Windows
Analysis Report
setup.exe
Overview
General Information
Detection
LummaC Stealer
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Drops PE files with a suspicious file extension
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Suspicious Copy From or To System Directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64
setup.exe (PID: 7088 cmdline:
"C:\Users\ user\Deskt op\setup.e xe" MD5: C804E1074AF9D7CFFA16E6BD084BEA42) cmd.exe (PID: 4460 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Fa shion Fash ion.cmd & Fashion.cm d MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 2104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) tasklist.exe (PID: 3568 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 5148 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) tasklist.exe (PID: 1276 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 5560 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 6508 cmdline:
cmd /c md 224177 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) extrac32.exe (PID: 6532 cmdline:
extrac32 / Y /E Welli ngton MD5: 9472AAB6390E4F1431BAA912FCFF9707) findstr.exe (PID: 1892 cmdline:
findstr /V "Tranny" Yale MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 6172 cmdline:
cmd /c cop y /b 22417 7\Benefits .com + Pho tographer + Vacuum + Separate + Valium + Continuin g + Traini ng + Hours + Kissing + Accepts + Verde + Quotation s 224177\B enefits.co m MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) cmd.exe (PID: 2860 cmdline:
cmd /c cop y /b ..\Se arches + . .\Coordina ted + ..\S tudents + ..\Approve + ..\Ther e + ..\Mol ecular + . .\Updated y MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Benefits.com (PID: 2636 cmdline:
Benefits.c om y MD5: 62D09F076E6E0240548C2F837536A46A) choice.exe (PID: 1680 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:55:27.414990+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49859 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:28.426156+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49865 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:29.615601+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49876 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:33.019549+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49897 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:34.278514+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49908 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:35.656321+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49916 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:37.106613+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49926 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:39.254001+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49941 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:55:27.918654+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49859 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:28.933956+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49865 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:39.780089+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49941 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:55:27.918654+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49859 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:55:28.933956+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49865 | 172.67.158.151 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:55:33.697217+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49897 | 172.67.158.151 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062FC |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 11 Input Capture | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs | Win32.Ransomware.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
vividimaginatigon.top | 172.67.158.151 | true | true | unknown | |
aWntkHZhzENhUIyZkjTD.aWntkHZhzENhUIyZkjTD | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.158.151 | vividimaginatigon.top | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1604056 |
Start date and time: | 2025-01-31 19:53:53 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 5s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | setup.exe |
Detection: | MAL |
Classification: | mal96.troj.spyw.evad.winEXE@26/24@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: setup.exe
⊘No simulations
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.158.151 | Get hash | malicious | Unknown | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RedLine | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RedLine | Browse |
| |
Get hash | malicious | Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\224177\Benefits.com | Get hash | malicious | Vidar | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Amadey, AsyncRAT, KeyLogger, LummaC Stealer, PureLog Stealer, ReverseShell, Stealc | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC, Amadey, AsyncRAT, LummaC Stealer, PureLog Stealer, Socks5Systemz, Vidar | Browse | |||
