Windows
Analysis Report
Setup-Latest.exe
Overview
General Information
Detection
LummaC Stealer
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64
Setup-Latest.exe (PID: 7556 cmdline:
"C:\Users\ user\Deskt op\Setup-L atest.exe" MD5: D905D14928E2766285ED7CA83EAAF4B3) cmd.exe (PID: 7596 cmdline:
"C:\Window s\system32 \cmd.exe" /c expand Wide.mp4 W ide.mp4.ba t & Wide.m p4.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) expand.exe (PID: 7648 cmdline:
expand Wid e.mp4 Wide .mp4.bat MD5: 544B0DBFF3F393BCE8BB9D815F532D51) tasklist.exe (PID: 7700 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 7708 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) tasklist.exe (PID: 7744 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 7752 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 7792 cmdline:
cmd /c md 562639 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) extrac32.exe (PID: 7808 cmdline:
extrac32 / Y /E Alway s.mp4 MD5: 9472AAB6390E4F1431BAA912FCFF9707) findstr.exe (PID: 7836 cmdline:
findstr /V "Yang" La bor MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 7852 cmdline:
cmd /c cop y /b 56263 9\Wages.co m + Unifor m + Textbo oks + Exhi bits + Acc ountabilit y + Fails + Pavilion + Suggest ions + Dec orating + Volunteers 562639\Wa ges.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) cmd.exe (PID: 7868 cmdline:
cmd /c cop y /b ..\St rikes.mp4 + ..\Darkn ess.mp4 + ..\Oaks.mp 4 + ..\Far es.mp4 + . .\Funding. mp4 + ..\C omplimenta ry.mp4 + . .\Relate.m p4 G MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Wages.com (PID: 7884 cmdline:
Wages.com G MD5: 62D09F076E6E0240548C2F837536A46A) choice.exe (PID: 7904 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-14T16:55:55.172476+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:56.196791+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:57.459844+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:59.322762+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:00.447277+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:01.763539+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:03.118342+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:05.414362+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-14T16:55:55.683804+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:56.847472+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:05.960131+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-14T16:55:55.683804+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-14T16:55:58.812520+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 121 Windows Management Instrumentation | 1 Scripting | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 11 Input Capture | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
19% | Virustotal | Browse | ||
19% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
zengardxen.cyou | 188.114.97.3 | true | true | unknown | |
jnYxaqNNmUyHTVQ.jnYxaqNNmUyHTVQ | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | zengardxen.cyou | European Union | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1615219 |
Start date and time: | 2025-02-14 16:54:20 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 37s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup-Latest.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@28/23@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45, 4.175.87.197
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:55:21 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Snake Keylogger | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, ReCaptcha Phish | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Healer AV Disabler, LummaC Stealer, PureLog Stealer, RedLine, Xorist, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, GCleaner, LummaC Stealer, PureLog Stealer, RedLine, SmokeLoader, Vidar | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\562639\Wages.com | Get hash | malicious | Amadey, AsyncRAT, Cryptbot, PureLog Stealer | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Blackshades | Browse | |||
Get hash | malicious | Amadey, AsyncRAT, LummaC Stealer, PureLog Stealer, zgRAT | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 529571 |
Entropy (8bit): | 7.999626419165469 |
Encrypted: | true |
SSDEEP: | 12288:BWT1PcCV6PdbVjJ7qK9SuaKh8M48AJ4hlyHCpnDk9LB2NwPDH:i1UO6PdWKQKeF4hlycDk92wPDH |
MD5: | 3C2D7A5C987B05E3941DD6EFFD48FAA7 |
SHA1: | BA99E1C7EE435ABC80058CE8A9472115082C31FB |
SHA-256: | 21EE5E1BA7E6CBF8B183A93E4CCA1EA9266C5CF03A24F4D47D5F5682D90849F4 |
