Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 7132 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: E7AA83909ACE3906EC75144CC33E024C) - conhost.exe (PID: 5260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - aspnet_regiis.exe (PID: 2196 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 2836 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 132 -s 122 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
{"C2 url": "https://disobey-curly.sbs/api", "Build Version": "H8NgCl--lonikir"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:59:50.863041+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:53.122240+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:55.416705+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:57.908705+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:00.236881+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:02.720212+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:05.070021+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:09.634403+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.223.140 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:59:51.810637+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:53.825426+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:10.352806+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49744 | 172.67.223.140 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:59:51.810637+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 172.67.223.140 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:59:53.825426+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.223.140 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:59:58.742675+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49737 | 172.67.223.140 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0061D8D0 | |
Source: | Code function: | 0_2_006332A0 | |
Source: | Code function: | 0_2_006182B0 | |
Source: | Code function: | 0_2_00633320 | |
Source: | Code function: | 0_2_00633320 | |
Source: | Code function: | 0_2_00633720 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Memory allocated: | Jump to behavior |
Source: | Code function: | 0_2_6CD936C0 | |
Source: | Code function: | 0_2_6CD92E60 |
Source: | Code function: | 0_2_00630A70 | |
Source: | Code function: | 0_2_0062BC10 | |
Source: | Code function: | 0_2_006182B0 | |
Source: | Code function: | 0_2_00618090 | |
Source: | Code function: | 0_2_00615570 | |
Source: | Code function: | 0_2_00629F20 | |
Source: | Code function: | 0_2_00633320 | |
Source: | Code function: | 0_2_006301F0 | |
Source: | Code function: | 0_2_006175A0 | |
Source: | Code function: | 0_2_6CD936C0 | |
Source: | Code function: | 0_2_6CD92E60 | |
Source: | Code function: | 0_2_6CD91200 | |
Source: | Code function: | 0_2_6CD93470 | |
Source: | Code function: | 0_2_6CDA03C1 | |
Source: | Code function: | 0_2_6CD92790 | |
Source: | Code function: | 0_2_6CD96370 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_005E2651 | |
Source: | Code function: | 0_2_005E56BA | |
Source: | Code function: | 0_2_005E54CF | |
Source: | Code function: | 0_2_005E5887 | |
Source: | Code function: | 0_2_005E27AA | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91B50 | |
Source: | Code function: | 2_3_02C91FC0 | |
Source: | Code function: | 2_3_02C91FC0 |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_6CD99D3A |
Source: | Code function: | 0_2_6CD99D09 | |
Source: | Code function: | 0_2_6CD98B35 |
Source: | Code function: | 0_2_6CD9B91C |
Source: | Code function: | 0_2_6CD99D3A | |
Source: | Code function: | 0_2_6CD96ED1 | |
Source: | Code function: | 0_2_6CD973AA |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_6CD97578 |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_6CD96FF3 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 311 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 13 Virtualization/Sandbox Evasion | LSASS Memory | 151 Security Software Discovery | Remote Desktop Protocol | 31 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | 13 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 311 Process Injection | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Software Packing | Cached Domain Credentials | 33 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
disobey-curly.sbs | 172.67.223.140 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
true |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.223.140 | disobey-curly.sbs | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561487 |
Start date and time: | 2024-11-23 14:58:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | file.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/7@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.21
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target aspnet_regiis.exe, PID 2196 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report creation exceeded maximum time and may have missing disassembly code information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: file.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.223.140 | Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f93284ae77ab4eed7e1e6983ffdeb6b8c8d517_2059615a_dc763f9f-12e3-4a02-b6ca-49570e84e160\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9802806809519876 |
Encrypted: | false |
SSDEEP: | 192:kIBNwAv6yRkd0BU/fIxaGpezuiFKZ24IO8BB:tN367eBU/iahzuiFKY4IO8X |
MD5: | C0A156DCD43B8B44339B72CA402051E6 |
SHA1: | 9FBFFAA77A622A757D411DF38CA00A255989AD67 |
SHA-256: | DDF11E8E0C12BCDF261A505A727287E26C6872DF7FD2ABBEC1838A8C8C531848 |
SHA-512: | 8BE5C457783E374A2F76F751FE4E06CBE4A19F9FC3565FEF844CFB01E90AD11AA67F25444FE69B25043071ED46E9D978471E13A0138920112A186D01B55161B8 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196644 |
Entropy (8bit): | 3.3621640863548867 |
Encrypted: | false |
SSDEEP: | 1536:ErX4MppN4uE2aOkfWqLTg7o0tigCDCDWm/ZVMhwY1:Eb4MV4uEqnqLTg7oVfSj/ZhY |
MD5: | 41A7D359C296DC078C29AB6D61B91D8E |
SHA1: | 82C2966531027072D10AE5CFC1E6D4A551B2EE1C |
SHA-256: | 9D570129A9272A0D58DD3AD3AD91CD30205C0DF0E234B8CE2ADAA2FD8503EAF2 |
SHA-512: | 0F91652402141F0FC07AB4F26CF3E401776413E0BB8A0E32B588A679D92CC3924E84CD20F85C770CFCE08160CE340B8235817C2FE8DE3B9B01204389EC80D7CD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8398 |
Entropy (8bit): | 3.701438158704911 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ9C4665V6Y9lSU9PigmfZDmYXprQ89bUrsfv8m:R6lXJf6KV6YPSU9PigmfgYXUwfB |
MD5: | C2B7F6C1A42CD64E4FA8485286861811 |
SHA1: | 919C070BBE5C30115B3EEEFFCD8E67EAE82C73C4 |
SHA-256: | CC095056342B35A3393BB8760718C54C224707A14C2E831E593A851B7E99F09B |
SHA-512: | 728AD0652A0E71BB2CC832192001B00ED787514CF988AF7E19ED46B8F968543D533A2A9E25D4D4BEA12CD64B2D8B52233AAAD338438F8D189A44EE8DF793C6F6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4756 |
Entropy (8bit): | 4.5046581231876415 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zszJg77aI9/0WpW8VYSYm8M4Jf2FVe++q8v7nHyNBrGcd:uIjfNI7pt7VKJwe+KDHgrGcd |
MD5: | ADAA035A356FC1F1853D818F2ABACE16 |
SHA1: | 83030F80899E45BE71C32CF2FCA6D24C21621B0F |
SHA-256: | 3434041C419145AD20234D4745022C4CF29D068F6D7AA302B29526AB5F2F68FA |
SHA-512: | BED7AD7534E42E90A654C92017FE838CE65E20D613F2E820AE640EE2288C825A6CFEEDC8F65CF7554CD4FDC23D32ADCEFF5BEFE51D6485A5990CABF8B5B87512 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 410624 |
Entropy (8bit): | 7.076248937743528 |
Encrypted: | false |
SSDEEP: | 12288:TDWjE28LbqpSkloddKQbiqCUr/K/KwVR6uGqxwSVMFIYwXLIMO//jYqVBh5zh2ye:T6jE28LmpSkeddNbiqCUr/K/KwVR6uGZ |
MD5: | 3535FCD3063A2965F1DD8F9B65CA8355 |
SHA1: | 1F5C89CAF911A08415D55CE1687101B65871B122 |
SHA-256: | 086057602EEC63ED064BD97C1643B20C727AA4A557D16BD26A763716414620FE |
SHA-512: | 9B623500FFBE25D6DC08C3C90AEB8C123E9FC2841F0962B6FE57CA1D2AB44FB1062352E1D5AB1D506B156C0B25AAF96CA6267A36FD064C97C12DF965BCD66929 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465934512343268 |
Encrypted: | false |
SSDEEP: | 6144:NIXfpi67eLPU9skLmb0b4CWSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbXR:eXD94CWlLZMM6YFH1+XR |
MD5: | 1945A0081349AB013841E34653F7E19E |
SHA1: | 58287BEB77915C45BBD0270D10256EB50F298E71 |
SHA-256: | 6727583F80110FB9E028F1798128C35398716D13E74FB8D8226EB0AE07AD30DF |
SHA-512: | EF3A989128436B497EA5A8B6657F3393922F591141B69E4B3601C3561BAB9934EBC429E54C578F179D2AFC0984DE5BAD25A273CAB5CA370354DEB992D3C33774 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1415 |
Entropy (8bit): | 4.5324638445490235 |
Encrypted: | false |
SSDEEP: | 24:7v74NuMMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4BMff2p8p14nrPKktp |
MD5: | A0A7BDF9003524A40DA3745525F33D71 |
SHA1: | B92126A307BFE0131B3E83A45795D5E4169499DA |
SHA-256: | 871FB5E2F3DBA881F5446DCFCF7250DE2D8E7844BE8BB3CCD5EDD6910FAC6BDE |
SHA-512: | 56FA424A0714F4738F6AE5EEB93D1B96F046246B0CD9E67D93C833C5C7DB587A7A8BF9FBCF57CA8500D503C5C81DD68BD6E1E0E2A85E76A8E951E6624CBBC69D |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.735385458975907 |
TrID: |
|
File name: | file.exe |
File size: | 665'088 bytes |
MD5: | e7aa83909ace3906ec75144cc33e024c |
SHA1: | 333ee9d7f4c683d8e0ed05bdadfbd2baade379e3 |
SHA256: | 24443cd457177eeed9c584e5d5ad194303fd94269fdb0d72e0db598215a5c826 |
SHA512: | 508fd7984ea8b9d8c8b2cd3c7c3587941a6ee4627c7cf54fe56db7db75dbff0abdaf0db1b0c46876dc6ad0cc21735bd7a2f0351d5edeb735b2de796beef2ea72 |
SSDEEP: | 12288:bPl8meB2qKGMi2z93d3xmOSv5PGsTgrc8JZJXC+2JW4Q+o95vlcJL1yC5qj1n93Z:7l87B2N+2z93WXuR4WJX |
TLSH: | EAE46BDC766072EFC867D472DEA82C64FA5174BB971B4213902716AD9E0C89BDF180F2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ag..............0..................`... ....@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4aa00a |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6741DBD1 [Sat Nov 23 13:42:41 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [004AA000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x867d4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xa6000 | 0x650 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xa8000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xaa000 | 0x8 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x86000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
W{2/c | 0x2000 | 0x82378 | 0x82400 | c912d4bf7015ded3f1caaa4148e6b0c7 | False | 1.0003205224328215 | data | 7.999654523046763 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.text | 0x86000 | 0x1f080 | 0x1f200 | 8bd917f3fa084b717d1e42dad9da72b7 | False | 0.3297957454819277 | data | 4.694341381778728 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xa6000 | 0x650 | 0x800 | 4f79bcd03748a48585ea3ccdf1f07d1c | False | 0.34912109375 | data | 3.559434581534301 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xa8000 | 0xc | 0x200 | aa2c9aa6be2e298aadf23de4a8183169 | False | 0.044921875 | data | 0.09800417566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
0xaa000 | 0x10 | 0x200 | a861e2dbe40410218ba5bbf2f5899bf3 | False | 0.044921875 | data | 0.14263576814887827 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xa60a0 | 0x3c4 | data | 0.4221991701244813 | ||
RT_MANIFEST | 0xa6464 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:59:50.863041+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:51.810637+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:51.810637+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:53.122240+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:53.825426+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49732 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:53.825426+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:55.416705+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:57.908705+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 172.67.223.140 | 443 | TCP |
2024-11-23T14:59:58.742675+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49737 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:00.236881+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:02.720212+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:05.070021+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:09.634403+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.223.140 | 443 | TCP |
2024-11-23T15:00:10.352806+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49744 | 172.67.223.140 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 14:59:49.616070986 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:49.616126060 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:49.616194010 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:49.618910074 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:49.618927956 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:50.862974882 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:50.863040924 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:50.993650913 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:50.993686914 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:50.994853020 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:51.042572975 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.121922970 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.121953964 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.122203112 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:51.810703993 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:51.810964108 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:51.811018944 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.812602043 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.812616110 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:51.812635899 CET | 49730 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.812640905 CET | 443 | 49730 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:51.859738111 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.859770060 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:51.859863043 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.860233068 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:51.860246897 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.122061968 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.122240067 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.123642921 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.123656988 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.123970985 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.125222921 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.125240088 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.125291109 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.825453997 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.825558901 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.825603962 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.825622082 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.825711012 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.825752974 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.825761080 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.825830936 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.825869083 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.825875044 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.837690115 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.837729931 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.837743998 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.846138954 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.846187115 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.846199036 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.899585009 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.945135117 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:53.993438005 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:53.993464947 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:54.026493073 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:54.026567936 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:54.026583910 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:54.026741028 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:54.026802063 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:54.026880026 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:54.026894093 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:54.026905060 CET | 49732 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:54.026910067 CET | 443 | 49732 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:54.150799036 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:54.150846004 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:54.150913000 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:54.151232004 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:54.151242971 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:55.416635990 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:55.416704893 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:55.419068098 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:55.419079065 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:55.419413090 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:55.430583000 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:55.430748940 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:55.430809021 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:55.430872917 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:55.430885077 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:56.378020048 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:56.378278971 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:56.378336906 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:56.406702995 CET | 49734 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:56.406728029 CET | 443 | 49734 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:56.595885992 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:56.595974922 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:56.596055031 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:56.596456051 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:56.596488953 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:57.908463955 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:57.908704996 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:57.909835100 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:57.909878969 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:57.910238981 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:57.911567926 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:57.911698103 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:57.911762953 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:58.742918968 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:58.743037939 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:58.743113041 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:58.743185997 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:58.743208885 CET | 443 | 49737 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:58.935203075 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:58.935241938 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 14:59:58.935424089 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:58.935604095 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 14:59:58.935616016 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:00.236732960 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:00.236881018 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:00.238091946 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:00.238125086 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:00.238485098 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:00.265609026 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:00.265733004 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:00.265877962 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:00.266115904 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:00.266132116 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:01.120598078 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:01.120728970 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:01.120789051 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:01.148825884 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:01.148850918 CET | 443 | 49739 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:01.452074051 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:01.452138901 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:01.452202082 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:01.452953100 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:01.452966928 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:02.720088005 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:02.720211983 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:02.721468925 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:02.721481085 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:02.721795082 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:02.731533051 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:02.731623888 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:02.731631994 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:03.426990032 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:03.427201986 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:03.427225113 CET | 443 | 49741 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:03.427269936 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:03.848350048 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:03.848397017 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:03.848469019 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:03.848869085 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:03.848884106 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.069894075 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.070020914 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.073793888 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.073827982 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.074930906 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.076245070 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.076945066 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.077017069 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.077171087 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.077230930 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.078072071 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.078154087 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.078542948 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.078591108 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.078897953 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.078943014 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.079129934 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.079168081 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.079176903 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.079224110 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.079458952 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.079500914 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.079549074 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.079652071 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.079720020 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.127351046 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.127574921 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.127626896 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.127662897 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.127697945 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:05.127784967 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:05.127813101 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:08.362394094 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:08.362678051 CET | 443 | 49742 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:08.362684965 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:08.362732887 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:08.372118950 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:08.372214079 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:08.372318983 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:08.372585058 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:08.372617960 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:09.634282112 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:09.634402990 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:09.635691881 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:09.635721922 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:09.636060953 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:09.637291908 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:09.637337923 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:09.637382030 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:10.352886915 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:10.353136063 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:10.353225946 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:10.353302956 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:10.353351116 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Nov 23, 2024 15:00:10.353394985 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.140 |
Nov 23, 2024 15:00:10.353411913 CET | 443 | 49744 | 172.67.223.140 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 14:59:49.437251091 CET | 60451 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 23, 2024 14:59:49.582947016 CET | 53 | 60451 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 23, 2024 14:59:49.437251091 CET | 192.168.2.4 | 1.1.1.1 | 0xdc04 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 23, 2024 14:59:49.582947016 CET | 1.1.1.1 | 192.168.2.4 | 0xdc04 | No error (0) | 172.67.223.140 | A (IP address) | IN (0x0001) | false | ||
Nov 23, 2024 14:59:49.582947016 CET | 1.1.1.1 | 192.168.2.4 | 0xdc04 | No error (0) | 104.21.70.128 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 13:59:51 UTC | 264 | OUT | |
2024-11-23 13:59:51 UTC | 8 | OUT | |
2024-11-23 13:59:51 UTC | 1019 | IN | |
2024-11-23 13:59:51 UTC | 7 | IN | |
2024-11-23 13:59:51 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 13:59:53 UTC | 265 | OUT | |
2024-11-23 13:59:53 UTC | 49 | OUT | |
2024-11-23 13:59:53 UTC | 1016 | IN | |
2024-11-23 13:59:53 UTC | 353 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN | |
2024-11-23 13:59:53 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 13:59:55 UTC | 280 | OUT | |
2024-11-23 13:59:55 UTC | 15331 | OUT | |
2024-11-23 13:59:55 UTC | 2816 | OUT | |
2024-11-23 13:59:56 UTC | 1021 | IN | |
2024-11-23 13:59:56 UTC | 19 | IN | |
2024-11-23 13:59:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49737 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 13:59:57 UTC | 281 | OUT | |
2024-11-23 13:59:57 UTC | 8780 | OUT | |
2024-11-23 13:59:58 UTC | 1021 | IN | |
2024-11-23 13:59:58 UTC | 19 | IN | |
2024-11-23 13:59:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49739 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 14:00:00 UTC | 278 | OUT | |
2024-11-23 14:00:00 UTC | 15331 | OUT | |
2024-11-23 14:00:00 UTC | 5078 | OUT | |
2024-11-23 14:00:01 UTC | 1017 | IN | |
2024-11-23 14:00:01 UTC | 19 | IN | |
2024-11-23 14:00:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49741 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 14:00:02 UTC | 274 | OUT | |
2024-11-23 14:00:02 UTC | 1225 | OUT | |
2024-11-23 14:00:03 UTC | 1018 | IN | |
2024-11-23 14:00:03 UTC | 19 | IN | |
2024-11-23 14:00:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49742 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 14:00:05 UTC | 283 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:05 UTC | 15331 | OUT | |
2024-11-23 14:00:08 UTC | 1023 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49744 | 172.67.223.140 | 443 | 2196 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 14:00:09 UTC | 265 | OUT | |
2024-11-23 14:00:09 UTC | 84 | OUT | |
2024-11-23 14:00:10 UTC | 1017 | IN | |
2024-11-23 14:00:10 UTC | 54 | IN | |
2024-11-23 14:00:10 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:59:48 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5e0000 |
File size: | 665'088 bytes |
MD5 hash: | E7AA83909ACE3906EC75144CC33E024C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 08:59:48 |
Start date: | 23/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 08:59:48 |
Start date: | 23/11/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x800000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 08:59:49 |
Start date: | 23/11/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdd0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 8.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 6.6% |
Total number of Nodes: | 1435 |
Total number of Limit Nodes: | 10 |
Graph
Function 6CD936C0 Relevance: 60.4, APIs: 20, Strings: 13, Instructions: 2673nativememorythreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD91200 Relevance: 41.6, APIs: 18, Strings: 5, Instructions: 1347memoryfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD96BC1 Relevance: 3.1, APIs: 2, Instructions: 76COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD9B9ED Relevance: 3.1, APIs: 2, Instructions: 67COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD9C250 Relevance: 3.1, APIs: 2, Instructions: 66COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD99FB6 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00615570 Relevance: 9.0, Strings: 7, Instructions: 235COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00630A70 Relevance: 8.1, Strings: 6, Instructions: 621COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006182B0 Relevance: 5.9, Strings: 4, Instructions: 861COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0061D8D0 Relevance: 3.9, Strings: 3, Instructions: 112COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD92790 Relevance: 3.0, Strings: 2, Instructions: 481COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD97578 Relevance: 1.6, APIs: 1, Instructions: 144COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00633720 Relevance: 1.5, Strings: 1, Instructions: 261COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD9B91C Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006301F0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006175A0 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00629F20 Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0062BC10 Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00633320 Relevance: .2, Instructions: 217COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00618090 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD93470 Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD99D09 Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006332A0 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD998D3 Relevance: 15.1, APIs: 10, Instructions: 69COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD9B53A Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 77COMMONLIBRARYCODE
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD98387 Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD98503 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 62COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD98BBA Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 30libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD9D1D7 Relevance: 7.7, APIs: 5, Instructions: 199COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD9A117 Relevance: 6.1, APIs: 4, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD99344 Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|