Get hash | malicious | Amadey, AsyncRAT, LummaC Stealer, PureLog Stealer, Vidar | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | AsyncRAT, PureLog Stealer | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 505966 |
Entropy (8bit): | 7.999691333439623 |
Encrypted: | true |
SSDEEP: | 12288:+mrNMQZ6KFovILBRcHvDvaib1DaY633eUN7dPVldapuz:+mvvGILaWkFaY63OU1vLWk |
MD5: | 69958243BC5C2E5C6095C302B3553EA6 |
SHA1: | 5290506B80C27A8390452C74180802E24A99A9E1 |
SHA-256: | BB07AF249BF75123F4101918F83DB1AC3F35BD3B25C07E24DC90F112797916DD |
SHA-512: | 02271F91DEEC06ACF9609125B4B62CDCCD12E4233D39C47233E33557427109549D2645809ED9161A3946834504AF9AC11E9F8AA1D2C2D989B9BC39E27392FEBA |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 120832 |
Entropy (8bit): | 4.977651511379863 |
Encrypted: | false |
SSDEEP: | 768:Vc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R:ePdKaj6iTcPAsAhxjgarB |
MD5: | E00C2E4747E1DBE85F4EF7AC364713D2 |
SHA1: | B1FAA76A14A9AB5B0B4DE38BFB342AF32A67C520 |
SHA-256: | 599BC7DE6330DED6D1DC02745BD0F1F1EE47C94B9916C77EAA7A6CCF716E4B56 |
SHA-512: | 5216F4D623BB24149D761333E5DB0522B65531DF807C4B2AA30FE3B90DBFD67A664DA392EFE53CA289CE8DE88686359514F857F248AC8C4E604AB19602630F99 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86016 |
Entropy (8bit): | 7.998113629509524 |
Encrypted: | true |
SSDEEP: | 1536:La+QqWrboc69uaIR/8vQ1HhIt3+rm/xSWBIrjHdcA2fgrffns3ATtO4v2sBXWD8n:LavnYuT2qhI8hWmfWAeaffns3A5v2sBT |
MD5: | 70749708F82F6478C9447EAA6424E676 |
SHA1: | 893782A94DBFE80E69ACD8E566ED01BC9BA4DA2D |
SHA-256: | 9109513040827DAF8261AB6D67673E5FA1EC7261CD18CD93BB94EC7BC10CCAED |
SHA-512: | 624D217DA8850EBAAA592791310699DFBE52A1733266EA389A908C3E1C697F8947D336E07B834DDCE58AAC4690B3832ED9504EA4C595C3B34DDCA47E2BF2B852 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 6.601424826120088 |
Encrypted: | false |
SSDEEP: | 1536:mCMIBZwneAJu7QnswIPumV3BxZxu6/sPYcSyRXzW8/uC6LdTmHwANUQlHS3cctlt:dtCZEMnVIPPBxT/sZydTmRxlHS3NxrHv |
MD5: | DC66D0464185B03BFE2A8260383C81C9 |
SHA1: | DF7E225A3854EC88CD70637B2E6855F77DCBCD0D |
SHA-256: | 7A98FB9CF35EFA46A9F79D2427E487DD3265B9A123FE4E35E840FF8ADB439163 |
SHA-512: | D4B4AB5EF3FFE765E960FC42FCBA2B0F952D62AF59BB0232B4E0CC5664584389A3F2269081737F241EF426FE264BDA50B09EE76815E56B3BFDA942DA4D856199 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66560 |
Entropy (8bit): | 7.997373986972398 |
Encrypted: | true |
SSDEEP: | 1536:KL9+7xsQUYkY3K72EMzucnMODb/6fzeAj7YvxRbQwiobuLJW2Va:cLp2EMzlDeqAXA8obEW2Va |
MD5: | A28E0FD0589CF3EE47720C0C92BADF5D |
SHA1: | AEE3105D5C4B9B0027CE9A28EF2BFA00478107FB |
SHA-256: | 428F17428E1D81642AF3EA662667D3DE1813B92DA57FD9F1DA8A5F0B1B86A2CE |
SHA-512: | 140D6D0445E611676FCDF0EF24AD6BD7FFD14B5A2A8F5D8AAF617AFEFCAC48FD5F2BB07012DB641F24C71E0D871D8278325C3E5D3738520BB4C652EDEE0053C5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14104 |
Entropy (8bit): | 5.141266308965311 |
Encrypted: | false |
SSDEEP: | 384:kBc53vyipJazsPe6JrGSlc2H09jLy/YtiKlow3lk:kaJvvpJazsFGSlc26iYtnlox |
MD5: | 3920A54C66B165ED2257B65941318CC5 |
SHA1: | C55E948965FE55152671F152638B190FEE98C83A |
SHA-256: | 6C8B78C5EBBD2D83F157A0D05BEEA1ECBC293A6F272768AAA35B9DFABC99E610 |
SHA-512: | 0473C5E86C165C7F16A254F62930A12DED3E2F17D80F76CED33FD3475696D739C2B10077E5F076B4433DFE8CF237D39E5B667A6A798E13F2A1DC23DF79D225F4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14104 |
Entropy (8bit): | 5.141266308965311 |
Encrypted: | false |
SSDEEP: | 384:kBc53vyipJazsPe6JrGSlc2H09jLy/YtiKlow3lk:kaJvvpJazsFGSlc26iYtnlox |
MD5: | 3920A54C66B165ED2257B65941318CC5 |
SHA1: | C55E948965FE55152671F152638B190FEE98C83A |
SHA-256: | 6C8B78C5EBBD2D83F157A0D05BEEA1ECBC293A6F272768AAA35B9DFABC99E610 |
SHA-512: | 0473C5E86C165C7F16A254F62930A12DED3E2F17D80F76CED33FD3475696D739C2B10077E5F076B4433DFE8CF237D39E5B667A6A798E13F2A1DC23DF79D225F4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 123904 |
Entropy (8bit): | 6.585035876941469 |
Encrypted: | false |
SSDEEP: | 3072:sBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfj:sjphfhnvO5bLezWWt/Dd314V14ZgP04 |
MD5: | CF91C73A94C610C69B320295C8DAD484 |
SHA1: | 072EEA695B66B844368162FA6B364303B8225CEF |
SHA-256: | B2C059189C73B2238D6541D5CD374AB26D76C37DE816C35B273B1075ED96CACC |
SHA-512: | 358C2473EF23865C84A21487B949BABFA9BEF3BF5D5DDE3355316282A27BC70E1119CF2874543C64295975CF46271290B16163D073B2DD612892FFA636A3A2C8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 5.8568364629581415 |
Encrypted: | false |
SSDEEP: | 1536:5VGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwu9:/q8QLeAg0Fuz08XvBNbjaAt9 |
MD5: | 790CAB68480DA239A8340E419E741DC4 |
SHA1: | 6A452363588EF0C76C6CD0AA06DED84081E6473D |
SHA-256: | AA9048B39A86F5740B0C67AF9015B4338E5E30B3260661267A24B13F72B27E3D |
SHA-512: | 8174D075C5B9FCB1D7591937DA3147947835E11C656193FFB36013FE3463AFD38CAD5F9FF91864640510FDC8CDE9F8DFD1A47E5A8F652179EBFB1443DCD30D83 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66560 |
Entropy (8bit): | 7.996878369279497 |
Encrypted: | true |
SSDEEP: | 1536:N8pqsRtX4EHoqNLeUDtUgnQ+e40aVNYB/T:N8pzR8CDVd0aVNQ |
MD5: | 0183DBFF21A2CBF2EF2051F92FB261EA |
SHA1: | 6311B1D7D18D9196BCA94175BED8BF00421E1D02 |
SHA-256: | 4155AEBE1D5968E2F2BF007DDB715BCA2D3CEC57C641E57A7D7406E767F76F60 |
SHA-512: | 6E2B8E075B491387F80E4EED11AA43D9FD6735EA7FF9599D61F98108630253FE81A0255547148D85A5F733987F257E23666291BF56F72D6BAA5BA939ADDA5016 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 6.549717665973685 |
Encrypted: | false |
SSDEEP: | 1536:L1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpV:LZg5PXPeiR6MKkjV |
MD5: | 34FC9DE0E1CA03EF501F44959FF2A326 |
SHA1: | C979CB07E3CD37B04287C171E5B2D627B6FB1571 |
SHA-256: | A68BB7207AAACD1B7FD4EE1AB4DAFC71BD464CF3386F7A1A4753391CE7A7C25C |
SHA-512: | 1E4B43A54AB2342BE65F2F9007FF45FFD0053477CBF5B04E259E73EEE7C4506828797DC559EACFB08499A3F90E1142F58AE1E05787341DF614B42A2513E7E6AB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2519 |
Entropy (8bit): | 7.557676395333429 |
Encrypted: | false |
SSDEEP: | 48:V4EC5+MV0Hhg5XKU+pp0OmyOO2UKxbQ0JYcmcY1BwPuKGPakfDb13g:V4EDzHy5Xz+ppo+zAbQ6YhbBwGKGP5hw |
MD5: | 27913DCE14BDD76823839E1BFBCA784F |
SHA1: | 02C2FD9AB4BFCDFC1B1429CCC3084CEFDF457164 |
SHA-256: | B58D374B43B871D5D309DD55B68E4DBE3373744DB8E11DA3EED17F80A972B240 |
SHA-512: | 2F3DF0DBD99B8C191006E652713C7505A2211E7D081E2D65541F0651668BD0A6C18E4EC6459080C6885BE0A3211C0BE82F58DE546DC9D6CB7BE2648311C6560D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55296 |
Entropy (8bit): | 7.997342472955196 |
Encrypted: | true |
SSDEEP: | 1536:f5ZmvfXHUGnSl9TzY4ffOUNP5ZLGLVhy0feGSVk1K+4ivg:vGtiY4ffOubGx40V1i |
MD5: | 121CAC13F89F021D263F4F9D1667492D |
SHA1: | B5A5E2E45CDA0521C423B22FB2EE31C5E5970458 |
SHA-256: | 56F941163F554FE29969F6D01BF3A1D1BCDFC995E8B502AA929F4796568E7761 |
SHA-512: | FC32C9355CCDA57C92A7013A1A0B8E56543C4BFA1B62AB7C3E7235DFA90C27A918B50C68025DA755AEE36186FD928119A76B1C019EE3E243D0820348056E6993 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 6.675937966451431 |
Encrypted: | false |
SSDEEP: | 1536:WU0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOc:WUDQWf05mjccBiqXvpgF4qv+32eOyKOv |
MD5: | 1566ECCF93E2CF411095AE7D38F9B538 |
SHA1: | D4D1B7AC1B4B797FE4F5BE148EDD67086B423CE5 |
SHA-256: | C85D1D34B1428742A37A9D5E70DA2C117DACC261C8C80B71C5CC9D024BD693A4 |
SHA-512: | 955C339107F9B5C7DA04695B6A7541EADFA6A993D1556814E09D48B11E3BD2BA984D848A4CE2293CFBB724AB8D5EF022AF083B7E27920CC561DD0FEC2F3C90EA |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 7.998019845217082 |
Encrypted: | true |
SSDEEP: | 1536:NpADrTdpietp2PbPlzFHEEkXQ+j39j2sILI2ZHBg2cHp5SnSczmypVinb8dU37Ys:8rTdpie6L9FHHqQkj2sILI2ZHBg2cHvP |
MD5: | 447B140C1F12CD49016AFE335C8C51C3 |
SHA1: | 55A0BC8373C2DA82FB292C491C9B73D0BD253EA0 |
SHA-256: | C11A882371A911CB7432500F394AE8EC19E28755B9CD2C66446DF4AC61020292 |
SHA-512: | 3FAC38C13F0CA17FE5AFBCCE5789E075706C4D1669AFF31CE78966661207052D12F7833AF51C1053B5CFAC5CDA6DD761133E442F78B18C50F69966B2A8038C3B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 96256 |
Entropy (8bit): | 7.998208168184681 |
Encrypted: | true |
SSDEEP: | 1536:wKURQgEFHKeEvxZFCcQCEtf6oYQqnv/2yiHJqUpeSH55uAXRh9J/LzKxH7yG6NMr:wKeQRFqvfF8/w3QCmnp5H5UAXRh9J/XM |
MD5: | 86E877927A1C9043A7F1AC211569C47F |
SHA1: | DD4AD496D98B1804EF7C312D7D72FDD28A7A71F7 |
SHA-256: | 3BB527137A86322C9BB94D12D96337C386C0BDF21AB0188E88F7B5AA5565B287 |
SHA-512: | E2345B1E3B568DF6089BF880E48756348B3F41C893D1F38C845895C9A36BD2F3F217FEAF8440B66D3ECFCB23A4CEBA102F9BE9C53AF58CEC979A3C2662829E98 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 135168 |
Entropy (8bit): | 6.637196706228119 |
Encrypted: | false |
SSDEEP: | 3072:KPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqV4:KPj0nEo3tb2j6AUkB0CThp6vmV4 |
MD5: | 22FED7224B5D03CC9A0388A08771838C |
SHA1: | E8380A47AB0C67D478D7B54AF35A0D0E998D96FE |
SHA-256: | D8726603EA5D8CF6DD256D110906DA259967B19380BA7A334FAE01265A6BDAE7 |
SHA-512: | 867DBF9432055ED4A09B95C4E21157A9EBD998AD4767F979601CE6821F660FEFABA89919327BAF6196E9FB7B78F1495E048D4828C4B8981C44FC5DB84A0D6B8E |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40046 |
Entropy (8bit): | 7.995985530508175 |
Encrypted: | true |
SSDEEP: | 768:yl2VcKVXHHXV/jjasuDjGey2zkLSUR7JbP2GcqFIXk75uPLXNMRGD/A9urgk1Ol2:yl2iK9H39HaRFdoSmbPt5jOLmRGjAyg0 |
MD5: | EA1F9FDD115297D606B829A08D02DCF2 |
SHA1: | 972C64393EA525F29CB8EE75257772FE48FB8D43 |
SHA-256: | CB8EEE0984FDA76C6DF07EE2561CB59510BA80236F96778DC4F66DC5D4145DA7 |
SHA-512: | 0FB6D333670FE12F7FFE4EA4EAD804BC1D027150A6AF94C150729C0BC4779F79A2F679E62E3A90C0CE749723500DB4F7232439B97EAF975FAA5584F6EB07CF1F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 5.721489966425017 |
Encrypted: | false |
SSDEEP: | 1536:OhWoXElJUzdlDfFgQa8BpDzdZPp7HE+tKA3QkvyNf7XwH:MWoUlJUPdgQa8Bp/LxyA3laWH |
MD5: | 5264EF29AF53AB79B9BE0E48D8D25E1B |
SHA1: | C25C09D953ED58FED5A37860F3709E64836792D2 |
SHA-256: | 16317BBCF81301FA60999541273E1EA6D779B089116FE9F56B328CFA9A656201 |
SHA-512: | 8F1AD44428223B9271CC4785942F923E7A2A1175F0F0B4E544F1C57084040615ABF3545D61FB0C06DD9761B9D144017AAF816F0EBD72F0AA43357DD3629255A8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 77824 |
Entropy (8bit): | 6.754289605573463 |
Encrypted: | false |
SSDEEP: | 1536:h+Sh+I+FrbCyI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CZ:4SAU4CE0Imbi80Z |
MD5: | F924D29B65337DD04EFB400ECDBBD9B2 |
SHA1: | 15680E3E880418DEDA966E0A4A3E4B67CF4CE3B1 |
SHA-256: | 33626952B53B46B58AE32C4C7D1A4B054551518C9E050267A2CAD863C6D7A818 |
SHA-512: | 0EEFE4043390659D2A25C548B705F73257EC998AB9FED576535AA85406F8A8BA9526E5525583F6D91988747BADF2F0B0F992AC412C41B1FD7FF2C86319E1FB90 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 101376 |
Entropy (8bit): | 6.3647570127643975 |
Encrypted: | false |
SSDEEP: | 1536:f5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE7:f5elDWy4ZNoGmROL7F1G7ho2kOQ |
MD5: | A271C89EE02656F8A9C9DC6005A767C1 |
SHA1: | DC1C94CA8DBE68CCE95F5D9082EFA01C9131FB0A |
SHA-256: | 40D95AD335DDFFB637F4E569B19A3DD973D25021FC08E219C20A6B789ADD043A |
SHA-512: | 1CD7B91F63D14932D033A871B5CB6AB9BD692CD10A403240FAC1DA0D74C80F622F3B5723D1A746AF867627EF1C675F7FD6625A11C2FC04711AE57D627677C530 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 487852 |
Entropy (8bit): | 7.998628853567534 |
Encrypted: | true |
SSDEEP: | 12288:4vD5qWrer43O2ss6DP8Z09WdsAvsYpZ43rizQYY+:WbrerXQ6DP8u9WdsmXZo+ |
MD5: | EE93C2F04396717910ABBFBFD9A151FB |
SHA1: | 29C4C6A67457DF0FA39C60A45A6FD698C3DC484B |
SHA-256: | ABD5E91C3960DFBEF083C3E63B933E7176168A4B160B782299B9A5CB36943EB3 |
SHA-512: | CFD7A18DD83CCA89256DADC8118CE6C4B01EFF6085E024BF7E53264A23C5D0BDC3BE8E825ED747CB40514DA14F2D1B1FFB60BBA71C7B254E5F87607BFE79C7B7 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1671 |
Entropy (8bit): | 4.712685291649495 |
Encrypted: | false |
SSDEEP: | 24:OdyGS9PvCA433C+sCNC1skNkvQfhSHQU2L55e1yb/uBx39lt6DhBhhBf:v9n9mTsCNvEQH5O5U1nPKrhBf |
MD5: | 2110D5656FE3BAC9ACDDCBB6F981D424 |
SHA1: | 0D8CA0EF393419CA1CA453E6C34B7C65FC60B6F3 |
SHA-256: | 34846CA023D1742503C2EAAEB6C797268E15FA71DD2FCB9AC4E3C102A6207875 |
SHA-512: | 826AB8C4F3252F0A31087E8A6601F9D3BDD9B47A1629F5546210547F994B5AEB11A77631101ABA3CE1E0CAA2CE992C5442DF774C46794817D363E5046B7B518B |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.279946210431455 |
TrID: |
|
File name: | setup.exe |
File size: | 83'896'395 bytes |
MD5: | c804e1074af9d7cffa16e6bd084bea42 |
SHA1: | dba96c1d8dd56520fcbc65b1d1dd0a8da91e81c5 |
SHA256: | d0710b55aa4f4424d4b14ad320e6615dc230f2af271a1f260ea475141f9d0091 |
SHA512: | 950a9a8822cb6df38d710cf1341a79ce25e76e8f145471167dda49f8e6c9e9b22a88836d51ee69b4770c69cef3d161be7fc408de336d1d8a53f1bbad40accadd |
SSDEEP: | 24576:0/8vj/qTTY54U9wn04+riuApVGgH7x86jeIGyghi:HKrHn8Xy3HtjePymi |
TLSH: | 4A0812B627DDA384D9152B20EBC7D0AC607A38B572307A4865EDF24D633B102A6FDF51 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | 6609488d15988030 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F429788727974C52EF1B4CD93D03B8F |
Thumbprint SHA-1: | CD7BE0F00F2A5EE102C3037E098AF3F457D3B1AB |
Thumbprint SHA-256: | 4B59D847D7187ED910590D52798FD7E6FCB13396092FDBC1FE43B2311AAB6EEB |
Serial: | 060E2F8F9E1B8BE518D5FE2B69CFCCB1 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007FE0710B1E3Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007FE0710B1B1Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007FE0710B1B0Bh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007FE0710AF40Ah |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007FE0710B17E1h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FE0710AF493h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FE0710AF40Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x2316 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x4ffffeb | 0x2860 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x2316 | 0x2400 | d622028710ffa23845b627aedc1fb1df | False | 0.7804904513888888 | data | 6.9654543785696825 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xf7000 | 0xf32 | 0x1000 | 15b9f56f7291deb167edde36568be2e9 | False | 0.79931640625 | data | 6.901933192448209 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf4298 | 0xe36 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9483232545354591 |
RT_ICON | 0xf50d0 | 0x46e | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0061728395061729 |
RT_ICON | 0xf5540 | 0x2e3 | PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced | English | United States | 1.0148849797023005 |
RT_ICON | 0xf5824 | 0x249 | PNG image data, 72 x 72, 8-bit/color RGBA, non-interlaced | English | United States | 1.0188034188034187 |
RT_ICON | 0xf5a70 | 0x1fb | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.017751479289941 |
RT_DIALOG | 0xf5c6c | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0xf5d6c | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0xf5e88 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0xf5ee8 | 0x4c | data | English | United States | 0.7894736842105263 |
RT_VERSION | 0xf5f34 | 0x10c | data | English | United States | 0.6417910447761194 |
RT_MANIFEST | 0xf6040 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-31T19:55:27.414990+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49859 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:27.918654+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49859 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:27.918654+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49859 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:28.426156+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49865 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:28.933956+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49865 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:28.933956+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49865 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:29.615601+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49876 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:33.019549+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49897 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:33.697217+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49897 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:34.278514+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49908 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:35.656321+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49916 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:37.106613+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49926 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:39.254001+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49941 | 172.67.158.151 | 443 | TCP |
2025-01-31T19:55:39.780089+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49941 | 172.67.158.151 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 31, 2025 19:55:26.920375109 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:26.920392036 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:26.920572996 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:26.921678066 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:26.921686888 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.414891958 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.414989948 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.419262886 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.419267893 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.419672966 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.463541031 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.464637995 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.464653969 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.464997053 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.918677092 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.918939114 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.919009924 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.920556068 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.920563936 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.920586109 CET | 49859 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.920589924 CET | 443 | 49859 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.926614046 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.926640987 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:27.926707983 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.926973104 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:27.926983118 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.426013947 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.426156044 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.429537058 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.429559946 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.430140972 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.431375027 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.431411982 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.431464911 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934027910 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934149981 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934257030 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.934262037 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934288979 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934340954 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.934412956 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934565067 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934648037 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934669971 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.934676886 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.934725046 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.934779882 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.938426018 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.938474894 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.938482046 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:28.979295015 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:28.979300022 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.025996923 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.026007891 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.026022911 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.026200056 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.026215076 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.026221037 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.026276112 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.026303053 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.026424885 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.026474953 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.047255993 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.047255993 CET | 49865 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.047262907 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.047271013 CET | 443 | 49865 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.146538973 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.146574020 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.146641016 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.146982908 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.146997929 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.615515947 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.615601063 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.616630077 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.616633892 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.617618084 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:29.619405031 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.619544983 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:29.619581938 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:32.537827015 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:32.538084984 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:32.538144112 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:32.538268089 CET | 49876 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:32.538278103 CET | 443 | 49876 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:32.553515911 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:32.553603888 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:32.553694963 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:32.553977013 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:32.554014921 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.019419909 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.019548893 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.020649910 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.020663977 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.021166086 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.022285938 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.022429943 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.022470951 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.022527933 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.067332983 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.697278976 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.697516918 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.697572947 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.710874081 CET | 49897 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.710886955 CET | 443 | 49897 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.812365055 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.812431097 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:33.812520981 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.812869072 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:33.812887907 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:34.278435946 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:34.278513908 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:34.279582977 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:34.279591084 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:34.279906034 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:34.281048059 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:34.281188965 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:34.281213045 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:34.281274080 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:34.281281948 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.059943914 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.060201883 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.060265064 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.060714006 CET | 49908 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.060740948 CET | 443 | 49908 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.160105944 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.160152912 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.160232067 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.160509109 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.160525084 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.656233072 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.656321049 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.657668114 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.657682896 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.658708096 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:35.660028934 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.660152912 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:35.660177946 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:36.131203890 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:36.131472111 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:36.131555080 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:36.131858110 CET | 49916 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:36.131871939 CET | 443 | 49916 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:36.620800972 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:36.620841980 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:36.620946884 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:36.621256113 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:36.621273041 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.106542110 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.106612921 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.107969999 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.107989073 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.108771086 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.110049009 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.110812902 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.110836029 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.110939026 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.110960960 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.111073971 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.111150026 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.111265898 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.111284971 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.111413956 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.111444950 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.111581087 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.111619949 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.111643076 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.111793041 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.111828089 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.121592999 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.121824026 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.121910095 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.121963978 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.122025013 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.122198105 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.122267008 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.122355938 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.122471094 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:37.122518063 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:37.122678995 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:38.737098932 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:38.737339020 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:38.737413883 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:38.772949934 CET | 49926 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:38.772989988 CET | 443 | 49926 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:38.785373926 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:38.785402060 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:38.785463095 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:38.786031008 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:38.786040068 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.253911972 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.254000902 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:39.255316973 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:39.255326033 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.255641937 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.256793022 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:39.256813049 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:39.256877899 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.780118942 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.780225039 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.780303955 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:39.780471087 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:39.780483007 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Jan 31, 2025 19:55:39.780493975 CET | 49941 | 443 | 192.168.2.5 | 172.67.158.151 |
Jan 31, 2025 19:55:39.780499935 CET | 443 | 49941 | 172.67.158.151 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 31, 2025 19:54:54.097407103 CET | 61164 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 31, 2025 19:54:54.106396914 CET | 53 | 61164 | 1.1.1.1 | 192.168.2.5 |
Jan 31, 2025 19:55:26.768120050 CET | 60591 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 31, 2025 19:55:26.914699078 CET | 53 | 60591 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 31, 2025 19:54:54.097407103 CET | 192.168.2.5 | 1.1.1.1 | 0xe495 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 31, 2025 19:55:26.768120050 CET | 192.168.2.5 | 1.1.1.1 | 0xb42a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 31, 2025 19:54:54.106396914 CET | 1.1.1.1 | 192.168.2.5 | 0xe495 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 31, 2025 19:55:26.914699078 CET | 1.1.1.1 | 192.168.2.5 | 0xb42a | No error (0) | 172.67.158.151 | A (IP address) | IN (0x0001) | false | ||
Jan 31, 2025 19:55:26.914699078 CET | 1.1.1.1 | 192.168.2.5 | 0xb42a | No error (0) | 104.21.33.42 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49859 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:27 UTC | 268 | OUT | |
2025-01-31 18:55:27 UTC | 8 | OUT | |
2025-01-31 18:55:27 UTC | 1133 | IN | |
2025-01-31 18:55:27 UTC | 7 | IN | |
2025-01-31 18:55:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49865 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:28 UTC | 269 | OUT | |
2025-01-31 18:55:28 UTC | 48 | OUT | |
2025-01-31 18:55:28 UTC | 1137 | IN | |
2025-01-31 18:55:28 UTC | 232 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN | |
2025-01-31 18:55:28 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49876 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:29 UTC | 286 | OUT | |
2025-01-31 18:55:29 UTC | 12830 | OUT | |
2025-01-31 18:55:32 UTC | 1131 | IN | |
2025-01-31 18:55:32 UTC | 20 | IN | |
2025-01-31 18:55:32 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49897 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:33 UTC | 283 | OUT | |
2025-01-31 18:55:33 UTC | 15054 | OUT | |
2025-01-31 18:55:33 UTC | 1135 | IN | |
2025-01-31 18:55:33 UTC | 20 | IN | |
2025-01-31 18:55:33 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49908 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:34 UTC | 282 | OUT | |
2025-01-31 18:55:34 UTC | 15331 | OUT | |
2025-01-31 18:55:34 UTC | 5207 | OUT | |
2025-01-31 18:55:35 UTC | 1139 | IN | |
2025-01-31 18:55:35 UTC | 20 | IN | |
2025-01-31 18:55:35 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49916 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:35 UTC | 282 | OUT | |
2025-01-31 18:55:35 UTC | 2448 | OUT | |
2025-01-31 18:55:36 UTC | 1133 | IN | |
2025-01-31 18:55:36 UTC | 20 | IN | |
2025-01-31 18:55:36 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49926 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:37 UTC | 288 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:37 UTC | 15331 | OUT | |
2025-01-31 18:55:38 UTC | 1139 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49941 | 172.67.158.151 | 443 | 2636 | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-31 18:55:39 UTC | 269 | OUT | |
2025-01-31 18:55:39 UTC | 83 | OUT | |
2025-01-31 18:55:39 UTC | 1131 | IN | |
2025-01-31 18:55:39 UTC | 54 | IN | |
2025-01-31 18:55:39 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:54:48 |
Start date: | 31/01/2025 |
Path: | C:\Users\user\Desktop\setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 83'896'395 bytes |
MD5 hash: | C804E1074AF9D7CFFA16E6BD084BEA42 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 13:54:50 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:54:50 |
Start date: | 31/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 13:54:50 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 13:54:50 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe00000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 13:54:51 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 13:54:51 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe00000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 13:54:52 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 13:54:52 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x760000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 13:54:52 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe00000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 13:54:52 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 13:54:53 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 13:54:53 |
Start date: | 31/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\224177\Benefits.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x870000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 13:54:53 |
Start date: | 31/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfc0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1526 |
Total number of Limit Nodes: | 34 |