Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wSIWW3vyrB.exe

Overview

General Information

Sample name:wSIWW3vyrB.exe
renamed because original name is a hash value
Original sample name:848de6895fc2b6a1415564d88ec10917.exe
Analysis ID:1527159
MD5:848de6895fc2b6a1415564d88ec10917
SHA1:d0215843c2f33624a45c9bd359903adfdb74b9a1
SHA256:730012443a3df91c8bf067a31599ef529192e30b28372003dda7637b2966d5b0
Tags:exeuser-abuse_ch
Infos:

Detection

Supershell
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Supershell
AI detected suspicious sample
Machine Learning detection for sample
Uses whoami command line tool to query computer and username
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)

Classification

  • System is w10x64
  • wSIWW3vyrB.exe (PID: 5956 cmdline: "C:\Users\user\Desktop\wSIWW3vyrB.exe" MD5: 848DE6895FC2B6A1415564D88EC10917)
    • conhost.exe (PID: 7160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • whoami.exe (PID: 6568 cmdline: whoami MD5: A4A6924F3EAF97981323703D38FD99C4)
      • conhost.exe (PID: 6124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: wSIWW3vyrB.exe PID: 5956JoeSecurity_SupershellYara detected SupershellJoe Security
    Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: whoami, CommandLine: whoami, CommandLine|base64offset|contains: , Image: C:\Windows\System32\whoami.exe, NewProcessName: C:\Windows\System32\whoami.exe, OriginalFileName: C:\Windows\System32\whoami.exe, ParentCommandLine: "C:\Users\user\Desktop\wSIWW3vyrB.exe", ParentImage: C:\Users\user\Desktop\wSIWW3vyrB.exe, ParentProcessId: 5956, ParentProcessName: wSIWW3vyrB.exe, ProcessCommandLine: whoami, ProcessId: 6568, ProcessName: whoami.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: wSIWW3vyrB.exeReversingLabs: Detection: 42%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: wSIWW3vyrB.exeJoe Sandbox ML: detected
    Source: wSIWW3vyrB.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: E.pdb source: wSIWW3vyrB.exe
    Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty.pdb source: wSIWW3vyrB.exe, 00000000.00000002.3400189770.00000000018C9000.00000040.00000001.01000000.00000003.sdmp, wSIWW3vyrB.exe, 00000000.00000002.3400189770.0000000001965000.00000040.00000001.01000000.00000003.sdmp
    Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty-agent.pdb source: wSIWW3vyrB.exe, 00000000.00000002.3400189770.0000000001A11000.00000040.00000001.01000000.00000003.sdmp, wSIWW3vyrB.exe, 00000000.00000002.3400189770.0000000001AC3000.00000040.00000001.01000000.00000003.sdmp
    Source: Binary string: 4--E.pdb source: wSIWW3vyrB.exe
    Source: global trafficTCP traffic: 192.168.2.6:49710 -> 121.41.18.122:3232
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: unknownTCP traffic detected without corresponding DNS query: 121.41.18.122
    Source: classification engineClassification label: mal68.troj.winEXE@5/1@0/1
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6124:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7160:120:WilError_03
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeFile opened: C:\Windows\system32\69976f7ca267b317d321e50c93ac034a0d061a4d9f77fdb8638bc064d4799cc4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: wSIWW3vyrB.exeReversingLabs: Detection: 42%
    Source: wSIWW3vyrB.exeString found in binary or memory: Mask/Addr6
    Source: unknownProcess created: C:\Users\user\Desktop\wSIWW3vyrB.exe "C:\Users\user\Desktop\wSIWW3vyrB.exe"
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess created: C:\Windows\System32\whoami.exe whoami
    Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: samlib.dllJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\whoami.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\whoami.exeSection loaded: authz.dllJump to behavior
    Source: C:\Windows\System32\whoami.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\whoami.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\whoami.exeSection loaded: netutils.dllJump to behavior
    Source: wSIWW3vyrB.exeStatic file information: File size 5939200 > 1048576
    Source: wSIWW3vyrB.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x5a9c00
    Source: wSIWW3vyrB.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: E.pdb source: wSIWW3vyrB.exe
    Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty.pdb source: wSIWW3vyrB.exe, 00000000.00000002.3400189770.00000000018C9000.00000040.00000001.01000000.00000003.sdmp, wSIWW3vyrB.exe, 00000000.00000002.3400189770.0000000001965000.00000040.00000001.01000000.00000003.sdmp
    Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty-agent.pdb source: wSIWW3vyrB.exe, 00000000.00000002.3400189770.0000000001A11000.00000040.00000001.01000000.00000003.sdmp, wSIWW3vyrB.exe, 00000000.00000002.3400189770.0000000001AC3000.00000040.00000001.01000000.00000003.sdmp
    Source: Binary string: 4--E.pdb source: wSIWW3vyrB.exe
    Source: wSIWW3vyrB.exeStatic PE information: section name: UPX2
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess created: C:\Windows\System32\whoami.exe whoami
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: wSIWW3vyrB.exe, 00000000.00000002.3404630766.000001BA9A02C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\whoami.exeProcess token adjusted: DebugJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\wSIWW3vyrB.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: wSIWW3vyrB.exe PID: 5956, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: wSIWW3vyrB.exe PID: 5956, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Software Packing
    OS Credential Dumping1
    System Time Discovery
    Remote ServicesData from Local System1
    Non-Standard Port
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory1
    Security Software Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDS11
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1527159 Sample: wSIWW3vyrB.exe Startdate: 06/10/2024 Architecture: WINDOWS Score: 68 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected Supershell 2->21 23 Machine Learning detection for sample 2->23 25 AI detected suspicious sample 2->25 7 wSIWW3vyrB.exe 1 2->7         started        process3 dnsIp4 17 121.41.18.122, 3232, 49710 CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd China 7->17 27 Uses whoami command line tool to query computer and username 7->27 11 whoami.exe 1 7->11         started        13 conhost.exe 7->13         started        signatures5 process6 process7 15 conhost.exe 11->15         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    wSIWW3vyrB.exe42%ReversingLabsWin64.Trojan.ShellcodeRunner
    wSIWW3vyrB.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      121.41.18.122
