Windows
Analysis Report
cGOpAkgTL.exe
Overview
General Information
Sample Name: | cGOpAkgTL.exe (renamed file extension from bin to exe, renamed because original name is a hash value) |
Original Sample Name: | cGOpAkgTL.bin |
Analysis ID: | 861748 |
MD5: | b5e31f4e2836b8a67f8684988d224107 |
SHA1: | 9816f30629d210b64742be970d412512df600c11 |
SHA256: | efed59c2b1473891a2032927baebe69c87dcace3d87e0b359fe583bbe9181b9b |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
cGOpAkgTL.exe (PID: 2412 cmdline:
C:\Users\u ser\Deskto p\cGOpAkgT L.exe MD5: B5E31F4E2836B8A67F8684988D224107) cGOpAkgTL.exe (PID: 2592 cmdline:
C:\Users\u ser\Deskto p\cGOpAkgT L.exe MD5: B5E31F4E2836B8A67F8684988D224107)
mapirepl.exe (PID: 1764 cmdline:
C:\Windows \SysWOW64\ mapirepl.e xe MD5: B5E31F4E2836B8A67F8684988D224107) mapirepl.exe (PID: 1624 cmdline:
C:\Windows \SysWOW64\ mapirepl.e xe MD5: B5E31F4E2836B8A67F8684988D224107)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Emotet | While Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021. |
{
"C2 list": [
"104.33.204.83:443",
"164.77.138.194:80",
"181.16.4.180:80",
"190.117.51.248:443",
"23.240.26.210:80",
"190.111.215.2:80",
"85.105.205.77:8080",
"143.0.245.169:8080",
"200.55.136.2:443",
"186.23.186.99:443",
"51.255.50.164:8080",
"192.163.199.254:8080",
"23.254.203.51:8080",
"72.47.248.48:8080",
"69.163.33.82:8080",
"73.115.132.124:80",
"190.144.66.30:8080",
"186.137.133.132:8080",
"109.104.79.48:8080",
"66.209.69.165:443",
"210.2.86.72:8080",
"189.208.239.98:443",
"201.184.224.178:80",
"92.48.118.27:8080",
"173.248.147.186:80",
"138.68.139.199:443",
"219.94.254.93:8080",
"185.86.148.222:8080",
"144.76.117.247:8080",
"70.28.3.120:7080",
"165.227.213.173:8080",
"159.65.76.245:443",
"209.159.244.240:443",
"5.9.128.163:8080",
"190.171.105.158:7080",
"184.161.177.223:8080",
"186.138.205.189:80"
]
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Emotet | Emotet Payload | kevoreilly |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Emotet | Emotet Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Emotet | Emotet Payload | kevoreilly |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Click to see the 3 entries |
- • AV Detection
- • Compliance
- • Networking
- • E-Banking Fraud
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Avira: |
Source: | Static PE information: |
Networking |
---|
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File created: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | File deleted: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Static PE information: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Data Obfuscation |
---|
Source: | Key value queried: | Jump to behavior | ||
Source: | Key value queried: | Jump to behavior | ||
Source: | Key value queried: | Jump to behavior | ||
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 1_2_001CCDF1 | |
Source: | Code function: | 1_2_001CCC8B |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | Executable created and started: | Jump to behavior |
