |
JoeSecurity_LaplasClipper | Yara detected Laplas Clipper | Joe Security | ||
Windows_Trojan_Smokeloader_3687686f | unknown | unknown |
| |
JoeSecurity_LaplasClipper | Yara detected Laplas Clipper | Joe Security | ||
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LaplasClipper | Yara detected Laplas Clipper | Joe Security | ||
JoeSecurity_LaplasClipper | Yara detected Laplas Clipper | Joe Security | ||
JoeSecurity_LaplasClipper | Yara detected Laplas Clipper | Joe Security | ||
JoeSecurity_LaplasClipper | Yara detected Laplas Clipper | Joe Security | ||
JoeSecurity_LaplasClipper | Yara detected Laplas Clipper | Joe Security | ||
Click to see the 7 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.445.159.189.11549685802039775 11/27/22-18:21:56.410768 |
SID: | 2039775 |
Source Port: | 49685 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.48.8.8.862577532039774 11/27/22-18:21:56.327003 |
SID: | 2039774 |
Source Port: | 62577 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | Avira: |
Source: | Joe Sandbox ML: |
Source: | Malware Configuration Extractor: |
Compliance |
---|
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | ASN Name: |
Source: | IP Address: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Binary or memory string: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_02AECCA9 | |
Source: | Code function: | 0_2_02AECD62 | |
Source: | Code function: | 6_2_02B6ECA9 | |
Source: | Code function: | 6_2_02B6ED62 |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process Stats: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Code function: | 0_2_02AE87C6 |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Static file information: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Source: | Code function: | 0_2_02AEB8A2 | |
Source: | Code function: | 0_2_02AEA12C | |
Source: | Code function: | 0_2_02AEADF5 | |
Source: | Code function: | 0_2_02AEAF7C | |
Source: | Code function: | 0_2_02AEAF7C | |
Source: | Code function: | 6_2_02B6D8A2 | |
Source: | Code function: | 6_2_02B6C12C | |
Source: | Code function: | 6_2_02B6CDF5 | |
Source: | Code function: | 6_2_02B6CF7C | |
Source: | Code function: | 6_2_02B6CF7C |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_02AE80A3 | |
Source: | Code function: | 6_2_02B6A0A3 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 2 Command and Scripting Interpreter | 1 Scheduled Task/Job | 11 Process Injection | 1 Masquerading | 1 Input Capture | 1 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | 1 Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Scheduled Task/Job | 11 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | Exfiltration Over Bluetooth | 1 Ingress Tool Transfer | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 Remote System Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 2 Software Packing | NTDS | 1 System Information Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 2 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
51% | Virustotal | Browse | ||
41% | ReversingLabs | Win32.Trojan.MintZard | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1242346 |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | HEUR/AGEN.1215478 | Download File | ||
100% | Avira | HEUR/AGEN.1215478 | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | HEUR/AGEN.1215478 | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | HEUR/AGEN.1215478 | Download File |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
13% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
clipper.guru | 45.159.189.115 | true | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
true |
| unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.159.189.115 | clipper.guru | Netherlands | 14576 | HOSTING-SOLUTIONSUS | true |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 754720 |
Start date and time: | 2022-11-27 18:18:56 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 11m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Ao88ZLN0Wi.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.spyw.evad.winEXE@7/3@1/1 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
- Not all processes where analyzed, report is missing behavior information
- Report creation exceeded maximum time and may have missing disassembly code information.