SHA-512: | 9E273F2A017DFAFEB876C26E3C8BAA490D8BB429BF2F7CBF8B61B0B731E166C3CAC0D4FD8E266CD93411603A4D1578D4F6C5ED536BC2EF0FE835EF35EF8D6943 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 133120 |
Entropy (8bit): | 6.645929421393436 |
Encrypted: | false |
SSDEEP: | 3072:gPtCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnj04:OCOMVIPPL/sZ7HS3zcNPj04 |
MD5: | F698F3B6BD4FD4C90ED5935292EB2BFE |
SHA1: | 2DB7423AE317279AE1372FC3CF8FF2460656C38A |
SHA-256: | 7DCFF8D7A4B6CB306DC97F5F7DB57A36E56E13A1CFC17D3AB9836E9B5785CA59 |
SHA-512: | 5D2601379130FA22D11FE1F9D6D399BFA4236066E8C0624CD2FA077792FDA27496D1663B22890A0DD1279E4ABC21C3AB28AF97791CF5679E178BA335BFB548E5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 489741 |
Entropy (8bit): | 7.9986047267742455 |
Encrypted: | true |
SSDEEP: | 6144:DN9qPTbjHx/odUKCCYfpQ4AW6YaHzXt7r6jFZk3NAM/eXNwVySGOy6eCkgnnJCT:hkP7BoEp16YEXt/yFWAMmdwVHj7LnU |
MD5: | 8A00B16DC3B76945617792CC65186BF6 |
SHA1: | 7ED328CCFD7E0E3617935E40FDD62958D86CD262 |
SHA-256: | A38EF22B27199FFE04DCD923DF199C475AB63E2B31943AE72F3A37F6161349C1 |
SHA-512: | 02EA60B55ACF4DE07D8DA8573290BD8F12B1E546A71050F979BF4CCC60F500EBE35F73EA0063130784CB0AC7023EB6228650664E51E22583627C13B875CF5358 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 7.996211037507376 |
Encrypted: | true |
SSDEEP: | 1536:TFyNgUyeb/zTf5PlApu1UY/V7cIvfe1GV:42UHb/f5Psu9V7BvfN |
MD5: | 42198DA674D4400E907AEB635DB5BCD1 |
SHA1: | 662EDDC12E98C75C654CB6A458AD31B1C9E8314E |
SHA-256: | F025D7132A2C77BD9C87C3707FEF4AB64CC162DF67B6727432C9831BDF11BBA9 |
SHA-512: | EC32A212887F783CE1469EFBA7E440BEE22E07E591A11CE4ED6FB0634F04AD8897E4AF5CA33430B90B066894518F5FD2E2533306249B266A77BC218B9F3A1E82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 7.997501346535409 |
Encrypted: | true |
SSDEEP: | 1536:n7KTPXmnpm3M4oiEjfyqp7rUfbFMYafRxCTNARqbOxRl/TVRTsfIXKXqd:n7UASM4fEjJ7rb5LCpAkbOxRV/TaIaXU |
MD5: | ACDA51733A848A5C4A9D1381EFFC0823 |
SHA1: | 196639CA7174C9D1E817D042A5CC6703E4F7C804 |
SHA-256: | B4337E189ED65C122965008A94764C34FC61AD4796F62C3A407BB758D50FB482 |
SHA-512: | CC01602B242D832D38C86985FC64F7B92E1592E615EB46372A2D5ADCCCA0E599F6053262A98774774F0DCDF083C5BBF9618A6B678A8C53A9C2881A99B783EE8B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 130048 |
Entropy (8bit): | 5.114601341913769 |
Encrypted: | false |
SSDEEP: | 1536:rKaj6iTcPAsAhxjgarB/5el3EYrDWyu0uS:b6whxjgarB/5elDWy4S |
MD5: | 36B2425AC79B2809A72223B7AE0CB33D |
SHA1: | 7919B6F47C5EA581150023C38FA002BBAC236C1B |
SHA-256: | 0E93C1BB7974B0786D02F13FE1639C6E6EC7272F8621AC48BD06A776FA89BC9B |
SHA-512: | 97549DCB3BF11301EC222AF0A4675E438373312F73EE7D2A43649F985E19545D69BDE65398B8FE8D8BEE0A0CADA92DBF6197E4F06CBC57AD38A4C6D306C94CF5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 6.742620741375466 |
Encrypted: | false |
SSDEEP: | 768:FdimkIXqURPN2mldrfa04VQv7Qf0VosQE7YmFdni8yDJ6bV6ybB:FyI7P4Cxi8q0vQEcmFdni8yDGVFB |
MD5: | B5377B1F52750982FDD6CAD5B4E0AF57 |
SHA1: | FD12ABEEC698A60DDC8E1F8034FBCFC2ADF38ECD |
SHA-256: | 711A009FC9914B08D16B79013FA4E70A3DE2A50B83388B89A138AB2C54E0E62C |
SHA-512: | 8FCF1254EAD772C2D1D0C5425B81CE6EA7703872AB5A83E43ABB8DE54CA8FDCEE164D7F3873E8F8F1A44F88882E4A9ECC1F1F5BA658BBEF2643A62E07C9CEAD9 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 134144 |
Entropy (8bit): | 6.62536518575565 |
Encrypted: | false |
SSDEEP: | 3072:4EoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLtG:4Eo3tb2j6AUkB0CThp6vmVnjpG |
MD5: | E944BD961E9991CE3F56C2F01297F2DA |
SHA1: | B44DEFD6FC45DEC2B78A737338252E5D3A6F6AF6 |
SHA-256: | 285566E938AA29AA79B3F4091E00241C9B727C087F845782A062290D6D433556 |
SHA-512: | 3E7ECF91C321C5DAFD2B794BEBC994D5B1128D227C48482B68EF5AFF3094C32339FBBD20DE788AAE9DED3C15655CFC3BF989FC8BF23770DA8831376ABE5B48AD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.998024929852032 |
Encrypted: | true |
SSDEEP: | 1536:uBOWz+HX19EjSTAq3O0PYu1O1UbwtxGSFI07qip9c4nX7x68GPEp+BAt:uBjy9G8Aq+4Yu1O1UEtxGSFIu/EPLAt |
MD5: | 76D4FF100C071819B2DE04CEAB6750DE |
SHA1: | 937989AF928F319B5A4A7D40A0A16489524856CC |
SHA-256: | 0F27EE47C58241BC7C6D5A1B2F7F1FE731236470F01E09CF2BD92368DD4A25FF |
SHA-512: | 1D14FC8C5C759781377011FA6B91FA835DA529FB967B55A6621847B2D8434D8233CFAF771CC304FED4D14CBFE05F1C8505B082E7326E7725DE21DAE642358133 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 7.997941219659233 |
Encrypted: | true |
SSDEEP: | 1536:uneKSn9qjv0EsYW80dqjgcX4bzuMu4YLzkkr3+ZC2h1QLraxGH2EB:uNSSvRs38hmSDdzkkrI1+axGWe |
MD5: | A066F57F4D5CAE1EA0B806C0E1587133 |
SHA1: | A4905E6345D73086429135F327A3C77F52090F90 |
SHA-256: | 7B43310D8618C20E573DF349732318096A3CE767E961291063885B1FCD46F09A |
SHA-512: | 618478494C12809418207ABAE29159CB7D1128EB08D708F9DCB5DEDE933D4CA6AD488179E253DBAEDB4E3B51DDEF43ECAA82470BDAED53983D51165163501BF2 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2784 |
Entropy (8bit): | 5.456016014097095 |
Encrypted: | false |
SSDEEP: | 48:A9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+MAyKnFH5:cSEA5O5W+MfH5S1CqlVJcI6ml5 |
MD5: | 0BB664EEFFB2A88D13658DA64847AFEF |
SHA1: | DF934CA820F5A29682259241CE704C8711B174FE |
SHA-256: | 2A00E6652DD2C4B5BE810FC60BE8DA1D6A75443C98387FF9A23C42FB7013E894 |
SHA-512: | EF6194A216815F9554B58F019897DF8F6068616B5AB5873DD6E7482445D68E68DA5AA4EEED9EE3C649AA61891AFA1B7BCF9903603D3843C64BD62286C597B4FD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 80896 |
Entropy (8bit): | 7.997712148076008 |
Encrypted: | true |
SSDEEP: | 1536:ChYwoz3JBCfmLj6irSrB5y67uj5aszsRYZmBgxepzeq/jEyln2gjGwl7RNiyU:eYww3JBmmLjlrSrf7W53JoBgkleqbEMA |
MD5: | 5EA3B8B3C56EE7D1351B01CB894D37FB |
SHA1: | CDFB9E72F0463FD5110F20C2E3D68C2CE1979C6C |
SHA-256: | 31EF6BDDE2159CF40BA21DC10C0A24918FC2A93808343FB2B55679558477718F |
SHA-512: | AB83F5AB0EF9E6ABCAA7A29400B6D2E75D92771191F5B8A4AE107EFB6F1E891F6A9565C2FE0C684073AA9A10EB6802067811D4BB90109357DCBA6800BA00BB37 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 102400 |
Entropy (8bit): | 6.403516475628563 |
Encrypted: | false |
SSDEEP: | 3072:WfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfF:WfhnvO5bLezWWt/Dd314V14ZgP0w |
MD5: | 51A069ED9281718F826D41478B0A7549 |
SHA1: | 70B6E51126DC21BEDF646FC640DD623C88BDC431 |
SHA-256: | 1FE97DF39FAA189EC1B9106E2745590ADC28B4D53A69E1DCF52D163913114877 |
SHA-512: | FD2A5353F8CBE0432FC6840C568828FD4F21A6AA3C981311AD9034B5B542BDDC73E32B117B952AD66868DCBA0EB5FDBBD7ED33B97F0B19EC444E4AB977F8A544 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58531 |
Entropy (8bit): | 7.996297027203052 |
Encrypted: | true |
SSDEEP: | 1536:4hRRNQUI7rdU1UDl5nD9glLCxGsASWrTy:4hRDwxsilJD9gFCxGsPf |
MD5: | FEC8E7AB6AAD11105BF0C6CFD0303849 |
SHA1: | F497AF8EF0F220F5A88DCE5871C8AE072782E8DE |
SHA-256: | 97992CC1EBB37AE53971AD56E234E8157CCA8D93C69497747C9FB77EAAE8E050 |
SHA-512: | F2CBB554BF6C4F371A894A4CFE27584B6E6D8C7FC052FE9A912E9482BA5CB4C9986F12DFA815153175E187575225A91FD1AAAADF882D549C68C55FCAAA61FEB8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 91136 |
Entropy (8bit): | 7.997765180053721 |
Encrypted: | true |
SSDEEP: | 1536:BWTUkNhPcMSPVpVeJN4oR7q8UODkTYRMJn6/ju9xPR3jrwK35t4E:BWTxNhPcMStXeJhq8VkTh6YxJ33wsbz |
MD5: | 6DC907CAD908B929CA1F16C09ECCC57B |
SHA1: | 89C98295B3CAF422021B966D3F0DF18E83CA70F5 |
SHA-256: | FDEECBF6166F5CEFF982C7A4131589CA3AF7F71F8B5C4F4BABFAA53B973D9EDF |
SHA-512: | 153351CF07D1622BE5182E6AF4F45D7C1CD28121CD2034677A7358EAE5B52F5B47A4AB82F1464923BAE6716EAA5C2F91703D97E79D117E6006374FF3791C83AE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 103424 |
Entropy (8bit): | 5.875802200515394 |
Encrypted: | false |
SSDEEP: | 1536:J6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwusPt:Jq8QLeAg0Fuz08XvBNbjaAtsPt |
MD5: | 278722175E3D420CB44282477C2811E9 |
SHA1: | F7246A2B43DC80493BC9C2E27DBB0794CACE09C8 |
SHA-256: | D56EE71B68B9DA84BEE2D64A83F0D3C1DD80B8E27D9BCC240F068DFBB24425E2 |
SHA-512: | 75A30B2349F72209E3DE32E8C66A28000AF53319ADFEB14092691ECC79B6DA2C0E68D8A65762E93ED5032D790BC5F4CE04E15FB225BA4B169CCED0470A3073D4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 97280 |
Entropy (8bit): | 6.676869777709325 |
Encrypted: | false |
SSDEEP: | 1536:ixv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOSpZ+Sh+I+FrbY:g5mjccBiqXvpgF4qv+32eOyKODOSpQSB |
MD5: | BF83026F801F9FF754FC88D937CA1E08 |
SHA1: | 995F512E1452D7B1B8BF6ACC1CAD4A97E5D67138 |
SHA-256: | 4CB81DBC3C21BC612B3E70BBCC515E4B99F7A82B8C39FBEC2315D430B30FA53C |
SHA-512: | EB3FB93CA0982F0B2DBC70694FE0AB0C151D67C3C58025951593384CC020EB7006FAEF99EF8F5344A9A0A74698F5C332F34826180F223B77782912263B4459C0 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 132096 |
Entropy (8bit): | 6.377855016772332 |
Encrypted: | false |
SSDEEP: | 3072:/g5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWfr:45vPeDkjGgQaE/loUDtfr |
MD5: | 61DFE44D20EEEA4E73F494D30A371F8F |
SHA1: | 6BD26783B24F1A4E1813F5C1B1D5EE3D215C39DA |
SHA-256: | E7EDE2194B1C1C501A5D61F2365E42E8A9F186B036A639163165BF6737CD73B1 |
SHA-512: | 211E140A4D9064F6011C346BDD016DE7D38A823457029E0A13ECD8989C09A4C81509A7ADCFDA1B05553B04C9D186C2000C691B566D21E5AE3C452CBBE3641F29 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60796 |
Entropy (8bit): | 6.7963392656053925 |
Encrypted: | false |
SSDEEP: | 1536:Wo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:WNoGmROL7F1G7ho2kOb |
MD5: | 6DFF01D20DAC1DF6B76115A500A13A94 |