Source: | PE file moved: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process information queried: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Memory protected: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 11 Process Injection | 12 Masquerading | OS Credential Dumping | 1 Virtualization/Sandbox Evasion | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 2 Ingress Tool Transfer | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | 1 Remote System Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 1 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 11 Process Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 112 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Hidden Files and Directories | LSA Secrets | 14 System Information Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 2 Obfuscated Files or Information | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | 13 Software Packing | DCSync | Network Sniffing | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | 1 File Deletion | Proc Filesystem | Network Service Scanning | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
97% | ReversingLabs | Win32.Trojan.Emotet | ||
64% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1361713 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.ZPACK.Gen7 | Download File |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
9% | Virustotal | Browse | ||
9% | Virustotal | Browse | ||
6% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
windowsupdatebg.s.llnwi.net | 95.140.230.192 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
72.47.248.48 | unknown | United States | 31815 | MEDIATEMPLEUS | true | |
165.227.213.173 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
173.248.147.186 | unknown | United States | 30475 | WEHOSTWEBSITES-COMUS | true | |
5.9.128.163 | unknown | Germany | 24940 | HETZNER-ASDE | true | |
190.111.215.2 | unknown | Argentina | 11014 | CPSAR | true | |
66.209.69.165 | unknown | United States | 23005 | SWITCH-LTDUS | true | |
186.23.186.99 | unknown | Argentina | 27747 | TelecentroSAAR | true | |
190.144.66.30 | unknown | Colombia | 14080 | TelmexColombiaSACO | true | |
219.94.254.93 | unknown | Japan | 9371 | SAKURA-CSAKURAInternetIncJP | true | |
109.104.79.48 | unknown | United Kingdom | 20738 | GD-EMEA-DC-LD5GB | true | |
159.65.76.245 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
181.16.4.180 | unknown | Argentina | 27984 | VerTvSAAR | true | |
143.0.245.169 | unknown | Argentina | 12150 | COTELCAMAR | true | |
138.68.139.199 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
144.76.117.247 | unknown | Germany | 24940 | HETZNER-ASDE | true | |
210.2.86.72 | unknown | Viet Nam | 24085 | QTSC-AS-VNQuangTrungSoftwareCityDevelopmentCompanyVN | true | |
192.163.199.254 | unknown | United States | 46606 | UNIFIEDLAYER-AS-1US | true | |
185.86.148.222 | unknown | Latvia | 52173 | MAKONIXLV | true | |
190.117.51.248 | unknown | Peru | 12252 | AmericaMovilPeruSACPE | true | |
190.171.105.158 | unknown | Costa Rica | 52263 | TelecableEconomicoSACR | true | |
92.48.118.27 | unknown | United Kingdom | 29550 | SIMPLYTRANSITGB | true | |
186.138.205.189 | unknown | Argentina | 10318 | TelecomArgentinaSAAR | true | |
51.255.50.164 | unknown | France | 16276 | OVHFR | true | |
69.163.33.82 | unknown | United States | 46816 | DSNETWORKS-001US | true | |
189.208.239.98 | unknown | Mexico | 6503 | AxtelSABdeCVMX | true | |
70.28.3.120 | unknown | Canada | 577 | BACOMCA | true | |
200.55.136.2 | unknown | Cuba | 27725 | EmpresadeTelecomunicacionesdeCubaSACU | true | |
85.105.205.77 | unknown | Turkey | 9121 | TTNETTR | true | |
73.115.132.124 | unknown | United States | 7922 | COMCAST-7922US | true | |
186.137.133.132 | unknown | Argentina | 10318 | TelecomArgentinaSAAR | true | |
209.159.244.240 | unknown | United States | 20412 | CLARITY-TELECOMUS | true | |
184.161.177.223 | unknown | Canada | 5769 | VIDEOTRONCA | true | |