Time | Type | Description |
---|---|---|
18:21:32 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
45.159.189.115 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
clipper.guru | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
HOSTING-SOLUTIONSUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\Ao88ZLN0Wi.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 774832757 |
Entropy (8bit): | 7.99999948335202 |
Encrypted: | true |
SSDEEP: | |
MD5: | 6CE4DAC5A778F8E717E5C9C1222AE0DF |
SHA1: | 78A241368DB6DE9123703900FD5499E340E6B086 |
SHA-256: | F88DFE5CF742D3DE8999BF1326EA9F718ACE6371FCEEB828350AC85C65AF9EA0 |
SHA-512: | 6EADC6E66A1B49F7829BF5D2E0E24E40F563F87F1DFB3F41B89A1237C4E97019457E671A9D4B22671B6C6E550C23633FFF657A7EE505E54A4138D8BFC52480C1 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Roaming\jicTFBavsm\PNcznLwIMl.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 116 |
Entropy (8bit): | 4.053374040827532 |
Encrypted: | false |
SSDEEP: | 3:rmHD/tH//lllLGlA1yqGlgZty:rmH2oty |
MD5: | 080E701E8B8E2E9C68203C150AC7C6B7 |
SHA1: | 4EF041621388B805758AE1D3B122F9D364705223 |
SHA-256: | FE129AE2A7C96708754F6F51091E6E512C9FEACA1042A1E9DB914C651FEB344D |
SHA-512: | C11D88B8E355B7B922B985802464B693F75BA4C2A62F9137A15842CA82F9B6B3ED13059EDC0DF1C04E7DE43719D892B4C0D22BB67BE0D57EAB368BA1BC057E79 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\schtasks.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73 |
Entropy (8bit): | 4.559200415871013 |
Encrypted: | false |
SSDEEP: | 3:BgnKDOheMmgDUWsKAK89AAAXb:BgnKqhquP8K89o |
MD5: | B811CB5DB5B2D2DAE21D673D3DF58A90 |
SHA1: | 91D661C8B60FD14A287183715AA03DD30200B26E |
SHA-256: | 2F90070AC4E055F795B7756E3005C2B26BB288CD14AC4FF6ADFD48F1B2BCDE86 |
SHA-512: | 2F6FC6D8CF96AB83B802D613A6191628618961A789284112712F66A0B153738F4D0BE6A0AFD5DDBB444A1BE4300842559C6A1A68F3FA5690052FA52EBB837B8D |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.984281039322701 |
TrID: |
|
File name: | Ao88ZLN0Wi.exe |
File size: | 2311168 |
MD5: | 24774c7b900e0a51df665776b502cfc9 |
SHA1: | 220db17c0ba6b83ead730bf65c6e34d4da4eadaa |
SHA256: | 81e9eefec051e50a819e76fa1ec2f088c2e8c5de677537838193cf6c2e5c7584 |
SHA512: | ea7c38cbc7611d53a8f79243a7031939e18ea841d4c6a22ebbc4773292ee6f8fb174ac5a1d4be8bb6c343e528ecc1f49bed0c8ea6fb7271ff3941e84c58d668c |
SSDEEP: | 49152:D52VUM+pj0i6fodAXT49NxSUIBdxorsSaiMLy5pb504BRdT4Hol7UR:l2VjsEwdqTgXSUIVIR7Rq4BbsHol7 |
TLSH: | 83B5339B7293E076D823C8761C39D2056F9B3578A6287E1CFB1079361F206F9EE57242 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.+...x...x...x.J;x...x.W8x...x.W.x...x...x...x...x5..x.W)x...x.W9x...x.W<x...xRich...x................PE..L......`........... |
Icon Hash: | c8d0d8e0f8e0f0e8 |
Entrypoint: | 0x404377 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60E1C6D5 [Sun Jul 4 14:33:57 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | 77b9cbeda5e32323ee560d94649c1c1a |
Instruction |
---|
call 00007F2F2C700F52h |
jmp 00007F2F2C6FBB3Dh |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push ebp |
mov ebp, esp |
push edi |
push esi |
mov esi, dword ptr [ebp+0Ch] |
mov ecx, dword ptr [ebp+10h] |
mov edi, dword ptr [ebp+08h] |
mov eax, ecx |
mov edx, ecx |
add eax, esi |
cmp edi, esi |
jbe 00007F2F2C6FBCCAh |
cmp edi, eax |
jc 00007F2F2C6FBE6Ah |
cmp ecx, 00000100h |
jc 00007F2F2C6FBCE1h |
cmp dword ptr [00CE20BCh], 00000000h |