SHA1: | 71BC9419B18568112D2CB9EB6A85E017850C2391 |
SHA-256: | 7E530D5163218B0CA02450150218A0F24C6F8179DFBD31B58121604115AD8362 |
SHA-512: | F3F75F8D251724381D526373BBA5F716A4C9F57593F825BFB40444FAE25CA2E2E3F27ED1E07ABCEDE3E03F0C3428A0905073B0E67C56376764A1A44753748909 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup-Latest.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14822 |
Entropy (8bit): | 5.178112333023097 |
Encrypted: | false |
SSDEEP: | 384:dwaVOOqcLlU/xHZdwb5029PJK5e3KkTg5o5YILnweV4SknBO:diOq0lGPS02BJEe3KjaweknI |
MD5: | 7E4CF5266498C16090BA55F200F39973 |
SHA1: | 76D6CFA9C48D5EC5DC2410A61DFFF30343434390 |
SHA-256: | F9DFFD2A81287E0C2CB1BB77F33E7000BFD875F6ADC796EE9E1BFBC6B6B9F083 |
SHA-512: | 3AE8D7F61B9D28832B44B41A9F7D6C82C75B32AB745D93953C8E1CBE1E4DA2DEC4928CB958D09C79B1B41788F023AD12FC554D34E6DE3310A6F480BB6F8C167C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\expand.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14822 |
Entropy (8bit): | 5.178112333023097 |
Encrypted: | false |
SSDEEP: | 384:dwaVOOqcLlU/xHZdwb5029PJK5e3KkTg5o5YILnweV4SknBO:diOq0lGPS02BJEe3KjaweknI |
MD5: | 7E4CF5266498C16090BA55F200F39973 |
SHA1: | 76D6CFA9C48D5EC5DC2410A61DFFF30343434390 |
SHA-256: | F9DFFD2A81287E0C2CB1BB77F33E7000BFD875F6ADC796EE9E1BFBC6B6B9F083 |
SHA-512: | 3AE8D7F61B9D28832B44B41A9F7D6C82C75B32AB745D93953C8E1CBE1E4DA2DEC4928CB958D09C79B1B41788F023AD12FC554D34E6DE3310A6F480BB6F8C167C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\expand.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 167 |
Entropy (8bit): | 4.808946640512676 |
Encrypted: | false |
SSDEEP: | 3:RGXKRjN3MZ9aSLKLbzXDD9jmKXVM8/FAJoDYTzMKpVteSMsIVOqSRIVbUbFHgzK+:zx3MmSLQHtBXVNsTTISM7vSRoIAzKs7 |
MD5: | A14C8E1DDDC9FD927A50CFF2435A7799 |
SHA1: | 47F4AC00DBF7563A2D025AA9D72E5BDEDCBDC3DC |
SHA-256: | 247A99FF374C62520693BA4CF08F35E1862ACF8E5D61055513A3C4F9F7B77454 |
SHA-512: | 94FC2D645CD89A43D86B368B64BCD1FB13C412137F8AAF300833EC7FC678EE71C0B29866D392D11332E9DD75593B7AA816C073D3AEEA1985E813B0FCDEB2F065 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.718085500786066 |
TrID: |
|
File name: | Setup-Latest.exe |
File size: | 1'444'885 bytes |
MD5: | d905d14928e2766285ed7ca83eaaf4b3 |
SHA1: | 5d27b2c538c81f7819f7de1071c28ecd03c5bd2e |
SHA256: | 721f6073f9ec13d9a1b7cff7b7cfab342ec6fd5ebc1a95c006ae11198e8abfc9 |
SHA512: | 88862cdfde9a0bbedad8f16c0387ac305802434daf55e813614d33383edca078fea89f65ceea0f79d60582739807f8a23ce7f7f2083f56e7bed191305dea7619 |
SSDEEP: | 24576:oGXt9+6qjfYMk9qXo1UPDPdDoIKgweD1F4h/ym4iB5ePtH4M/d8rOn21:ZXt9+nfUsSs1oIK+7Kv5e1D/6rO21 |
TLSH: | C76502D3ED8066E5FCBA0539E4370C650667BC278AD91E1F61C4B62918B30535A3FE2B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...z...B...8..... |
Icon Hash: | 70f8f4cca4f0b090 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F968863F74Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F968863F42Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F968863F41Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F968863CD1Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F968863F0F1h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F968863CDA3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F968863CD1Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x59bf0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x59bf0 | 0x59c00 | acd5443f264e726442ae2af07f8bdb5a | False | 0.6048158948467967 | data | 6.306430627767441 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x15a000 | 0xfd6 | 0x1000 | fa4a4c5c82d91034c29d65a3dc8522da | False | 0.1904296875 | data | 2.4330952769333423 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1001f0 | 0x44028 | Device independent bitmap graphic, 256 x 512 x 32, image size 278528 | English | United States | 0.5892313546423136 |
RT_ICON | 0x144218 | 0x11028 | Device independent bitmap graphic, 128 x 256 x 32, image size 69632 | English | United States | 0.6515816970949593 |
RT_ICON | 0x155240 | 0x4428 | Device independent bitmap graphic, 64 x 128 x 32, image size 17408 | English | United States | 0.6806510774873911 |
RT_DIALOG | 0x159668 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x159768 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x159888 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x1598e8 | 0x30 | data | English | United States | 0.8541666666666666 |