164.77.138.194 | unknown | Chile | 6471 | ENTELCHILESACL | true | |
201.184.224.178 | unknown | Colombia | 13489 | EPMTelecomunicacionesSAESPCO | true | |
104.33.204.83 | unknown | United States | 20001 | TWC-20001-PACWESTUS | true | |
23.240.26.210 | unknown | United States | 20001 | TWC-20001-PACWESTUS | true | |
23.254.203.51 | unknown | United States | 54290 | HOSTWINDSUS | true |
Joe Sandbox Version: | 37.1.0 Beryl |
Analysis ID: | 861748 |
Start date and time: | 2023-05-09 03:24:12 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 53s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | cGOpAkgTL.exe (renamed file extension from bin to exe, renamed because original name is a hash value) |
Original Sample Name: | cGOpAkgTL.bin |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@6/0@0/37 |
EGA Information: |
|
HDC Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe - Excluded IPs from analysis (wh
itelisted): 209.197.3.8, 104.1 8.32.68, 172.64.155.188 - Excluded domains from analysis
(whitelisted): crl.comodoca.c om.cdn.cloudflare.net, ctldl.w indowsupdate.com, crl.usertrus t.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net - Report size getting too big, t
oo many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
03:24:22 | API Interceptor | |
03:24:31 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
72.47.248.48 | Get hash | malicious | Emotet | Browse |
| |
219.94.254.93 | Get hash | malicious | Browse | |||
Get hash | malicious | Browse | ||||
Get hash | malicious | Browse | ||||
Get hash | malicious | Browse | ||||
Get hash | malicious | Browse | ||||
Get hash | malicious | Browse | ||||
Get hash | malicious | Browse | ||||
165.227.213.173 | Get hash | malicious | CryptOne Emotet | Browse | ||
66.209.69.165 | Get hash | malicious | Emotet | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
windowsupdatebg.s.llnwi.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Amadey, RedLine | Browse |
| ||
Get hash | malicious | AsyncRAT, AveMaria, Neshta, UACMe | Browse |
| ||
Get hash | malicious | Amadey, RedLine | Browse |
| ||
Get hash | malicious | Amadey, Djvu, Fabookie, RedLine, SmokeLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
MEDIATEMPLEUS | Get hash | malicious | Emotet | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Moobot | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
DIGITALOCEAN-ASNUS | Get hash | malicious | Emotet | Browse |
| |
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, Amadey, Lokibot, Raccoon Stealer v2, RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | BluStealer, ThunderFox Stealer, a310Logger | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | BluStealer, ThunderFox Stealer, a310Logger | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | BluStealer, ThunderFox Stealer, a310Logger | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
File type: | |
Entropy (8bit): | 5.690892374707669 |
TrID: |
|
File name: | cGOpAkgTL.exe |
File size: | 334088 |
MD5: | b5e31f4e2836b8a67f8684988d224107 |
SHA1: | 9816f30629d210b64742be970d412512df600c11 |
SHA256: | efed59c2b1473891a2032927baebe69c87dcace3d87e0b359fe583bbe9181b9b |
SHA512: | df796b4f07339444517b9a869e39b94529660767925f10d6744575b10a2845af870f9b108e3b5129b301bcbc226032f4d2a938e426a104c4a2bb3d2cf3e36d4b |
SSDEEP: | 3072:W52YsjMOAfd5UrsEvMzeLq+c1WPE68En5EsqYaVGm7/e5zzcW:BYgMrjUwE0KLk368uaVGlcW |
