Windows
Analysis Report
e90zPYFENm.exe
Overview
General Information
Sample name: | e90zPYFENm.exerenamed because original name is a hash value |
Original sample name: | 4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa.exe |
Analysis ID: | 1502168 |
MD5: | 94807b134058d14399767d8f5d84a5d5 |
SHA1: | b01a404085091bd567e9c129baecf8230ccbfc46 |
SHA256: | 4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa |
Tags: | 119-45-147-28exe |
Infos: | |
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- e90zPYFENm.exe (PID: 6628 cmdline:
"C:\Users\ user\Deskt op\e90zPYF ENm.exe" MD5: 94807B134058D14399767D8F5D84A5D5)
- cleanup
{"Type": "Metasploit Download", "URL": "http://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MetasploitPayload_3 | Yara detected Metasploit Payload | Joe Security | ||
Windows_Trojan_Metasploit_0f5a852d | Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families. | unknown |
| |
Windows_Trojan_Metasploit_c9773203 | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. | unknown |
| |
JoeSecurity_MetasploitPayload_3 | Yara detected Metasploit Payload | Joe Security | ||
Windows_Trojan_Metasploit_0f5a852d | Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families. | unknown |
| |
Click to see the 1 entries |
Timestamp: | 2024-08-31T11:47:46.313345+0200 |
SID: | 2028765 |
Severity: | 3 |
Source Port: | 49715 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Unknown Traffic |
Timestamp: | 2024-08-31T11:45:56.078747+0200 |
SID: | 2028765 |
Severity: | 3 |
Source Port: | 49717 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Unknown Traffic |
Timestamp: | 2024-08-31T11:47:09.235138+0200 |
SID: | 2028765 |
Severity: | 3 |
Source Port: | 49713 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Unknown Traffic |
Timestamp: | 2024-08-31T11:46:32.079108+0200 |
SID: | 2028765 |
Severity: | 3 |
Source Port: | 49704 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Unknown Traffic |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF71F481C94 |
Networking |
---|
Source: | URLs: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF71F48D860 | |
Source: | Code function: | 0_2_00007FF71F48BA50 | |
Source: | Code function: | 0_2_00007FF71F488F00 | |
Source: | Code function: | 0_2_00007FF71F483D58 | |
Source: | Code function: | 0_2_00007FF71F487D20 | |
Source: | Code function: | 0_2_00007FF71F48B550 | |
Source: | Code function: | 0_2_00007FF71F48E1F0 | |
Source: | Code function: | 0_2_00007FF71F4827F0 | |
Source: | Code function: | 0_2_0000022BBCDE0936 |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | API coverage: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF71F481180 |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 DLL Side-Loading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | 1 Archive Collected Data | 12 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Obfuscated Files or Information | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 11 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
61% | ReversingLabs | Win64.Backdoor.Swrort | ||
53% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
2% | Virustotal | Browse |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
119.45.147.28 | unknown | China | 45090 | CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompa | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1502168 |
Start date and time: | 2024-08-31 11:45:07 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | e90zPYFENm.exerenamed because original name is a hash value |
Original Sample Name: | 4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa.exe |
Detection: | MAL |
Classification: | mal80.troj.winEXE@1/0@0/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompa | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
|
File type: | |
Entropy (8bit): | 6.042459121075471 |
TrID: |
|
File name: | e90zPYFENm.exe |
File size: | 73'728 bytes |
MD5: | 94807b134058d14399767d8f5d84a5d5 |
SHA1: | b01a404085091bd567e9c129baecf8230ccbfc46 |
SHA256: | 4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa |
SHA512: | e5a07dbf6bfd47283bca22b12c9f2aa080427c9c7650f92d19b194ca7ed156bd10307b027206f6b24296931ee26d514fb777145515e2208c8959a03b38c24d58 |
SSDEEP: | 1536:8F++kp8oc6BQwZjKuJHo9WOqvKGoRGL8qVUdzrsgcFJhnItmT53m:lvzc6BQwZjKuJI9WrsRGL3OcFJhItmhm |
TLSH: | D6732A67F3A350F8C113C574459B67B2EA31BC214874BB6D87E0EA722E22E51FE69311 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....sf...............).......................@...................................../....`... ............................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x1400013d0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH |
Time Stamp: | 0x6673B0BA [Thu Jun 20 04:31:54 2024 UTC] |
TLS Callbacks: | 0x40001560, 0x1, 0x40001530, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | c723e9af32e40ee9cd97441df2c4ea30 |
Instruction |
---|
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00010D25h] |
mov dword ptr [eax], 00000001h |
call 00007F2E0CE79AAFh |
nop |
nop |
dec eax |
add esp, 28h |
ret |
nop dword ptr [eax] |
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00010D05h] |
mov dword ptr [eax], 00000000h |
call 00007F2E0CE79A8Fh |
nop |
nop |
dec eax |
add esp, 28h |
ret |
nop dword ptr [eax] |
dec eax |
sub esp, 28h |
call 00007F2E0CE8783Ch |
dec eax |
cmp eax, 01h |
sbb eax, eax |
dec eax |
add esp, 28h |
ret |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
dec eax |
lea ecx, dword ptr [00000009h] |
jmp 00007F2E0CE79CE9h |
nop dword ptr [eax+00h] |
ret |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [0000EBA5h] |
dec eax |
mov eax, dword ptr [eax] |
dec eax |
test eax, eax |
je 00007F2E0CE79D34h |
nop dword ptr [eax+eax+00h] |
call eax |
dec eax |
mov eax, dword ptr [0000EB8Fh] |
dec eax |
lea edx, dword ptr [eax+08h] |
dec eax |
mov eax, dword ptr [eax+08h] |
dec eax |
mov dword ptr [0000EB80h], edx |
dec eax |
test eax, eax |
jne 00007F2E0CE79CF5h |
dec eax |
add esp, 28h |
ret |
nop word ptr [eax+eax+00h] |
push esi |
push ebx |
dec eax |
sub esp, 28h |
dec eax |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x16000 | 0x8d0 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x13000 | 0x57c | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x19000 | 0x94 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x11540 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x16258 | 0x208 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xe328 | 0xe400 | 43a91766180d67c8ce111e9bd941a8d7 | False | 0.5532997532894737 | data | 6.187637412043698 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x10000 | 0x100 | 0x200 | 395a4e9f11c8b3f97e55c1b5c78206d1 | False | 0.1640625 | data | 1.1390273388522143 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x11000 | 0x1830 | 0x1a00 | f17419416e8e79e96db0d0ad7233fdb1 | False | 0.3117487980769231 | data | 4.893737932260672 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.pdata | 0x13000 | 0x57c | 0x600 | d2e16b3786312bc2fc3648be71769094 | False | 0.4934895833333333 | data | 4.309111008094311 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.xdata | 0x14000 | 0x56c | 0x600 | c8cc16dc306ff100e0c055a12467a5cb | False | 0.3053385416666667 | data | 4.1806771646521055 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.bss | 0x15000 | 0xc80 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x16000 | 0x8d0 | 0xa00 | 45a3787a44cc66bf355793a2da7abe04 | False | 0.319921875 | data | 3.819323089090164 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0x17000 | 0x60 | 0x200 | eb9c3cc3a0b4c9366754ba7755a2651d | False | 0.068359375 | data | 0.28265357431271465 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x18000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x19000 | 0x94 | 0x200 | 9d7a9b2d83b3d1cf4c2b0abc53f9f8d0 | False | 0.267578125 | data | 1.6272808376258594 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
KERNEL32.dll | DeleteCriticalSection, EnterCriticalSection, GetLastError, HeapAlloc, HeapCreate, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WideCharToMultiByte |
msvcrt.dll | __C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _errno, _fmode, _initterm, _lock, _onexit, _strrev, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, getc, isspace, isxdigit, localeconv, malloc, memcpy, memmove, memset, realloc, signal, strerror, strlen, strncmp, strtol, strtoul, tolower, ungetc, vfprintf, wcslen, _strtoui64, _strtoi64 |
USER32.dll | EnumWindows |
Timestamp | Protocol | SID | Signature | Severity | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|---|
2024-08-31T11:47:46.313345+0200 | TCP | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 49715 | 443 | 192.168.2.5 | 119.45.147.28 |
2024-08-31T11:45:56.078747+0200 | TCP | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 49717 | 443 | 192.168.2.5 | 119.45.147.28 |
2024-08-31T11:47:09.235138+0200 | TCP | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 49713 | 443 | 192.168.2.5 | 119.45.147.28 |
2024-08-31T11:46:32.079108+0200 | TCP | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 49704 | 443 | 192.168.2.5 | 119.45.147.28 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 31, 2024 11:46:00.002305984 CEST | 49704 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:46:00.002336025 CEST | 443 | 49704 | 119.45.147.28 | 192.168.2.5 |
Aug 31, 2024 11:46:00.002466917 CEST | 49704 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:46:00.010966063 CEST | 49704 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:46:00.010977983 CEST | 443 | 49704 | 119.45.147.28 | 192.168.2.5 |
Aug 31, 2024 11:46:32.079108000 CEST | 49704 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:46:37.096266985 CEST | 49713 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:46:37.096312046 CEST | 443 | 49713 | 119.45.147.28 | 192.168.2.5 |
Aug 31, 2024 11:46:37.096410036 CEST | 49713 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:46:37.097058058 CEST | 49713 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:46:37.097073078 CEST | 443 | 49713 | 119.45.147.28 | 192.168.2.5 |
Aug 31, 2024 11:47:09.235137939 CEST | 49713 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:14.253420115 CEST | 49715 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:14.253467083 CEST | 443 | 49715 | 119.45.147.28 | 192.168.2.5 |
Aug 31, 2024 11:47:14.253551960 CEST | 49715 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:14.253942013 CEST | 49715 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:14.253957987 CEST | 443 | 49715 | 119.45.147.28 | 192.168.2.5 |
Aug 31, 2024 11:47:46.313344955 CEST | 49715 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:51.332501888 CEST | 49717 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:51.332542896 CEST | 443 | 49717 | 119.45.147.28 | 192.168.2.5 |
Aug 31, 2024 11:47:51.332633972 CEST | 49717 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:51.332951069 CEST | 49717 | 443 | 192.168.2.5 | 119.45.147.28 |
Aug 31, 2024 11:47:51.332964897 CEST | 443 | 49717 | 119.45.147.28 | 192.168.2.5 |
Target ID: | 0 |
Start time: | 05:45:58 |
Start date: | 31/08/2024 |
Path: | C:\Users\user\Desktop\e90zPYFENm.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff71f480000 |
File size: | 73'728 bytes |
MD5 hash: | 94807B134058D14399767D8F5D84A5D5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 2.3% |
Dynamic/Decrypted Code Coverage: | 1.7% |
Signature Coverage: | 35.4% |
Total number of Nodes: | 1332 |
Total number of Limit Nodes: | 8 |
Graph
Function 0000022BBCDE0936 Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 155networklibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00007FF71F48F1B0 Relevance: 15.8, APIs: 5, Strings: 4, Instructions: 83memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000022BBCDE0981 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 169networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0000022BBCDE09EE Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 112networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00007FF71F4827F0 Relevance: 115.8, APIs: 62, Strings: 3, Instructions: 2069COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F483D58 Relevance: 35.6, APIs: 19, Strings: 1, Instructions: 634COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F48BA50 Relevance: 20.7, APIs: 8, Strings: 3, Instructions: 1496stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F481180 Relevance: 10.6, APIs: 7, Instructions: 138sleepstringCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F488F00 Relevance: 8.9, APIs: 1, Strings: 4, Instructions: 1385COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F481C94 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 91COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F481710 Relevance: 12.4, APIs: 3, Strings: 4, Instructions: 138COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F4818F0 Relevance: 7.2, APIs: 1, Strings: 3, Instructions: 231memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F481600 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 38COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F4816E0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F4816B0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F4816A0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F4816D0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F4816C0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF71F481638 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 24COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|