je 00007F2F2C6FBCD8h |
push edi |
push esi |
and edi, 0Fh |
and esi, 0Fh |
cmp edi, esi |
pop esi |
pop edi |
jne 00007F2F2C6FBCCAh |
pop esi |
pop edi |
pop ebp |
jmp 00007F2F2C701014h |
test edi, 00000003h |
jne 00007F2F2C6FBCD7h |
shr ecx, 02h |
and edx, 03h |
cmp ecx, 08h |
jc 00007F2F2C6FBCECh |
rep movsd |
jmp dword ptr [00404504h+edx*4] |
nop |
mov eax, edi |
mov edx, 00000003h |
sub ecx, 04h |
jc 00007F2F2C6FBCCEh |
and eax, 03h |
add ecx, eax |
jmp dword ptr [00404418h+eax*4] |
jmp dword ptr [00404514h+ecx*4] |
nop |
jmp dword ptr [00404498h+ecx*4] |
nop |
sub byte ptr [eax+eax*2+00h], al |
push esp |
inc esp |
inc eax |
add byte ptr [eax+44h], bh |
inc eax |
add byte ptr [ebx], ah |
ror dword ptr [edx-75F877FAh], 1 |
inc esi |
add dword ptr [eax+468A0147h], ecx |
add al, cl |
jmp 00007F2F2EB744C7h |
add esi, 00000000h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x107dc | 0x50 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8e3000 | 0x33f0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x1280 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x2810 | 0x40 | .text |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0x23c | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x104f0 | 0x10600 | False | 0.5105110925572519 | data | 6.103711544667787 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x12000 | 0x8d00c4 | 0x220600 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x8e3000 | 0x33f0 | 0x3400 | False | 0.6714242788461539 | data | 5.978161453913827 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
KADI | 0x8e5d68 | 0x4a3 | ASCII text, with very long lines (1187), with no line terminators | Raeto-Romance | Switzerland |
RT_ICON | 0x8e3250 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | Raeto-Romance | Switzerland |
RT_ICON | 0x8e3918 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Raeto-Romance | Switzerland |
RT_ICON | 0x8e3e80 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | Raeto-Romance | Switzerland |
RT_ICON | 0x8e4f28 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | Raeto-Romance | Switzerland |
RT_ICON | 0x8e58b0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Raeto-Romance | Switzerland |
RT_ACCELERATOR | 0x8e6210 | 0x98 | data | Raeto-Romance | Switzerland |
RT_GROUP_ICON | 0x8e5d18 | 0x4c | data | Raeto-Romance | Switzerland |
RT_VERSION | 0x8e62a8 | 0x148 | x86 executable not stripped |
DLL | Import |
---|---|
KERNEL32.dll | EnumSystemCodePagesA, EnumDateFormatsW, OpenMutexA, GetConsoleAliasExesLengthW, CopyFileExW, ReadConsoleOutputCharacterA, GetEnvironmentStrings, GetCommConfig, QueryDosDeviceA, EnumCalendarInfoExA, SetProcessPriorityBoost, CreateJobSet, AddConsoleAliasW, CreateFileA, GetMailslotInfo, GetWindowsDirectoryA, GetModuleHandleA, GlobalHandle, CreateDirectoryExA, GetLogicalDriveStringsA, ReadConsoleInputA, FindNextVolumeMountPointW, OpenWaitableTimerA, GetVersionExW, SearchPathA, RequestWakeupLatency, CallNamedPipeA, GetCurrentDirectoryW, GetDriveTypeW, CreateMailslotW, BuildCommDCBAndTimeoutsW, GetProcAddress, LoadLibraryA, LocalAlloc, MoveFileWithProgressW, GetBinaryTypeA, TerminateThread, WriteConsoleOutputA, GetCommandLineW, GetVolumeInformationA, VerifyVersionInfoA, DeleteTimerQueue, SearchPathW, CopyFileW, GetHandleInformation, FindResourceA, CreateJobObjectW, FindFirstVolumeW, GlobalFlags, CreateNamedPipeW, WritePrivateProfileStringW, InterlockedDecrement, GetModuleHandleW, GetTickCount, VerSetConditionMask, WriteTapemark, GetTapeParameters, HeapLock, GetConsoleTitleW, InterlockedExchangeAdd, EnumCalendarInfoA, InterlockedExchange, GetNamedPipeHandleStateA, TerminateProcess, MoveFileA, AddAtomW, UnregisterWait, FreeEnvironmentStringsW, SetConsoleTitleA, SetVolumeMountPointW, VirtualProtect, _hread, ClearCommBreak, GlobalFindAtomA, CloseHandle, FindFirstChangeNotificationA, LoadLibraryW, GetLastError, HeapFree, HeapAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, DeleteFileA, GetCommandLineA, GetStartupInfoA, GetCurrentProcess, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, FreeEnvironmentStringsA, WideCharToMultiByte, GetEnvironmentStringsW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, SetFilePointer, GetConsoleCP, GetConsoleMode, MultiByteToWideChar, HeapSize, GetLocaleInfoA, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile |
USER32.dll | GetComboBoxInfo, CharUpperBuffA, GetMenuInfo |
GDI32.dll | GetCharABCWidthsA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Raeto-Romance | Switzerland |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
192.168.2.445.159.189.11549685802039775 11/27/22-18:21:56.410768 | TCP | 2039775 | ET TROJAN Laplas Clipper - Regex CnC Request | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
192.168.2.48.8.8.862577532039774 11/27/22-18:21:56.327003 | UDP | 2039774 | ET TROJAN Laplas Clipper CnC Domain (clipper .guru) in DNS Lookup | 62577 | 53 | 192.168.2.4 | 8.8.8.8 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 27, 2022 18:21:56.362102985 CET | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
Nov 27, 2022 18:21:56.391436100 CET | 80 | 49685 | 45.159.189.115 | 192.168.2.4 |
Nov 27, 2022 18:21:56.391727924 CET | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
Nov 27, 2022 18:21:56.410768032 CET | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
Nov 27, 2022 18:21:56.440361977 CET | 80 | 49685 | 45.159.189.115 | 192.168.2.4 |
Nov 27, 2022 18:21:56.445704937 CET | 80 | 49685 | 45.159.189.115 | 192.168.2.4 |
Nov 27, 2022 18:21:56.586589098 CET | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
Nov 27, 2022 18:21:57.549923897 CET | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
Nov 27, 2022 18:21:57.584654093 CET | 80 | 49685 | 45.159.189.115 | 192.168.2.4 |
Nov 27, 2022 18:21:57.686286926 CET | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
Nov 27, 2022 18:22:27.682094097 CET | 49685 | 80 | 192.168.2.4 | 45.159.189.115 |
Nov 27, 2022 18:22:27.711343050 CET | 80 | 49685 | 45.159.189.115 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 27, 2022 18:21:56.327003002 CET | 62577 | 53 | 192.168.2.4 | 8.8.8.8 |
Nov 27, 2022 18:21:56.346370935 CET | 53 | 62577 | 8.8.8.8 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 27, 2022 18:21:56.327003002 CET | 192.168.2.4 | 8.8.8.8 | 0x9b7 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 27, 2022 18:21:56.346370935 CET | 8.8.8.8 | 192.168.2.4 | 0x9b7 | No error (0) | 45.159.189.115 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.4 | 49685 | 45.159.189.115 | 80 | C:\Users\user\AppData\Roaming\jicTFBavsm\PNcznLwIMl.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Nov 27, 2022 18:21:56.410768032 CET | 92 | OUT | |
Nov 27, 2022 18:21:56.445704937 CET | 93 | IN |