      unknownChina
      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1527159
      Start date and time:2024-10-06 20:57:54 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 16s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:wSIWW3vyrB.exe
      renamed because original name is a hash value
      Original Sample Name:848de6895fc2b6a1415564d88ec10917.exe
      Detection:MAL
      Classification:mal68.troj.winEXE@5/1@0/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 20.190.159.4, 20.190.159.73, 20.190.159.2, 20.190.159.68, 20.190.159.64, 40.126.31.73, 20.190.159.23, 20.190.159.71
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ocsp.edge.digicert.com, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: wSIWW3vyrB.exe
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      fp2e7a.wpc.phicdn.nethttp://praveenxs.github.io/web-dev-task-4Get hashmaliciousHTMLPhisherBrowse
      • 192.229.221.95
      http://sanjaygowda23.github.io/netflix-homepageGet hashmaliciousHTMLPhisherBrowse
      • 192.229.221.95
      Ccpo9Gl48v.exeGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      http://sheikhmuhammadzain.github.io/netflixGet hashmaliciousHTMLPhisherBrowse
      • 192.229.221.95
      http://revshares-phase.pages.dev/Get hashmaliciousHTMLPhisherBrowse
      • 192.229.221.95
      http://www.multichainbridges.com/Get hashmaliciousUnknownBrowse
      • 192.229.221.95
      http://pub-2f611d096e8f43daa9347ca0cf8d9e84.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
      • 192.229.221.95
      https://pancake-swapp.github.io/Get hashmaliciousHTMLPhisherBrowse
      • 192.229.221.95
      https://helpinghandsadvocacy.org/Get hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://steamcommynutiy.com/glft/8412Get hashmaliciousUnknownBrowse
      • 192.229.221.95
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdhttp://ipfs.io/ipfs/bafybeidgkzr2gy7npe4yonk6p7s4chmwvgd2cp7bk7u6llfwiutgvt77tqGet hashmaliciousHTMLPhisherBrowse
      • 203.119.204.130
      na.elfGet hashmaliciousMiraiBrowse
      • 8.155.218.236
      z3hir.arm7.elfGet hashmaliciousMiraiBrowse
      • 39.105.115.14
      http://www.nesianlife.com/Get hashmaliciousUnknownBrowse
      • 120.26.6.231
      MOfHb44mph.elfGet hashmaliciousUnknownBrowse
      • 120.26.76.244
      Main.exeGet hashmaliciousUnknownBrowse
      • 182.92.211.93
      OPyF68i97j.exeGet hashmaliciousUnknownBrowse
      • 114.55.25.226
      OPyF68i97j.exeGet hashmaliciousUnknownBrowse
      • 114.55.25.226
      yakov.m68k.elfGet hashmaliciousMiraiBrowse
      • 8.173.5.16
      yakov.mpsl.elfGet hashmaliciousMiraiBrowse
      • 8.153.219.75
      No context
      No context
      Process:C:\Users\user\Desktop\wSIWW3vyrB.exe
      File Type:GLS_BINARY_LSB_FIRST
      Category:dropped
      Size (bytes):160
      Entropy (8bit):4.438743916256937
      Encrypted:false
      SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
      MD5:E467C82627F5E1524FDB4415AF19FC73
      SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
      SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
      SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
      File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
      Entropy (8bit):7.8915465929003235
      TrID:
      • Win64 Executable (generic) (12005/4) 74.95%
      • Generic Win/DOS Executable (2004/3) 12.51%
      • DOS Executable Generic (2002/1) 12.50%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
      File name:wSIWW3vyrB.exe
      File size:5'939'200 bytes
      MD5:848de6895fc2b6a1415564d88ec10917
      SHA1:d0215843c2f33624a45c9bd359903adfdb74b9a1
      SHA256:730012443a3df91c8bf067a31599ef529192e30b28372003dda7637b2966d5b0
      SHA512:ec0028b77cff56cdd5743de74416c8305879bc83fd2ef0d9d890636eedbd108860f5d88956941f53dd46edbfd4376737e4bd20f0e229249ddcbab1bc681dd295
      SSDEEP:98304:uDCZPZUmgjGXKXl5t9Fk6TXibjXOBswc6d81/IGOj1oUUL43BSx4iwnH6ZCpt+Zx:uDQOjG6XtjS+BvL8Ojul0HiLCpI
      TLSH:5956332B91493D73D06A1678A3392C4DB952540DE3DCA734EBA2D9E673BC3A20DBD071
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................".......Z.........@9........@..............................P............`... ............................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x1423940
      Entrypoint Section:UPX1
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:1
      File Version Major:6
      File Version Minor:1
      Subsystem Version Major:6
      Subsystem Version Minor:1
      Import Hash:6ed4f5f04d62b18d96b26d6db7c18840
      Instruction
      push ebx
      push esi
      push edi
      push ebp
      dec eax
      lea esi, dword ptr [FFA566DAh]
      dec eax
      lea edi, dword ptr [esi-00A79025h]
      push edi
      xor ebx, ebx
      xor ecx, ecx
      dec eax
      or ebp, FFFFFFFFh
      call 00007F6970E09615h
      add ebx, ebx
      je 00007F6970E095C4h
      rep ret
      mov ebx, dword ptr [esi]
      dec eax
      sub esi, FFFFFFFCh
      adc ebx, ebx
      mov dl, byte ptr [esi]
      rep ret
      dec eax
      lea eax, dword ptr [edi+ebp]
      cmp ecx, 05h
      mov dl, byte ptr [eax]
      jbe 00007F6970E095E3h
      dec eax
      cmp ebp, FFFFFFFCh
      jnbe 00007F6970E095DDh
      sub ecx, 04h
      mov edx, dword ptr [eax]
      dec eax
      add eax, 04h
      sub ecx, 04h
      mov dword ptr [edi], edx
      dec eax
      lea edi, dword ptr [edi+04h]
      jnc 00007F6970E095B1h
      add ecx, 04h
      mov dl, byte ptr [eax]
      je 00007F6970E095D2h
      dec eax
      inc eax
      mov byte ptr [edi], dl
      sub ecx, 01h
      mov dl, byte ptr [eax]
      dec eax
      lea edi, dword ptr [edi+01h]
      jne 00007F6970E095B2h
      rep ret
      cld
      inc ecx
      pop ebx
      jmp 00007F6970E095CAh
      dec eax
      inc esi
      mov byte ptr [edi], dl
      dec eax
      inc edi
      mov dl, byte ptr [esi]
      add ebx, ebx
      jne 00007F6970E095CCh
      mov ebx, dword ptr [esi]
      dec eax
      sub esi, FFFFFFFCh
      adc ebx, ebx
      mov dl, byte ptr [esi]
      jc 00007F6970E095A8h
      lea eax, dword ptr [ecx+01h]
      jmp 00007F6970E095C9h
      dec eax
      inc ecx
      call ebx
      adc eax, eax
      inc ecx
      call ebx
      adc eax, eax
      add ebx, ebx
      jne 00007F6970E095CCh
      mov ebx, dword ptr [esi]
      dec eax
      sub esi, FFFFFFFCh
      adc ebx, ebx
      mov dl, byte ptr [esi]
      jnc 00007F6970E095A6h
      sub eax, 03h
      jc 00007F6970E095DBh
      shl eax, 08h
      movzx edx, dl
      or eax, edx
      dec eax
      inc esi
      xor eax, FFFFFFFFh
      je 00007F6970E0961Ah
      sar eax, 1
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x10240000x9cUPX2
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      UPX00x10000xa790000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      UPX10xa7a0000x5aa0000x5a9c000414e75bcefb8af969388c5ce712cfc9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      UPX20x10240000x10000x2007e52da50a2c179bbebab5ba9aef24dfbFalse0.197265625data1.4609665700923298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      DLLImport
      KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
      TimestampSource PortDest PortSource IPDest IP
      Oct 6, 2024 20:58:50.698713064 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:50.703779936 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:50.703857899 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:50.703999043 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:50.709120035 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:51.834146976 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:51.834698915 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:51.834819078 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:51.839484930 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:51.839603901 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:52.273232937 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:52.273828983 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:52.273926020 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:52.278635025 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:52.278657913 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:52.710432053 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:52.711080074 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:52.716722012 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:53.146958113 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:53.147766113 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:53.152663946 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:53.586277008 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:53.586839914 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:53.591645002 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:54.024288893 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:54.065068960 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:54.159719944 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:54.179208040 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:54.184119940 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:54.252295971 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:54.256352901 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:54.256485939 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:54.261214018 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:54.261337042 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:55.497394085 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:55.545536041 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:55.635922909 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:55.636013985 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:55.636082888 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:55.636425972 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:55.636696100 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:55.646776915 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:55.646789074 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:56.079895020 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:56.127655029 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:56.219814062 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:56.220381021 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:56.220591068 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:56.220762014 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:56.220793009 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:56.225246906 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:56.225373983 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:56.225553036 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:56.225586891 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:57.038747072 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:57.086993933 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:57.171761990 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:57.181682110 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:57.183821917 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:57.186721087 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:57.188683987 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:58.084744930 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:58.132601023 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:58.135761023 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:58.136213064 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:58.136559010 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:58.141175032 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:58.141356945 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:58.954876900 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:59.002667904 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:59.087872982 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:59.088134050 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:59.088335037 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:59.093986988 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:59.093998909 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:59.617580891 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:59.619461060 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:58:59.624339104 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:59.906219006 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:58:59.954097986 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:00.039855957 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:00.040201902 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:00.040390015 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:00.044899940 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:00.045367956 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:01.988985062 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:01.989419937 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:01.989465952 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:01.989557981 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:01.989702940 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:01.990102053 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:01.990149975 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:01.990885019 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:01.990927935 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:01.991767883 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:01.991823912 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:02.006186008 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:02.006278038 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:02.148608923 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:02.149166107 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:02.153489113 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:02.154062986 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:02.210922956 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:02.215693951 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:02.898052931 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:02.945620060 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:02.982096910 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:03.032676935 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:03.142059088 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:03.147392035 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:05.246783972 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:05.252314091 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:05.257030964 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:10.693845034 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:10.694063902 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:10.698937893 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:16.576414108 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:16.576646090 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:16.581530094 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:22.016072035 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:22.016448021 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:22.021472931 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:27.455003977 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:27.455302954 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:27.460094929 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:32.895607948 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:32.895869017 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:32.900684118 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:38.335504055 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:38.335721970 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:38.341470957 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:43.775345087 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:43.777529001 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:43.782294989 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:49.217036963 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:49.217338085 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:49.222173929 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:54.571886063 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:54.572129011 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:54.576983929 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:59.913492918 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 20:59:59.913881063 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 20:59:59.918729067 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:05.254271984 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:05.254616022 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:05.259399891 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:10.598973989 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:10.599318981 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:10.604223967 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:15.940006971 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:15.940196991 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:15.945194960 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:21.280633926 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:21.280889988 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:21.285681009 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:26.627355099 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:26.627608061 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:26.632601976 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:31.976511002 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:31.976735115 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:31.981574059 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:37.317022085 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:37.317610979 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:37.322421074 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:42.658919096 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:42.659218073 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:42.664470911 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:48.001008034 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:48.001256943 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:48.008265018 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:53.343781948 CEST323249710121.41.18.122192.168.2.6
      Oct 6, 2024 21:00:53.343977928 CEST497103232192.168.2.6121.41.18.122
      Oct 6, 2024 21:00:53.348778009 CEST323249710121.41.18.122192.168.2.6
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 6, 2024 20:58:44.718962908 CEST1.1.1.1192.168.2.60xf1f2No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Oct 6, 2024 20:58:44.718962908 CEST1.1.1.1192.168.2.60xf1f2No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:14:58:49
      Start date:06/10/2024
      Path:C:\Users\user\Desktop\wSIWW3vyrB.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\wSIWW3vyrB.exe"
      Imagebase:0xf00000
      File size:5'939'200 bytes
      MD5 hash:848DE6895FC2B6A1415564D88EC10917
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Go lang
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:14:58:49
      Start date:06/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:14:59:00
      Start date:06/10/2024
      Path:C:\Windows\System32\whoami.exe
      Wow64 process (32bit):false
      Commandline:whoami
      Imagebase:0x7ff77b1e0000
      File size:73'728 bytes
      MD5 hash:A4A6924F3EAF97981323703D38FD99C4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:4
      Start time:14:59:00
      Start date:06/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly