Windows
Analysis Report
msvcp110.dll
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll32.exe (PID: 6480 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\msv cp110.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618) - conhost.exe (PID: 6028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5832 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\msv cp110.dll" ,#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - rundll32.exe (PID: 5960 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\msvc p110.dll", #1 MD5: 889B99C52A60DD49227C5E485A016679) - aspnet_regiis.exe (PID: 5092 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 5960 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 092 -s 126 0 MD5: C31336C1EFC2CCB44B4326EA793040F2) - rundll32.exe (PID: 2404 cmdline:
rundll32.e xe C:\User s\user\Des ktop\msvcp 110.dll,Ge tGameData MD5: 889B99C52A60DD49227C5E485A016679) - aspnet_regiis.exe (PID: 4488 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 5920 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 488 -s 124 4 MD5: C31336C1EFC2CCB44B4326EA793040F2) - rundll32.exe (PID: 5344 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\msvc p110.dll", GetGameDat a MD5: 889B99C52A60DD49227C5E485A016679) - aspnet_regiis.exe (PID: 5276 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 1444 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 276 -s 126 8 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Stealc | Stealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests. | No Attribution |
{"C2 url": "http://95.217.125.57/2f571d994666c8cb.php", "Botnet": "36495972654"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
Click to see the 10 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
Click to see the 1 entries |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 6_2_00758680 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 6_2_0075B048 | |
Source: | Code function: | 7_2_0301B048 | |
Source: | Code function: | 10_2_0319B048 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Evasive API call chain: | graph_7-13459 |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Code function: | 6_2_00741160 |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 6_2_007445C0 |
Source: | Code function: | 6_2_00759750 | |
Source: | Code function: | 7_2_03019750 | |
Source: | Code function: | 10_2_03199750 |
Source: | Memory protected: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 6_2_00757B90 | |
Source: | Code function: | 7_2_03017B90 | |
Source: | Code function: | 10_2_03197B90 |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 6_2_00757850 |
Source: | Code function: | 6_2_00757A30 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 311 Process Injection | 11 Disable or Modify Tools | OS Credential Dumping | 1 System Time Discovery | Remote Services | Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | LSASS Memory | 21 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 311 Process Injection | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 11 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 2 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Rundll32 | LSA Secrets | 1 Account Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 System Owner/User Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 132 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
63% | ReversingLabs | Win32.Trojan.Tedy | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
true | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
95.217.125.57 | unknown | Germany | 24940 | HETZNER-ASDE | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1541478 |
Start date and time: | 2024-10-24 21:49:08 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 32s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 20 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | msvcp110.dll |
Detection: | MAL |
Classification: | mal100.troj.evad.winDLL@19/13@0/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.182.143.212
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: msvcp110.dll
Time | Type | Description |
---|---|---|
15:49:59 | API Interceptor | |
15:50:01 | API Interceptor | |
15:50:27 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
95.217.125.57 | Get hash | malicious | Stealc | Browse |
| |
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HETZNER-ASDE | Get hash | malicious | Stealc | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | HTMLPhisher, TechSupportScam | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_c7496913b9c4ddf6a8ea5944b8f620d91bfba12_edfe2fff_6d2334a9-d117-4c9d-a14b-c975bce9f6c7\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9590496265491976 |
Encrypted: | false |
SSDEEP: | 192:dRcP1xC0BU/4ju0ZrVZSzuiF2Z24IO8CBHw:LmxJBU/4jP8zuiF2Y4IO8CBH |
MD5: | 1D114E1B98FB9C8C7DFA39A940330603 |
SHA1: | 9052ABAE3EE01417514B7FA0FD16F4183B84BCAC |
SHA-256: | FF3566C24321DEFC55C9DDACCE800A4050DA93CED4789E249247A51A4D8AA27D |
SHA-512: | 27DC7C525C9E5D4AE352AA0A12E8D956EF85D7912D467E8EC8226E8A71A942C1525D6EA6BB4FEE98863B4108F1AF39ADB3B5550FF1DA18E28EDDED50AEB8A811 |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_c7496913b9c4ddf6a8ea5944b8f620d91bfba12_edfe2fff_73e42fea-b641-47b7-9191-6583a7169bb0\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9589222191980253 |
Encrypted: | false |
SSDEEP: | 192:78ixXP1VC0BU/4ju0ZrVZazuiF2Z24IO8CBHw:QQNVJBU/4jPEzuiF2Y4IO8CBH |
MD5: | 831285CF69DF220DEBB42D59709DB1AE |
SHA1: | B42EF4D8805185A1CF588BDA4D297E442D6B3B50 |
SHA-256: | EA2D25DCBFA5561FFCB162DE7042057753828B27CF168CC9A0E95C0F72448C8E |
SHA-512: | 01B94702F2CC1D0492A81704DAAA80C29249A56E612BDC7C7EECB284851CC124BD3768679D014268F20BD004E328F3B4270B1DE9F5B371B4004892E7AD0F60EE |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_c7496913b9c4ddf6a8ea5944b8f620d91bfba12_edfe2fff_e6cff271-b88a-43cf-821c-19466915ba55\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9591073704243255 |
Encrypted: | false |
SSDEEP: | 192:Ib7P1RC0BU/4ju0ZrVZazuiF2Z24IO8CBHw:cRRJBU/4jPEzuiF2Y4IO8CBH |
MD5: | 9D7999D546A3238ED40AA2A7A662CF8E |
SHA1: | 2C48D1294D6893E37133A1B58716EBC8583408D0 |
SHA-256: | BA3F5E3CCB66D41E1D0036C56611E134AB118FCEFED7A5797169A3AC239850EE |
SHA-512: | 1E210D945F8A8AB8B2AB2613A0541A098B10C4E01E98ED9A4DAA0686DDC7C3C1496A91DA05ED82F2753528F69C2543E8D9246060FF9D41D99C1DB05B6F34B82A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 116598 |
Entropy (8bit): | 1.6203438626240492 |
Encrypted: | false |
SSDEEP: | 384:9OW5sc1zbSEFtBCsjPBiNnF/pjEukm8ED:75sc1/SEFtDgNnrQtK |
MD5: | 8887503B8C596E96A9DFAE2207176B8A |
SHA1: | 678334BCAFFEFD9F71DD265D43FBBD1D900F3E4F |
SHA-256: | 1353010C27F5AF19AD961AB204927FF3C334411529837563D07D637D1878FC41 |
SHA-512: | 80816382B20EE7CB26471370068BB4BA24E1E0623F4B61EC3CB022A68C3BCC493083406CA71CCF84BC5DA17C62991259A4FB118D285F56B52AC86CA58AB32694 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8360 |
Entropy (8bit): | 3.6965711090821176 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJeI6e6YBX76Sq7h4gmfutprp89bpmsfRjm:R6lXJp6e6YBL6Sqigmfu2pFfY |
MD5: | 1888A91352795DA17E08D7B12B20AF51 |
SHA1: | 28B76E413CD708CA9FCBD508A09F263CAB928573 |
SHA-256: | D313842F1807F69DD29BFEACFE89556E21411D15F25FAAB9CE8D400D9B4F202B |
SHA-512: | 1CF61DE494351459A4ED5D2A1B40A7F791A7B5ECA84661E6E1F1A033AF96A7603FC440DF22B41C88235E3D62BBBBD3BE8A1F0A428D04B460E6DF8C3346ED2985 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4675 |
Entropy (8bit): | 4.460095411802302 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs6Jg77aI9ij5WpW8VYXBYm8M4JhqeFGdM+q8b3s0SaraTMd:uIjfII7AI7VWgJh6dMgc0SaraTMd |
MD5: | 42C5948CD938F4EFC22F292B41F30E0D |
SHA1: | 80D441C01B89E54D20F8EA73582F813EEF719486 |
SHA-256: | B8E08D2566880FC3A356730C09DBF1CDC377FD161905A611D5B15765C77851DE |
SHA-512: | 7DCDDD669C7B820DEE08582CD2CA5B528ACDB5526E385E54B7E929D96583FAECB78C7F723D60CE3DCDC4361852C654187CAED4C02F7A57B703616B8852C83CC3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 115518 |
Entropy (8bit): | 1.6351844297158578 |
Encrypted: | false |
SSDEEP: | 384:G7W5sc12TSEKPbAghHuUS6pwr0YQ3oaY1IV+hB5XiJTHrb:35sc12TSEKjPGoYsoX1IY5XQL |
MD5: | 732F03B9F457C5FBFED7C9F33430EE33 |
SHA1: | 49950F48FAB0B9C7012D578C49DD96745DCB0465 |
SHA-256: | 2B72CD814DABEA67F5923AF44333DECFC4D6D4E9CFAC69D44D2083203FD49060 |
SHA-512: | AE4C5D8DB5039240DA5E1B632AC12B913EFD96ABD67BC69E2747570C3E0B0BE9468FA3A9AC391E9A37D422E233280E9DE57287883E7E286427ADE71B2C7055AC |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6360 |