TLSH: | 2764E5796CAF08B5CF1B8DB3DD64C69521D1FB287D33A34F8006B599D83272069AB513 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P|.9...j...j...j.Ohj...j3..j...j...j...j...j...j.O~j...j.Oij...j.Olj...jRich...j........................PE..L...J..\........... |
Icon Hash: | e8f8b2d1319bc668 |
Entrypoint: | 0x404da0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5C7FC94A [Wed Mar 6 13:21:14 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | b4e1a1f1c6ea9653edb6a4eea8901766 |
Signature Valid: | false |
Signature Issuer: | CN=MNCIDLXK |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | CD3D71C2C497CF155471A0C8EBF5CB4D |
Thumbprint SHA-1: | 7282EE73B03710F2C1BFD00A6A9F7AC0C16A373D |
Thumbprint SHA-256: | 80DCFB0B033828B8417920E7A8B75DDF0DD14F1BEABD64181FA525FEC7B5AF86 |
Serial: | CFF025AB763F39A6407EA5D2E35A6690 |
Instruction |
---|
push ebp |
mov ebp, esp |
sub esp, 14h |
mov dword ptr [ebp-08h], 00000000h |
mov dword ptr [ebp-04h], 00000000h |
push 000004DCh |
push 000001CFh |
call 00007EFD38631672h |
add esp, 08h |
mov dword ptr [ebp-04h], 00000001h |
jmp 00007EFD3863192Bh |
mov eax, dword ptr [ebp-04h] |
add eax, 01h |
mov dword ptr [ebp-04h], eax |
cmp dword ptr [ebp-04h], 01FCA055h |
jnc 00007EFD38631924h |
jmp 00007EFD3863190Eh |
mov edx, dword ptr [ebp+08h] |
mov dword ptr [00444D5Ch], edx |
mov dword ptr [00444D3Ch], ebp |
mov dword ptr [ebp-04h], 00000000h |
jmp 00007EFD38631922h |
mov ecx, dword ptr [00406004h] |
mov dword ptr [00444D94h], ecx |
push 000004DCh |
push 000001CFh |
call 00007EFD3863161Fh |
add esp, 08h |
mov dword ptr [ebp-04h], 00000000h |
mov edx, dword ptr [00444CF8h] |
add edx, dword ptr [ebp-04h] |
mov byte ptr [edx], 0000006Ah |
mov eax, dword ptr [00444CF8h] |
add eax, dword ptr [ebp-04h] |
mov byte ptr [eax+01h], 0000006Fh |
mov ecx, dword ptr [00444CF8h] |
add ecx, dword ptr [ebp-04h] |
mov byte ptr [ecx+02h], 00000075h |
mov edx, dword ptr [00444CF8h] |
add edx, dword ptr [ebp-04h] |
mov byte ptr [edx+03h], 00000066h |
mov eax, dword ptr [00444CF8h] |
add eax, dword ptr [ebp-04h] |
mov byte ptr [eax+04h], 00000073h |
mov ecx, dword ptr [00444CF8h] |
add ecx, dword ptr [ebp-04h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xfd30 | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x45000 | 0xd9e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x50c00 | 0xd08 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x6000 | 0x408 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x4a4b | 0x4c00 | False | 0.8237561677631579 | data | 7.440597257986008 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x6000 | 0xb394 | 0xb400 | False | 0.5960503472222223 | data | 5.524645379479194 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x12000 | 0x32db4 | 0x32e00 | False | 0.39076896498771496 | data | 5.081796379641181 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x45000 | 0xd9e0 | 0xda00 | False | 0.43276949541284404 | data | 5.084431522271247 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_BITMAP | 0x45750 | 0x428 | Device independent bitmap graphic, 16 x 16 x 32, image size 1024 | ||
RT_BITMAP | 0x45b78 | 0x1028 | Device independent bitmap graphic, 32 x 32 x 32, image size 4096 | ||
RT_BITMAP | 0x46ba0 | 0x428 | Device independent bitmap graphic, 16 x 16 x 32, image size 1024 | ||
RT_BITMAP | 0x46fc8 | 0x428 | Device independent bitmap graphic, 16 x 16 x 32, image size 1024 | ||
RT_BITMAP | 0x473f0 | 0x428 | Device independent bitmap graphic, 16 x 16 x 32, image size 1024 | ||
RT_BITMAP | 0x47818 | 0x428 | Device independent bitmap graphic, 16 x 16 x 32, image size 1024 | ||
RT_BITMAP | 0x47c40 | 0x1028 | Device independent bitmap graphic, 32 x 32 x 32, image size 4096 | ||
RT_BITMAP | 0x48c68 | 0x428 | Device independent bitmap graphic, 16 x 16 x 32, image size 1024 | ||
RT_ICON | 0x4a9a0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | English | United States |
RT_ICON | 0x4b848 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | United States |
RT_ICON | 0x4c0f0 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | United States |
RT_ICON | 0x4c658 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | United States |
RT_ICON | 0x4ec00 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | English | United States |
RT_ICON | 0x4fca8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | English | United States |
RT_ICON | 0x50630 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | English | United States |
RT_RCDATA | 0x49090 | 0x10 | data | ||
RT_RCDATA | 0x490a0 | 0x98 | data | ||
RT_RCDATA | 0x49138 | 0x4d8 | Delphi compiled form 'TfrmAutoUpdateCheck' | ||
RT_RCDATA | 0x49610 | 0xb8c | Delphi compiled form 'TMadExcept' | ||
RT_RCDATA | 0x4a1a0 | 0x34b | Delphi compiled form 'TMEContactForm' | ||
RT_RCDATA | 0x4a4f0 | 0x227 | Delphi compiled form 'TMEDetailsForm' | ||
RT_RCDATA | 0x4a718 | 0x286 | Delphi compiled form 'TMEScrShotForm' | ||
RT_RCDATA | 0x52420 | 0x5bf | XML 1.0 document, ASCII text | English | United States |
RT_GROUP_ICON | 0x50a98 | 0x68 | data | English | United States |
RT_VERSION | 0x50b00 | 0x314 | data | German | Germany |
RT_VERSION | 0x50e18 | 0x310 | data | English | United States |
RT_VERSION | 0x51128 | 0x32c | data | Spanish | Spain |
RT_VERSION | 0x51458 | 0x330 | data | French | France |
RT_VERSION | 0x51788 | 0x330 | data | Portuguese | Brazil |
RT_VERSION | 0x51ab8 | 0x310 | data | English | Great Britain |
RT_VERSION | 0x51dc8 | 0x32c | data | Spanish | Mexico |
RT_VERSION | 0x520f8 | 0x328 | data | Portuguese | Portugal |
DLL | Import |
---|---|
KERNEL32.dll | FileTimeToLocalFileTime, FindClose, FindFirstFileW, FindNextFileW, FindResourceW, FlushInstructionCache, FormatMessageW, FreeLibrary, FreeResource, GenerateConsoleCtrlEvent, GetACP, GetCPInfo, GetCommandLineW, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetEnvironmentVariableW, GetExitCodeThread, GetFileAttributesW, GetFileType, GetFullPathNameW, GetLastError, GetLocalTime, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleW, GetNamedPipeHandleStateW, GetOverlappedResult, GetPrivateProfileSectionW, GetPrivateProfileStringW, GetProcAddress, GetStartupInfoA, GetStdHandle, GetSystemDefaultLCID, GetSystemInfo, GetSystemTime, GetTempFileNameW, GetTempPathW, GetThreadLocale, GetThreadSelectorEntry, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExW, GetVolumeInformationA, GetWindowsDirectoryW, GlobalAddAtomW, GlobalDeleteAtom, GlobalFindAtomW, GlobalFree, HeapCreate, HeapDestroy, InitAtomTable, InitializeCriticalSection, InterlockedCompareExchange, InterlockedDecrement, InterlockedExchange, InterlockedExchangeAdd, InterlockedIncrement, IsBadReadPtr, IsDBCSLeadByte, FileTimeToDosDateTime, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LoadResource, LocalAlloc, LocalFileTimeToFileTime, LocalFree, LockResource, MapViewOfFile, Module32FirstW, MoveFileExW, MoveFileW, MulDiv, MultiByteToWideChar, OpenFileMappingW, OpenProcess, OpenSemaphoreA, OutputDebugStringW, RaiseException, ReadFile, ReplaceFile, ResetEvent, ResetWriteWatch, ResumeThread, RtlUnwind, SearchPathW, SetComputerNameW, SetConsoleOutputCP, SetEndOfFile, SetEnvironmentVariableW, SetErrorMode, SetEvent, SetFileAttributesW, SetFilePointer, SetFileTime, SetLastError, SetStdHandle, SetThreadLocale, SignalObjectAndWait, SizeofResource, Sleep, SwitchToThread, SystemTimeToFileTime, TerminateProcess, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UnmapViewOfFile, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, VirtualQueryEx, WaitForMultipleObjectsEx, WaitForSingleObject, WideCharToMultiByte, WinExec, WriteFile, WritePrivateProfileStringA, WritePrivateProfileStringW, WriteProcessMemory, lstrcpyW, lstrcpynW, lstrlenW, GetModuleHandleA, ExitThread, ExitProcess, EnumUILanguagesA, EnumCalendarInfoA, EnterCriticalSection, DosDateTimeToFileTime, DeleteFileW, DeleteCriticalSection, CreateToolhelp32Snapshot, CreateThread, CreateProcessW, CreateFileW, CreateFileMappingW, CreateFileA, CreateEventW, CreateDirectoryW, CreateDirectoryExW, CopyFileExA, CompareStringW, CompareStringA, CloseHandle, IsValidLocale, CancelTimerQueueTimer |
USER32.dll | GetSystemMetrics, GetWindow, GetWindowLongW, GetWindowRect, GetWindowTextW, IsWindow, IsWindowVisible, LoadBitmapW, LoadCursorW, LoadIconW, LoadStringW, MapWindowPoints, MessageBoxW, OemToCharA, OemToCharBuffA, PeekMessageW, PostMessageW, RegisterClassExW, ReleaseDC, SendDlgItemMessageW, SendMessageW, SetDlgItemTextW, SetFocus, SetForegroundWindow, SetWindowLongW, SetWindowPos, SetWindowTextW, ShowWindow, TranslateMessage, UpdateWindow, WaitForInputIdle, wvsprintfA, wvsprintfW, IsWindowUnicode, GetDoubleClickTime, GetDialogBaseUnits, IsWindowEnabled, IsCharUpperA, DrawMenuBar, EndMenu, InSendMessage, IsClipboardFormatAvailable, GetMessageExtraInfo, CharNextW, ReleaseCapture, IsCharAlphaNumericW, CreateMenu, CloseWindow, CloseDesktop, GetListBoxInfo, CloseWindowStation, WindowFromDC, IsMenu, OpenIcon, GetFocus, GetParent, GetMessageW, GetDlgItemTextW, GetDlgItem, GetDC, GetClientRect, GetClassNameW, FindWindowExW, EndDialog, EnableWindow, DispatchMessageW, DialogBoxParamW, DestroyWindow, DestroyIcon, DefWindowProcW, CreateWindowExW, CopyRect, CharUpperW, CharUpperA, CharToOemBuffW, CharToOemBuffA, CharToOemA, GetSysColor |
GDI32.dll | GetObjectType, CreatePatternBrush, CloseFigure, DeleteObject, DeleteEnhMetaFile, SaveDC |
ADVAPI32.dll | OpenProcessToken, RegOpenKeyA, SetFileSecurityW, SetFileSecurityA, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, RegCreateKeyExW |
IMM32.dll | ImmGetContext, ImmGetOpenStatus, ImmReleaseContext |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
German | Germany | |
Spanish | Spain | |
French | France | |
Portuguese | Brazil | |
English | Great Britain | |
Spanish | Mexico | |
Portuguese | Portugal |
Download Network PCAP: filtered – full
- Total Packets: 21
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 9, 2023 03:25:30.498343945 CEST | 49177 | 443 | 192.168.2.22 | 104.33.204.83 |
May 9, 2023 03:25:30.498425961 CEST | 443 | 49177 | 104.33.204.83 | 192.168.2.22 |
May 9, 2023 03:25:30.498519897 CEST | 49177 | 443 | 192.168.2.22 | 104.33.204.83 |
May 9, 2023 03:25:30.498999119 CEST | 49177 | 443 | 192.168.2.22 | 104.33.204.83 |
May 9, 2023 03:25:30.499030113 CEST | 443 | 49177 | 104.33.204.83 | 192.168.2.22 |
May 9, 2023 03:25:30.499147892 CEST | 443 | 49177 | 104.33.204.83 | 192.168.2.22 |
May 9, 2023 03:25:31.316324949 CEST | 49178 | 80 | 192.168.2.22 | 164.77.138.194 |
May 9, 2023 03:25:34.326220989 CEST | 49178 | 80 | 192.168.2.22 | 164.77.138.194 |
May 9, 2023 03:25:40.332722902 CEST | 49178 | 80 | 192.168.2.22 | 164.77.138.194 |
May 9, 2023 03:25:52.346601963 CEST | 49179 | 80 | 192.168.2.22 | 164.77.138.194 |
May 9, 2023 03:25:55.357001066 CEST | 49179 | 80 | 192.168.2.22 | 164.77.138.194 |
May 9, 2023 03:26:01.363354921 CEST | 49179 | 80 | 192.168.2.22 | 164.77.138.194 |
May 9, 2023 03:26:13.428508043 CEST | 49180 | 80 | 192.168.2.22 | 181.16.4.180 |
May 9, 2023 03:26:16.434293032 CEST | 49180 | 80 | 192.168.2.22 | 181.16.4.180 |
May 9, 2023 03:26:22.440764904 CEST | 49180 | 80 | 192.168.2.22 | 181.16.4.180 |
May 9, 2023 03:26:34.455245972 CEST | 49181 | 80 | 192.168.2.22 | 181.16.4.180 |
May 9, 2023 03:26:37.464862108 CEST | 49181 | 80 | 192.168.2.22 | 181.16.4.180 |
May 9, 2023 03:26:43.471313000 CEST | 49181 | 80 | 192.168.2.22 | 181.16.4.180 |
May 9, 2023 03:26:55.626044989 CEST | 49182 | 443 | 192.168.2.22 | 190.117.51.248 |
May 9, 2023 03:26:55.626154900 CEST | 443 | 49182 | 190.117.51.248 | 192.168.2.22 |
May 9, 2023 03:26:55.626238108 CEST | 49182 | 443 | 192.168.2.22 | 190.117.51.248 |
May 9, 2023 03:26:55.626491070 CEST | 49182 | 443 | 192.168.2.22 | 190.117.51.248 |
May 9, 2023 03:26:55.626514912 CEST | 443 | 49182 | 190.117.51.248 | 192.168.2.22 |
May 9, 2023 03:26:55.626601934 CEST | 443 | 49182 | 190.117.51.248 | 192.168.2.22 |
May 9, 2023 03:26:56.686548948 CEST | 49183 | 80 | 192.168.2.22 | 23.240.26.210 |
May 9, 2023 03:26:59.696723938 CEST | 49183 | 80 | 192.168.2.22 | 23.240.26.210 |
May 9, 2023 03:27:05.703171968 CEST | 49183 | 80 | 192.168.2.22 | 23.240.26.210 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
May 9, 2023 03:25:14.544099092 CEST | 8.8.8.8 | 192.168.2.22 | 0x3aef | No error (0) | 95.140.230.192 | A (IP address) | IN (0x0001) | false | ||
May 9, 2023 03:25:14.544099092 CEST | 8.8.8.8 | 192.168.2.22 | 0x3aef | No error (0) | 95.140.230.128 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.22 | 49177 | 104.33.204.83 | 443 | C:\Windows\SysWOW64\mapirepl.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
May 9, 2023 03:25:30.498999119 CEST | 4 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.22 | 49182 | 190.117.51.248 | 443 | C:\Windows\SysWOW64\mapirepl.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
May 9, 2023 03:26:55.626491070 CEST | 7 | OUT |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 03:24:13 |
Start date: | 09/05/2023 |
Path: | C:\Users\user\Desktop\cGOpAkgTL.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 334088 bytes |
MD5 hash: | B5E31F4E2836B8A67F8684988D224107 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Target ID: | 2 |
Start time: | 03:24:14 |
Start date: | 09/05/2023 |
Path: | C:\Users\user\Desktop\cGOpAkgTL.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 334088 bytes |
MD5 hash: | B5E31F4E2836B8A67F8684988D224107 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 3 |
Start time: | 03:24:22 |
Start date: | 09/05/2023 |
Path: | C:\Windows\SysWOW64\mapirepl.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 334088 bytes |
MD5 hash: | B5E31F4E2836B8A67F8684988D224107 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 4 |
Start time: | 03:24:23 |
Start date: | 09/05/2023 |
Path: | C:\Windows\SysWOW64\mapirepl.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 334088 bytes |
MD5 hash: | B5E31F4E2836B8A67F8684988D224107 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 46.1% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 18 |
Total number of Limit Nodes: | 0 |
Graph
Callgraph
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |