Windows
Analysis Report
setup.exe
Overview
General Information
Detection
LummaC Stealer
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Suspicious Copy From or To System Directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64
setup.exe (PID: 7408 cmdline:
"C:\Users\ user\Deskt op\setup.e xe" MD5: C804E1074AF9D7CFFA16E6BD084BEA42) cmd.exe (PID: 7492 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Fa shion Fash ion.cmd & Fashion.cm d MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) tasklist.exe (PID: 7552 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 7560 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) tasklist.exe (PID: 7596 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 7604 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 7640 cmdline:
cmd /c md 224177 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) extrac32.exe (PID: 7656 cmdline:
extrac32 / Y /E Welli ngton MD5: 9472AAB6390E4F1431BAA912FCFF9707) findstr.exe (PID: 7684 cmdline:
findstr /V "Tranny" Yale MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 7704 cmdline:
cmd /c cop y /b 22417 7\Benefits .com + Pho tographer + Vacuum + Separate + Valium + Continuin g + Traini ng + Hours + Kissing + Accepts + Verde + Quotation s 224177\B enefits.co m MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) cmd.exe (PID: 7732 cmdline:
cmd /c cop y /b ..\Se arches + . .\Coordina ted + ..\S tudents + ..\Approve + ..\Ther e + ..\Mol ecular + . .\Updated y MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Benefits.com (PID: 7748 cmdline:
Benefits.c om y MD5: 62D09F076E6E0240548C2F837536A46A) choice.exe (PID: 7764 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:49:44.023631+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:45.570835+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:47.037204+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:57.512917+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:59.036455+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:00.310098+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:01.666407+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:03.869733+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:49:45.095924+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:46.413595+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:04.369801+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49747 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:49:45.095924+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:49:46.413595+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:50:01.672675+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49745 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:50:01.672675+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 172.67.158.151 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062FC |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 1 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 11 Input Capture | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 21 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
vividimaginatigon.top | 172.67.158.151 | true | true | unknown | |
aWntkHZhzENhUIyZkjTD.aWntkHZhzENhUIyZkjTD | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.158.151 | vividimaginatigon.top | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1604056 |
Start date and time: | 2025-01-31 19:48:14 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | setup.exe |
Detection: | MAL |
Classification: | mal96.troj.spyw.evad.winEXE@26/24@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: setup.exe
Time | Type | Description |
---|---|---|
13:49:08 | API Interceptor | |
13:49:44 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.158.151 | Get hash | malicious | Unknown | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RedLine | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | RedLine | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RedLine | Browse |
| |
Get hash | malicious | Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\224177\Benefits.com | Get hash | malicious | Vidar | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Amadey, AsyncRAT, KeyLogger, LummaC Stealer, PureLog Stealer, ReverseShell, Stealc | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC, Amadey, AsyncRAT, LummaC Stealer, PureLog Stealer, Socks5Systemz, Vidar | Browse | |||
Get hash | malicious | Amadey, AsyncRAT, LummaC Stealer, PureLog Stealer, Vidar | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | AsyncRAT, PureLog Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 505966 |
Entropy (8bit): | 7.999691333439623 |
Encrypted: | true |
SSDEEP: | 12288:+mrNMQZ6KFovILBRcHvDvaib1DaY633eUN7dPVldapuz:+mvvGILaWkFaY63OU1vLWk |
MD5: | 69958243BC5C2E5C6095C302B3553EA6 |
SHA1: | 5290506B80C27A8390452C74180802E24A99A9E1 |
SHA-256: | BB07AF249BF75123F4101918F83DB1AC3F35BD3B25C07E24DC90F112797916DD |
SHA-512: | 02271F91DEEC06ACF9609125B4B62CDCCD12E4233D39C47233E33557427109549D2645809ED9161A3946834504AF9AC11E9F8AA1D2C2D989B9BC39E27392FEBA |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 120832 |
Entropy (8bit): | 4.977651511379863 |
Encrypted: | false |
SSDEEP: | 768:Vc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R:ePdKaj6iTcPAsAhxjgarB |
MD5: | E00C2E4747E1DBE85F4EF7AC364713D2 |
SHA1: | B1FAA76A14A9AB5B0B4DE38BFB342AF32A67C520 |
SHA-256: | 599BC7DE6330DED6D1DC02745BD0F1F1EE47C94B9916C77EAA7A6CCF716E4B56 |
SHA-512: | 5216F4D623BB24149D761333E5DB0522B65531DF807C4B2AA30FE3B90DBFD67A664DA392EFE53CA289CE8DE88686359514F857F248AC8C4E604AB19602630F99 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86016 |
Entropy (8bit): | 7.998113629509524 |
Encrypted: | true |
SSDEEP: | 1536:La+QqWrboc69uaIR/8vQ1HhIt3+rm/xSWBIrjHdcA2fgrffns3ATtO4v2sBXWD8n:LavnYuT2qhI8hWmfWAeaffns3A5v2sBT |
MD5: | 70749708F82F6478C9447EAA6424E676 |
SHA1: | 893782A94DBFE80E69ACD8E566ED01BC9BA4DA2D |
SHA-256: | 9109513040827DAF8261AB6D67673E5FA1EC7261CD18CD93BB94EC7BC10CCAED |
SHA-512: | 624D217DA8850EBAAA592791310699DFBE52A1733266EA389A908C3E1C697F8947D336E07B834DDCE58AAC4690B3832ED9504EA4C595C3B34DDCA47E2BF2B852 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 6.601424826120088 |
Encrypted: | false |
SSDEEP: | 1536:mCMIBZwneAJu7QnswIPumV3BxZxu6/sPYcSyRXzW8/uC6LdTmHwANUQlHS3cctlt:dtCZEMnVIPPBxT/sZydTmRxlHS3NxrHv |
MD5: | DC66D0464185B03BFE2A8260383C81C9 |
SHA1: | DF7E225A3854EC88CD70637B2E6855F77DCBCD0D |
SHA-256: | 7A98FB9CF35EFA46A9F79D2427E487DD3265B9A123FE4E35E840FF8ADB439163 |
SHA-512: | D4B4AB5EF3FFE765E960FC42FCBA2B0F952D62AF59BB0232B4E0CC5664584389A3F2269081737F241EF426FE264BDA50B09EE76815E56B3BFDA942DA4D856199 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66560 |
Entropy (8bit): | 7.997373986972398 |
Encrypted: | true |
SSDEEP: | 1536:KL9+7xsQUYkY3K72EMzucnMODb/6fzeAj7YvxRbQwiobuLJW2Va:cLp2EMzlDeqAXA8obEW2Va |
MD5: | A28E0FD0589CF3EE47720C0C92BADF5D |
SHA1: | AEE3105D5C4B9B0027CE9A28EF2BFA00478107FB |
SHA-256: | 428F17428E1D81642AF3EA662667D3DE1813B92DA57FD9F1DA8A5F0B1B86A2CE |
SHA-512: | 140D6D0445E611676FCDF0EF24AD6BD7FFD14B5A2A8F5D8AAF617AFEFCAC48FD5F2BB07012DB641F24C71E0D871D8278325C3E5D3738520BB4C652EDEE0053C5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14104 |
Entropy (8bit): | 5.141266308965311 |
Encrypted: | false |
SSDEEP: | 384:kBc53vyipJazsPe6JrGSlc2H09jLy/YtiKlow3lk:kaJvvpJazsFGSlc26iYtnlox |
MD5: | 3920A54C66B165ED2257B65941318CC5 |
SHA1: | C55E948965FE55152671F152638B190FEE98C83A |
SHA-256: | 6C8B78C5EBBD2D83F157A0D05BEEA1ECBC293A6F272768AAA35B9DFABC99E610 |
SHA-512: | 0473C5E86C165C7F16A254F62930A12DED3E2F17D80F76CED33FD3475696D739C2B10077E5F076B4433DFE8CF237D39E5B667A6A798E13F2A1DC23DF79D225F4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14104 |
Entropy (8bit): | 5.141266308965311 |
Encrypted: | false |
SSDEEP: | 384:kBc53vyipJazsPe6JrGSlc2H09jLy/YtiKlow3lk:kaJvvpJazsFGSlc26iYtnlox |
MD5: | 3920A54C66B165ED2257B65941318CC5 |
SHA1: | C55E948965FE55152671F152638B190FEE98C83A |
SHA-256: | 6C8B78C5EBBD2D83F157A0D05BEEA1ECBC293A6F272768AAA35B9DFABC99E610 |
SHA-512: | 0473C5E86C165C7F16A254F62930A12DED3E2F17D80F76CED33FD3475696D739C2B10077E5F076B4433DFE8CF237D39E5B667A6A798E13F2A1DC23DF79D225F4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 123904 |
Entropy (8bit): | 6.585035876941469 |
Encrypted: | false |
SSDEEP: | 3072:sBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfj:sjphfhnvO5bLezWWt/Dd314V14ZgP04 |
MD5: | CF91C73A94C610C69B320295C8DAD484 |
SHA1: | 072EEA695B66B844368162FA6B364303B8225CEF |
SHA-256: | B2C059189C73B2238D6541D5CD374AB26D76C37DE816C35B273B1075ED96CACC |
SHA-512: | 358C2473EF23865C84A21487B949BABFA9BEF3BF5D5DDE3355316282A27BC70E1119CF2874543C64295975CF46271290B16163D073B2DD612892FFA636A3A2C8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 5.8568364629581415 |
Encrypted: | false |
SSDEEP: | 1536:5VGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwu9:/q8QLeAg0Fuz08XvBNbjaAt9 |
MD5: | 790CAB68480DA239A8340E419E741DC4 |
SHA1: | 6A452363588EF0C76C6CD0AA06DED84081E6473D |
SHA-256: | AA9048B39A86F5740B0C67AF9015B4338E5E30B3260661267A24B13F72B27E3D |
SHA-512: | 8174D075C5B9FCB1D7591937DA3147947835E11C656193FFB36013FE3463AFD38CAD5F9FF91864640510FDC8CDE9F8DFD1A47E5A8F652179EBFB1443DCD30D83 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66560 |
Entropy (8bit): | 7.996878369279497 |
Encrypted: | true |
SSDEEP: | 1536:N8pqsRtX4EHoqNLeUDtUgnQ+e40aVNYB/T:N8pzR8CDVd0aVNQ |
MD5: | 0183DBFF21A2CBF2EF2051F92FB261EA |
SHA1: | 6311B1D7D18D9196BCA94175BED8BF00421E1D02 |
SHA-256: | 4155AEBE1D5968E2F2BF007DDB715BCA2D3CEC57C641E57A7D7406E767F76F60 |
SHA-512: | 6E2B8E075B491387F80E4EED11AA43D9FD6735EA7FF9599D61F98108630253FE81A0255547148D85A5F733987F257E23666291BF56F72D6BAA5BA939ADDA5016 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 6.549717665973685 |
Encrypted: | false |
SSDEEP: | 1536:L1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpV:LZg5PXPeiR6MKkjV |
MD5: | 34FC9DE0E1CA03EF501F44959FF2A326 |
SHA1: | C979CB07E3CD37B04287C171E5B2D627B6FB1571 |
SHA-256: | A68BB7207AAACD1B7FD4EE1AB4DAFC71BD464CF3386F7A1A4753391CE7A7C25C |
SHA-512: | 1E4B43A54AB2342BE65F2F9007FF45FFD0053477CBF5B04E259E73EEE7C4506828797DC559EACFB08499A3F90E1142F58AE1E05787341DF614B42A2513E7E6AB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2519 |
Entropy (8bit): | 7.557676395333429 |
Encrypted: | false |
SSDEEP: | 48:V4EC5+MV0Hhg5XKU+pp0OmyOO2UKxbQ0JYcmcY1BwPuKGPakfDb13g:V4EDzHy5Xz+ppo+zAbQ6YhbBwGKGP5hw |
MD5: | 27913DCE14BDD76823839E1BFBCA784F |
SHA1: | 02C2FD9AB4BFCDFC1B1429CCC3084CEFDF457164 |
SHA-256: | B58D374B43B871D5D309DD55B68E4DBE3373744DB8E11DA3EED17F80A972B240 |
SHA-512: | 2F3DF0DBD99B8C191006E652713C7505A2211E7D081E2D65541F0651668BD0A6C18E4EC6459080C6885BE0A3211C0BE82F58DE546DC9D6CB7BE2648311C6560D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55296 |
Entropy (8bit): | 7.997342472955196 |
Encrypted: | true |
SSDEEP: | 1536:f5ZmvfXHUGnSl9TzY4ffOUNP5ZLGLVhy0feGSVk1K+4ivg:vGtiY4ffOubGx40V1i |
MD5: | 121CAC13F89F021D263F4F9D1667492D |
SHA1: | B5A5E2E45CDA0521C423B22FB2EE31C5E5970458 |
SHA-256: | 56F941163F554FE29969F6D01BF3A1D1BCDFC995E8B502AA929F4796568E7761 |
SHA-512: | FC32C9355CCDA57C92A7013A1A0B8E56543C4BFA1B62AB7C3E7235DFA90C27A918B50C68025DA755AEE36186FD928119A76B1C019EE3E243D0820348056E6993 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 6.675937966451431 |
Encrypted: | false |
SSDEEP: | 1536:WU0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOc:WUDQWf05mjccBiqXvpgF4qv+32eOyKOv |
MD5: | 1566ECCF93E2CF411095AE7D38F9B538 |
SHA1: | D4D1B7AC1B4B797FE4F5BE148EDD67086B423CE5 |
SHA-256: | C85D1D34B1428742A37A9D5E70DA2C117DACC261C8C80B71C5CC9D024BD693A4 |
SHA-512: | 955C339107F9B5C7DA04695B6A7541EADFA6A993D1556814E09D48B11E3BD2BA984D848A4CE2293CFBB724AB8D5EF022AF083B7E27920CC561DD0FEC2F3C90EA |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 7.998019845217082 |
Encrypted: | true |
SSDEEP: | 1536:NpADrTdpietp2PbPlzFHEEkXQ+j39j2sILI2ZHBg2cHp5SnSczmypVinb8dU37Ys:8rTdpie6L9FHHqQkj2sILI2ZHBg2cHvP |
MD5: | 447B140C1F12CD49016AFE335C8C51C3 |
SHA1: | 55A0BC8373C2DA82FB292C491C9B73D0BD253EA0 |
SHA-256: | C11A882371A911CB7432500F394AE8EC19E28755B9CD2C66446DF4AC61020292 |
SHA-512: | 3FAC38C13F0CA17FE5AFBCCE5789E075706C4D1669AFF31CE78966661207052D12F7833AF51C1053B5CFAC5CDA6DD761133E442F78B18C50F69966B2A8038C3B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 96256 |
Entropy (8bit): | 7.998208168184681 |
Encrypted: | true |
SSDEEP: | 1536:wKURQgEFHKeEvxZFCcQCEtf6oYQqnv/2yiHJqUpeSH55uAXRh9J/LzKxH7yG6NMr:wKeQRFqvfF8/w3QCmnp5H5UAXRh9J/XM |
MD5: | 86E877927A1C9043A7F1AC211569C47F |
SHA1: | DD4AD496D98B1804EF7C312D7D72FDD28A7A71F7 |
SHA-256: | 3BB527137A86322C9BB94D12D96337C386C0BDF21AB0188E88F7B5AA5565B287 |
SHA-512: | E2345B1E3B568DF6089BF880E48756348B3F41C893D1F38C845895C9A36BD2F3F217FEAF8440B66D3ECFCB23A4CEBA102F9BE9C53AF58CEC979A3C2662829E98 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 135168 |
Entropy (8bit): | 6.637196706228119 |
Encrypted: | false |
SSDEEP: | 3072:KPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqV4:KPj0nEo3tb2j6AUkB0CThp6vmV4 |
MD5: | 22FED7224B5D03CC9A0388A08771838C |
SHA1: | E8380A47AB0C67D478D7B54AF35A0D0E998D96FE |
SHA-256: | D8726603EA5D8CF6DD256D110906DA259967B19380BA7A334FAE01265A6BDAE7 |
SHA-512: | 867DBF9432055ED4A09B95C4E21157A9EBD998AD4767F979601CE6821F660FEFABA89919327BAF6196E9FB7B78F1495E048D4828C4B8981C44FC5DB84A0D6B8E |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40046 |
Entropy (8bit): | 7.995985530508175 |
Encrypted: | true |
SSDEEP: | 768:yl2VcKVXHHXV/jjasuDjGey2zkLSUR7JbP2GcqFIXk75uPLXNMRGD/A9urgk1Ol2:yl2iK9H39HaRFdoSmbPt5jOLmRGjAyg0 |
MD5: | EA1F9FDD115297D606B829A08D02DCF2 |
SHA1: | 972C64393EA525F29CB8EE75257772FE48FB8D43 |
SHA-256: | CB8EEE0984FDA76C6DF07EE2561CB59510BA80236F96778DC4F66DC5D4145DA7 |
SHA-512: | 0FB6D333670FE12F7FFE4EA4EAD804BC1D027150A6AF94C150729C0BC4779F79A2F679E62E3A90C0CE749723500DB4F7232439B97EAF975FAA5584F6EB07CF1F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 5.721489966425017 |
Encrypted: | false |
SSDEEP: | 1536:OhWoXElJUzdlDfFgQa8BpDzdZPp7HE+tKA3QkvyNf7XwH:MWoUlJUPdgQa8Bp/LxyA3laWH |
MD5: | 5264EF29AF53AB79B9BE0E48D8D25E1B |
SHA1: | C25C09D953ED58FED5A37860F3709E64836792D2 |
SHA-256: | 16317BBCF81301FA60999541273E1EA6D779B089116FE9F56B328CFA9A656201 |
SHA-512: | 8F1AD44428223B9271CC4785942F923E7A2A1175F0F0B4E544F1C57084040615ABF3545D61FB0C06DD9761B9D144017AAF816F0EBD72F0AA43357DD3629255A8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 77824 |
Entropy (8bit): | 6.754289605573463 |
Encrypted: | false |
SSDEEP: | 1536:h+Sh+I+FrbCyI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CZ:4SAU4CE0Imbi80Z |
MD5: | F924D29B65337DD04EFB400ECDBBD9B2 |
SHA1: | 15680E3E880418DEDA966E0A4A3E4B67CF4CE3B1 |
SHA-256: | 33626952B53B46B58AE32C4C7D1A4B054551518C9E050267A2CAD863C6D7A818 |
SHA-512: | 0EEFE4043390659D2A25C548B705F73257EC998AB9FED576535AA85406F8A8BA9526E5525583F6D91988747BADF2F0B0F992AC412C41B1FD7FF2C86319E1FB90 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 101376 |
Entropy (8bit): | 6.3647570127643975 |
Encrypted: | false |
SSDEEP: | 1536:f5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE7:f5elDWy4ZNoGmROL7F1G7ho2kOQ |
MD5: | A271C89EE02656F8A9C9DC6005A767C1 |
SHA1: | DC1C94CA8DBE68CCE95F5D9082EFA01C9131FB0A |
SHA-256: | 40D95AD335DDFFB637F4E569B19A3DD973D25021FC08E219C20A6B789ADD043A |
SHA-512: | 1CD7B91F63D14932D033A871B5CB6AB9BD692CD10A403240FAC1DA0D74C80F622F3B5723D1A746AF867627EF1C675F7FD6625A11C2FC04711AE57D627677C530 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 487852 |
Entropy (8bit): | 7.998628853567534 |
Encrypted: | true |
SSDEEP: | 12288:4vD5qWrer43O2ss6DP8Z09WdsAvsYpZ43rizQYY+:WbrerXQ6DP8u9WdsmXZo+ |
MD5: | EE93C2F04396717910ABBFBFD9A151FB |
SHA1: | 29C4C6A67457DF0FA39C60A45A6FD698C3DC484B |
SHA-256: | ABD5E91C3960DFBEF083C3E63B933E7176168A4B160B782299B9A5CB36943EB3 |
SHA-512: | CFD7A18DD83CCA89256DADC8118CE6C4B01EFF6085E024BF7E53264A23C5D0BDC3BE8E825ED747CB40514DA14F2D1B1FFB60BBA71C7B254E5F87607BFE79C7B7 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1671 |
Entropy (8bit): | 4.712685291649495 |
Encrypted: | false |
SSDEEP: | 24:OdyGS9PvCA433C+sCNC1skNkvQfhSHQU2L55e1yb/uBx39lt6DhBhhBf:v9n9mTsCNvEQH5O5U1nPKrhBf |
MD5: | 2110D5656FE3BAC9ACDDCBB6F981D424 |
SHA1: | 0D8CA0EF393419CA1CA453E6C34B7C65FC60B6F3 |
SHA-256: | 34846CA023D1742503C2EAAEB6C797268E15FA71DD2FCB9AC4E3C102A6207875 |
SHA-512: | 826AB8C4F3252F0A31087E8A6601F9D3BDD9B47A1629F5546210547F994B5AEB11A77631101ABA3CE1E0CAA2CE992C5442DF774C46794817D363E5046B7B518B |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.279946210431455 |
TrID: |
|
File name: | setup.exe |
File size: | 83'896'395 bytes |
MD5: | c804e1074af9d7cffa16e6bd084bea42 |
SHA1: | dba96c1d8dd56520fcbc65b1d1dd0a8da91e81c5 |
SHA256: | d0710b55aa4f4424d4b14ad320e6615dc230f2af271a1f260ea475141f9d0091 |
SHA512: | 950a9a8822cb6df38d710cf1341a79ce25e76e8f145471167dda49f8e6c9e9b22a88836d51ee69b4770c69cef3d161be7fc408de336d1d8a53f1bbad40accadd |
SSDEEP: | 24576:0/8vj/qTTY54U9wn04+riuApVGgH7x86jeIGyghi:HKrHn8Xy3HtjePymi |
TLSH: | 4A0812B627DDA384D9152B20EBC7D0AC607A38B572307A4865EDF24D633B102A6FDF51 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | 6609488d15988030 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F429788727974C52EF1B4CD93D03B8F |
Thumbprint SHA-1: | CD7BE0F00F2A5EE102C3037E098AF3F457D3B1AB |
Thumbprint SHA-256: | 4B59D847D7187ED910590D52798FD7E6FCB13396092FDBC1FE43B2311AAB6EEB |
Serial: | 060E2F8F9E1B8BE518D5FE2B69CFCCB1 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F57CD27B60Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F57CD27B2EDh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F57CD27B2DBh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F57CD278BDAh |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F57CD27AFB1h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F57CD278C63h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F57CD278BDAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x2316 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x4ffffeb | 0x2860 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x2316 | 0x2400 | d622028710ffa23845b627aedc1fb1df | False | 0.7804904513888888 | data | 6.9654543785696825 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xf7000 | 0xf32 | 0x1000 | 15b9f56f7291deb167edde36568be2e9 | False | 0.79931640625 | data | 6.901933192448209 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf4298 | 0xe36 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9483232545354591 |
RT_ICON | 0xf50d0 | 0x46e | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0061728395061729 |
RT_ICON | 0xf5540 | 0x2e3 | PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced | English | United States | 1.0148849797023005 |
RT_ICON | 0xf5824 | 0x249 | PNG image data, 72 x 72, 8-bit/color RGBA, non-interlaced | English | United States | 1.0188034188034187 |
RT_ICON | 0xf5a70 | 0x1fb | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.017751479289941 |
RT_DIALOG | 0xf5c6c | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0xf5d6c | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0xf5e88 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0xf5ee8 | 0x4c | data | English | United States | 0.7894736842105263 |
RT_VERSION | 0xf5f34 | 0x10c | data | English | United States | 0.6417910447761194 |
RT_MANIFEST | 0xf6040 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:49:44.023631+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:45.095924+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49739 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:45.095924+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49739 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:45.570835+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:46.413595+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49740 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:46.413595+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49740 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:47.037204+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:57.512917+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:49:59.036455+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:00.310098+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:01.666407+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:01.672675+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49745 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:01.672675+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.4 | 49745 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:03.869733+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49747 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:50:04.369801+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49747 | 172.67.158.151 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 31, 2025 19:49:43.513540983 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:43.513586044 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:43.513689041 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:43.516581059 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:43.516596079 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:44.023562908 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:44.023631096 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:44.036562920 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:44.036590099 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:44.036823034 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:44.087393045 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:44.087393045 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:44.087470055 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.095714092 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.095777988 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.095844030 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.097445965 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.097466946 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.097477913 CET | 49739 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.097482920 CET | 443 | 49739 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.109113932 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.109155893 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.109252930 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.112421989 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.112436056 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.570734978 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.570835114 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.572168112 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.572176933 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.572379112 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:45.573662043 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.573695898 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:45.573724031 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413428068 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413484097 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413511992 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413541079 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413580894 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413626909 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413641930 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.413641930 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.413666964 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.413686037 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.414015055 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.414058924 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.414067030 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.419945002 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.419996977 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.420001984 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.420011997 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.420056105 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.500062943 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.500116110 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.500138998 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.500200033 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.500266075 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.500266075 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.500557899 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.500574112 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.500583887 CET | 49740 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.500587940 CET | 443 | 49740 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.558408022 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.558499098 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:46.558613062 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.558922052 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:46.558959007 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:47.037108898 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:47.037204027 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:47.038588047 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:47.038608074 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:47.038817883 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:47.040018082 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:47.040198088 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:47.040262938 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:47.040365934 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:47.040379047 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.037642002 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.037727118 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.037822008 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.038012981 CET | 49741 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.038064957 CET | 443 | 49741 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.055617094 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.055658102 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.055741072 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.056034088 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.056046009 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.512777090 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.512917042 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.514430046 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.514437914 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.514638901 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:57.515765905 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.516010046 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:57.516036987 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:58.133527040 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:58.133610010 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:58.133670092 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:58.320446968 CET | 49742 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:58.320472956 CET | 443 | 49742 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:58.574517965 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:58.574603081 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:58.574697971 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:58.575527906 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:58.575578928 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.036375046 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.036454916 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.039438009 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.039457083 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.039865971 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.041868925 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.042187929 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.042227030 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.042324066 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.042340040 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.747894049 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.748027086 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.748095036 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.748286963 CET | 49743 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.748328924 CET | 443 | 49743 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.832238913 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.832278967 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:49:59.832356930 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.832638979 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:49:59.832657099 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:00.310013056 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:00.310097933 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:00.311819077 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:00.311832905 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:00.312156916 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:00.313409090 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:00.313524008 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:00.313549995 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:00.839689970 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:00.843673944 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:00.843756914 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:00.843871117 CET | 49744 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:00.843893051 CET | 443 | 49744 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.125087976 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.125175953 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.125260115 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.125607967 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.125642061 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.666305065 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.666407108 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.667741060 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.667762995 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.668093920 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.671374083 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.672122002 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.672167063 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.672302961 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.672348022 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.672492027 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.672542095 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.672694921 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.672751904 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.672952890 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.672996044 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.673207998 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.673243046 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.673263073 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.673284054 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.673461914 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.673502922 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.673546076 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.673645020 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.673716068 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.682351112 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.682584047 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.682621956 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.682692051 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.682729959 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:01.682837963 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:01.687140942 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.271733999 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.271845102 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.271934986 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.372881889 CET | 49745 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.372924089 CET | 443 | 49745 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.376380920 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.376427889 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.376512051 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.377377033 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.377408028 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.869651079 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.869733095 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.871135950 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.871159077 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.871505022 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:03.872668982 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.872705936 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:03.872761965 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:04.369810104 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:04.369916916 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:04.370013952 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:04.370263100 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:04.370299101 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Jan 31, 2025 19:50:04.370325089 CET | 49747 | 443 | 192.168.2.4 | 172.67.158.151 |
Jan 31, 2025 19:50:04.370341063 CET | 443 | 49747 | 172.67.158.151 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 31, 2025 19:49:12.845161915 CET | 51207 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 31, 2025 19:49:12.853854895 CET | 53 | 51207 | 1.1.1.1 | 192.168.2.4 |
Jan 31, 2025 19:49:43.293083906 CET | 54623 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 31, 2025 19:49:43.504250050 CET | 53 | 54623 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 31, 2025 19:49:12.845161915 CET | 192.168.2.4 | 1.1.1.1 | 0x1223 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 31, 2025 19:49:43.293083906 CET | 192.168.2.4 | 1.1.1.1 | 0xc1a0 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 31, 2025 19:49:12.853854895 CET | 1.1.1.1 | 192.168.2.4 | 0x1223 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 31, 2025 19:49:43.504250050 CET | 1.1.1.1 | 192.168.2.4 | 0xc1a0 | No error (0) | 172.67.158.151 | A (IP address) | IN (0x0001) | false | ||
Jan 31, 2025 19:49:43.504250050 CET | 1.1.1.1 | 192.168.2.4 | 0xc1a0 | No error (0) | 104.21.33.42 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49739 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:49:44 UTC | 268 | OUT | |
2025-01-31 18:49:44 UTC | 8 | OUT | |
2025-01-31 18:49:45 UTC | 1133 | IN | |
2025-01-31 18:49:45 UTC | 7 | IN | |
2025-01-31 18:49:45 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49740 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:49:45 UTC | 269 | OUT | |
2025-01-31 18:49:45 UTC | 48 | OUT | |
2025-01-31 18:49:46 UTC | 1131 | IN | |
2025-01-31 18:49:46 UTC | 238 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN | |
2025-01-31 18:49:46 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49741 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:49:47 UTC | 283 | OUT | |
2025-01-31 18:49:47 UTC | 15331 | OUT | |
2025-01-31 18:49:47 UTC | 2809 | OUT | |
2025-01-31 18:49:57 UTC | 1132 | IN | |
2025-01-31 18:49:57 UTC | 20 | IN | |
2025-01-31 18:49:57 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49742 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:49:57 UTC | 284 | OUT | |
2025-01-31 18:49:57 UTC | 8773 | OUT | |
2025-01-31 18:49:58 UTC | 1137 | IN | |
2025-01-31 18:49:58 UTC | 20 | IN | |
2025-01-31 18:49:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49743 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:49:59 UTC | 280 | OUT | |
2025-01-31 18:49:59 UTC | 15331 | OUT | |
2025-01-31 18:49:59 UTC | 5065 | OUT | |
2025-01-31 18:49:59 UTC | 1133 | IN | |
2025-01-31 18:49:59 UTC | 20 | IN | |
2025-01-31 18:49:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49744 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:50:00 UTC | 283 | OUT | |
2025-01-31 18:50:00 UTC | 2605 | OUT | |
2025-01-31 18:50:00 UTC | 1133 | IN | |
2025-01-31 18:50:00 UTC | 20 | IN | |
2025-01-31 18:50:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49745 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:50:01 UTC | 285 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:01 UTC | 15331 | OUT | |
2025-01-31 18:50:03 UTC | 1135 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49747 | 172.67.158.151 | 443 | 7748 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:50:03 UTC | 269 | OUT | |
2025-01-31 18:50:03 UTC | 83 | OUT | |
2025-01-31 18:50:04 UTC | 1127 | IN | |
2025-01-31 18:50:04 UTC | 54 | IN | |
2025-01-31 18:50:04 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:49:05 |
Start date: | 31/01/2025 |
Path: | C:\Users\user\Desktop\setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 83'896'395 bytes |
MD5 hash: | C804E1074AF9D7CFFA16E6BD084BEA42 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:49:08 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 13:49:08 |
Start date: | 31/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:49:09 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbc0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 13:49:09 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3e0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 13:49:09 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbc0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 13:49:09 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3e0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 13:49:10 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 13:49:10 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xee0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 13:49:10 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3e0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 13:49:10 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 11 |
Start time: | 13:49:11 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 13:49:11 |
Start date: | 31/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf70000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 13 |
Start time: | 13:49:11 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x990000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1526 |
Total number of Limit Nodes: | 34 |