Entropy (8bit): | 3.722114229301873 |
Encrypted: | false |
SSDEEP: | 96:RSIU6o7wVetbGe67eSYuQE/CKP5aM4U889bgLsf6gm:R6l7wVeJGe67eSYutpr889bgLsf6gm |
MD5: | 23F4EEB23B94BF2F811EA28582DE49A9 |
SHA1: | D4CA66E6655E3FC318F4A1F03D9DF74ADD3C2229 |
SHA-256: | 2E94B7589DA970C30A41FF9B4A55B865CF048823E8CBB3F46E84F7EC5EB770E8 |
SHA-512: | DC07DA25D271AB8B4EDA7ED51A2DEF9143BA551BE47D798C6444BB9DF3245BEA6D16170EC3BC715C544FCA0C0E868513A3ACADC84F63BFB47027F85D5938CC40 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4675 |
Entropy (8bit): | 4.4590376158644975 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs6Jg77aI9ij5WpW8VYXsYm8M4JhqeFvo+q8b3K0SaraOMd:uIjfII7AI7VWpJhjoga0SaraOMd |
MD5: | 3DC791E84C5DE7B918BEBD0D7B3A04D3 |
SHA1: | 017BBD4D894DE48530AFE02AE692520955D9F8E3 |
SHA-256: | A4BBB35DAF1530364F91E5A3B6E950081B53A542BF4805B046908D1A90E2B34A |
SHA-512: | 132543BBE6E1796EED49C32AA3A11CC3F19C5011B05BEF0CE090445324BD8B72755224E2447FAF5F26EF52F69A60928805C7EEA9E658A0E74A51625C7B3321C5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 110512 |
Entropy (8bit): | 1.6159377954215517 |
Encrypted: | false |
SSDEEP: | 384:Rml/cugQVSEVSctGo+oyhDNcQU9Ns6hMxIMkYIWr+:cl/cugQVSEzJh7Jlh3xvb |
MD5: | E75D671DA253361DDBBC8842B197AD45 |
SHA1: | F385311CDF4C8D36B4C8FEAB34BB3046878A29E5 |
SHA-256: | D6E09870F91930B137C51156FE26287D94B761BAAE64B1B274BA326D503D00A0 |
SHA-512: | E2AD990AA98CC463261A4869162FD36D873E8BC51B87D488940DF7094F7366A015BFD9D65168D929543CCB3FD53EE148A99C7ABDB664B7CF2613B617BD934866 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6348 |
Entropy (8bit): | 3.721636286272004 |
Encrypted: | false |
SSDEEP: | 96:RSIU6o7wVetb+ZK6LyYuQE/CKP5aM4Ui89b6Rsf5fGm:R6l7wVeJwK6LyYutpri89b6Rsf5em |
MD5: | E223AB812DC1B9973F7878CC8122E299 |
SHA1: | 3B51B2B7B3D47ADD8E4FA571A985DB257C0937EB |
SHA-256: | 552C5005715345FE30B3034E9C0EBFAEAA7B0A95FB4A50236720C9384F7106E1 |
SHA-512: | D575AB2EDF81F7F2EB509DE5E4CDF0026D19D62CBBAE6188606890DB3C8676D58E73928FE1170D7C16DF75ACE4A4DEE4A6C5E2A61EBE3A11DA437DF7D27AFE28 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4675 |
Entropy (8bit): | 4.4600701723392815 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs6Jg77aI9ij5WpW8VYXcYm8M4JhqeFJ+q8b3J0SaraiMd:uIjfII7AI7VW5JhVgZ0SaraiMd |
MD5: | C1F1E357170C9FBCBCC5404CD46E37D5 |
SHA1: | EE50FACAFD21559C7801ACBB95F274E67EE13D02 |
SHA-256: | 2C2F15928D56C3882A8670D6CBDFE49C5A9D78595E4E8E941CAAFCD466522CB9 |
SHA-512: | 229417EF705CA78D5A3E9186652EE4A65609DCA11DCC84521A1B427DEBB0CD5AEC656C7F83FA4204B6F6831CA418402FF77D8085C0E1C5B773304183CBD50E32 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.469509149710471 |
Encrypted: | false |
SSDEEP: | 6144:2zZfpi6ceLPx9skLmb0fFZWSP3aJG8nAgeiJRMMhA2zX4WABluuNQjDH5S:YZHtFZWOKnMM6bFpWj4 |
MD5: | 5606B5DBE9630E8021268F2AE6BF31F5 |
SHA1: | 6D89EFF200CD76B84B9027B21D166D7A9D7DCF1F |
SHA-256: | EC252D935A81CE7CFB1F2056DCA63593CAF905D6B4065A8EE230C611B64230CD |
SHA-512: | 61933F47C856325656683690081F18C683E0404F17066B1D0FDAC5CF640F8E2E1626CD8296C15603507F173967612FD4B2A3A118C7F2329367F6C7E30E32200B |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.928739021633009 |
TrID: |
|
File name: | msvcp110.dll |
File size: | 601'088 bytes |
MD5: | 740c3417929730c4ae20e0165aa94b7c |
SHA1: | d03cebc7b1172149f65b06f15b0fbb11512f5b88 |
SHA256: | 8e200e4aca363cc2be03121815ec03525f1d983f717f67b63241028c59cb0bde |
SHA512: | 4bccf661986c98635319ae86c394022e9e4bf1a944a759176a69916b33e64eb910beb027faa55f66322754715a772d0ec693ddf6c3cb07a611f026f678390e7f |
SSDEEP: | 12288:UVi4BszD+DZslByhHwrZz1vb2MW4hPuH5A5ItioxaNi2iU:aBsG2l06rrCwSig9 |
TLSH: | 89D45B48AD34C29BE648C5F2F96C46D0796487A51D328CCB3EAE1C243B66EF0506D7F9 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.vkp}.8p}.8p}.8;..9|}.8;..9.}.8;..9d}.8;..9v}.8W.c8s}.8p}.8.}.8v..9Q}.8v..9`}.8v..9d}.8p}.8q}.8...9q}.8...9q}.8Richp}.8....... |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x1002faae |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x671803AA [Tue Oct 22 19:57:30 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 43480200b3c5eced3ea874108558123d |
Instruction |
---|
push ebp |
mov ebp, esp |
cmp dword ptr [ebp+0Ch], 01h |
jne 00007F6D6C812D47h |
call 00007F6D6C813270h |
push dword ptr [ebp+10h] |
push dword ptr [ebp+0Ch] |
push dword ptr [ebp+08h] |
call 00007F6D6C812BF3h |
add esp, 0Ch |
pop ebp |
retn 000Ch |
push ebp |
mov ebp, esp |
push 00000000h |
call dword ptr [1003D06Ch] |
push dword ptr [ebp+08h] |
call dword ptr [1003D068h] |
push C0000409h |
call dword ptr [1003D034h] |
push eax |
call dword ptr [1003D070h] |
pop ebp |
ret |
push ebp |
mov ebp, esp |
sub esp, 00000324h |
push 00000017h |
call dword ptr [1003D074h] |
test eax, eax |
je 00007F6D6C812D47h |
push 00000002h |
pop ecx |
int 29h |
mov dword ptr [100926D0h], eax |
mov dword ptr [100926CCh], ecx |
mov dword ptr [100926C8h], edx |
mov dword ptr [100926C4h], ebx |
mov dword ptr [100926C0h], esi |
mov dword ptr [100926BCh], edi |
mov word ptr [100926E8h], ss |
mov word ptr [100926DCh], cs |
mov word ptr [100926B8h], ds |
mov word ptr [100926B4h], es |
mov word ptr [100926B0h], fs |
mov word ptr [100926ACh], gs |
pushfd |
pop dword ptr [100926E0h] |
mov eax, dword ptr [ebp+00h] |
mov dword ptr [100926D4h], eax |
mov eax, dword ptr [ebp+04h] |
mov dword ptr [000926D8h], eax |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x43a40 | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x43ab8 | 0x64 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x94000 | 0x2118 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x42dd0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x42d10 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3d000 | 0x174 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x3bb63 | 0x3bc00 | b9583e00c36c0820ca67ea068e65034f | False | 0.4124239997384937 | data | 6.654540918170396 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x3d000 | 0x732e | 0x7400 | 91edac08b9eb0cb235dd3b28530bf9be | False | 0.4581088362068966 | data | 5.17097918438835 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x45000 | 0x4e3e0 | 0x4d600 | 9d9cfc5947f7a0aa0653d6af4cdef6f8 | False | 0.4926418618739903 | data | 6.351172386117954 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x94000 | 0x2118 | 0x2200 | 56e1b578d061799baa1245cfb844d13e | False | 0.7789522058823529 | data | 6.639453614972652 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
USER32.dll | FillRect, BeginPaint, InvalidateRect, PostQuitMessage, DefWindowProcA, ShowWindow, EndPaint |
GDI32.dll | TextOutA |
ntdll.dll | NtWriteVirtualMemory, NtCreateThreadEx, NtSetContextThread, NtResumeThread, NtAllocateVirtualMemory, NtGetContextThread, RtlUnwind |
KERNEL32.dll | WriteConsoleW, SetFilePointerEx, CreateFileW, TlsSetValue, GetConsoleMode, GetConsoleOutputCP, WriteFile, FlushFileBuffers, SetStdHandle, HeapReAlloc, HeapSize, GetCurrentProcess, GetModuleHandleA, K32GetModuleInformation, GetModuleFileNameA, CreateFileA, CreateFileMappingA, CloseHandle, MapViewOfFile, VirtualProtect, GetModuleHandleW, GetConsoleWindow, VirtualAlloc, CreateProcessW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetStringTypeW, RaiseException, InterlockedFlushSList, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, DecodePointer, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, GetProcessHeap, GetStdHandle, GetFileType |
Name | Ordinal | Address |
---|---|---|
GetGameData | 1 | 0x10015900 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 24, 2024 21:50:00.968420982 CEST | 49709 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:00.973826885 CEST | 80 | 49709 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:00.973917961 CEST | 49709 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:00.974601984 CEST | 49709 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:00.980110884 CEST | 80 | 49709 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:09.657960892 CEST | 80 | 49709 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:09.658107996 CEST | 49709 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:09.658602953 CEST | 49709 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:09.664665937 CEST | 80 | 49709 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:30.500909090 CEST | 49821 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:30.506715059 CEST | 80 | 49821 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:30.506781101 CEST | 49821 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:30.508619070 CEST | 49822 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:30.510962009 CEST | 49821 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:30.514591932 CEST | 80 | 49822 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:30.514658928 CEST | 49822 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:30.514794111 CEST | 49822 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:30.516382933 CEST | 80 | 49821 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:30.521173000 CEST | 80 | 49822 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:38.997706890 CEST | 80 | 49821 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:38.997900009 CEST | 49821 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:38.998357058 CEST | 49821 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:38.998608112 CEST | 80 | 49822 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:38.998665094 CEST | 49822 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:38.998739004 CEST | 49822 | 80 | 192.168.2.6 | 95.217.125.57 |
Oct 24, 2024 21:50:39.003886938 CEST | 80 | 49821 | 95.217.125.57 | 192.168.2.6 |
Oct 24, 2024 21:50:39.004096031 CEST | 80 | 49822 | 95.217.125.57 | 192.168.2.6 |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49709 | 95.217.125.57 | 80 | 4488 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 24, 2024 21:50:00.974601984 CEST | 88 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49821 | 95.217.125.57 | 80 | 5276 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 24, 2024 21:50:30.510962009 CEST | 88 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49822 | 95.217.125.57 | 80 | 5092 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 24, 2024 21:50:30.514794111 CEST | 88 | OUT |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 15:49:58 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf30000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 15:49:58 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 15:49:58 |
Start date: | 24/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 15:49:58 |
Start date: | 24/10/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdf0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 15:49:58 |
Start date: | 24/10/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdf0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 15:49:59 |
Start date: | 24/10/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x200000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 7 |
Start time: | 15:49:59 |
Start date: | 24/10/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x200000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 15:50:01 |
Start date: | 24/10/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdf0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 15:50:02 |
Start date: | 24/10/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x200000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 15:50:22 |
Start date: | 24/10/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xba0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 15:50:49 |
Start date: | 24/10/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xba0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 19 |
Start time: | 15:50:50 |
Start date: | 24/10/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xba0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 19% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 2% |
Total number of Nodes: | 1159 |
Total number of Limit Nodes: | 6 |
Graph
Function 00758680 Relevance: 6.1, APIs: 4, Instructions: 77processCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007445C0 Relevance: 3.1, APIs: 2, Instructions: 114memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00757B90 Relevance: 1.6, APIs: 1, Instructions: 114COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00757A30 Relevance: 1.5, APIs: 1, Instructions: 49timeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00757850 Relevance: 1.5, APIs: 1, Instructions: 36COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00741160 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00758320 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 196registryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00757690 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 43registryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007447B0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 60networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00744FB0 Relevance: 3.1, APIs: 2, Instructions: 82memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007569F0 Relevance: 1.6, APIs: 1, Instructions: 94COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007578E0 Relevance: 1.5, APIs: 1, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00757ED0 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00759470 Relevance: 1.5, APIs: 1, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00741110 Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 007410A0 Relevance: 1.3, APIs: 1, Instructions: 41memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00759750 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 19.1% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 1163 |
Total number of Limit Nodes: | 6 |
Graph
Function 03017B90 Relevance: 1.6, APIs: 1, Instructions: 114COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03018320 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 196registryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03018680 Relevance: 6.1, APIs: 4, Instructions: 77processCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 030047B0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 60networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 030045C0 Relevance: 3.1, APIs: 2, Instructions: 114memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 030169F0 Relevance: 3.1, APIs: 2, Instructions: 94sleepCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03004FB0 Relevance: 3.1, APIs: 2, Instructions: 82memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03017A30 Relevance: 1.5, APIs: 1, Instructions: 49timeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 030178E0 Relevance: 1.5, APIs: 1, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03017850 Relevance: 1.5, APIs: 1, Instructions: 36COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03017ED0 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03019470 Relevance: 1.5, APIs: 1, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03001110 Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03001160 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 030010A0 Relevance: 1.3, APIs: 1, Instructions: 41memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 19.1% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 1163 |
Total number of Limit Nodes: | 6 |
Graph
Function 03197B90 Relevance: 1.6, APIs: 1, Instructions: 114COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03198320 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 196registryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03198680 Relevance: 6.1, APIs: 4, Instructions: 77processCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 031847B0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 60networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 031845C0 Relevance: 3.1, APIs: 2, Instructions: 114memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 031969F0 Relevance: 3.1, APIs: 2, Instructions: 94sleepCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03184FB0 Relevance: 3.1, APIs: 2, Instructions: 82memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03197A30 Relevance: 1.5, APIs: 1, Instructions: 49timeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 031978E0 Relevance: 1.5, APIs: 1, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03197850 Relevance: 1.5, APIs: 1, Instructions: 36COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03197ED0 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03199470 Relevance: 1.5, APIs: 1, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03181110 Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 03181160 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 031810A0 Relevance: 1.3, APIs: 1, Instructions: 41memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|