RT_MANIFEST | 0x159918 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-14T16:55:55.172476+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:55.683804+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:55.683804+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:56.196791+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:56.847472+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:57.459844+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:58.812520+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:55:59.322762+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:00.447277+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:01.763539+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:03.118342+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:05.414362+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-02-14T16:56:05.960131+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 14, 2025 16:55:54.685514927 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:54.685540915 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:54.685604095 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:54.689055920 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:54.689066887 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.172368050 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.172476053 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.175980091 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.175986052 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.176805019 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.220818996 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.220838070 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.221067905 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.683769941 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.683877945 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.683947086 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.690654993 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.690673113 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.693859100 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.693914890 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:55.693995953 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.694904089 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:55.694919109 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.196563005 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.196790934 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.197979927 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.198009968 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.198867083 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.200859070 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.200859070 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.200987101 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.847533941 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.847651005 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.847723961 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.847748995 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.847784042 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.847851038 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.847898006 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.847907066 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.848038912 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.848088980 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.848094940 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.848200083 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.848253965 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.848259926 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.848292112 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.848298073 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.848439932 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.848483086 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.848489046 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.897631884 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.897735119 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.897787094 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.897813082 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.897866964 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.897872925 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.898034096 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.898092031 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.898600101 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.898622990 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.898637056 CET | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.898643970 CET | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.959539890 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.959583044 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:56.959688902 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.960014105 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:56.960027933 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:57.459749937 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:57.459844112 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:57.461055040 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:57.461067915 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:57.461407900 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:57.462858915 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:57.463001966 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:57.463036060 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:57.463090897 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:57.463097095 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:58.812232018 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:58.812352896 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:58.812406063 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:58.812511921 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:58.812525988 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:58.832370043 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:58.832422018 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:58.832534075 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:58.832864046 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:58.832882881 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.322674990 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.322762012 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.323858023 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.323878050 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.324253082 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.325524092 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.325793028 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.325833082 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.898119926 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.898355007 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.898411036 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.898473978 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.898497105 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.984483957 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.984539032 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:55:59.984621048 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.984903097 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:55:59.984914064 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:00.447176933 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:00.447277069 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:00.448467016 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:00.448477983 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:00.448976040 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:00.452361107 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:00.452565908 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:00.452595949 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:00.452661037 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:00.452671051 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.199923992 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.200175047 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.200253010 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.200339079 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.200359106 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.270073891 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.270137072 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.270230055 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.270509958 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.270540953 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.763402939 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.763539076 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.764940977 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.764970064 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.765312910 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:01.766524076 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.766653061 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:01.766675949 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:02.396785021 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:02.396897078 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:02.396950006 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:02.397088051 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:02.397110939 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:02.631853104 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:02.631925106 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:02.632035971 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:02.632365942 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:02.632400036 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.118221998 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.118341923 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.119508028 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.119539022 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.119873047 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.120810032 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.121350050 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.121397972 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.121515036 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.121557951 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.121676922 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.121834993 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.121978998 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122020006 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.122183084 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122225046 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.122395039 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122432947 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.122452021 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122481108 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.122627974 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122673035 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.122711897 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122734070 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.122821093 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122864962 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.122921944 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.122941971 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:03.123034000 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.123107910 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.123145103 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:03.131129980 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:04.918935061 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:04.919050932 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:04.919239998 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:04.919488907 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:04.919533014 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:04.922645092 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:04.922689915 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:04.922779083 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:04.923212051 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:04.923223019 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.414225101 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.414361954 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:05.415713072 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:05.415724039 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.416613102 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.417987108 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:05.418010950 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:05.418135881 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.960134029 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.960257053 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.960434914 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:05.960539103 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:05.960561991 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Feb 14, 2025 16:56:05.960580111 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Feb 14, 2025 16:56:05.960587025 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 14, 2025 16:55:21.955965996 CET | 57130 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 14, 2025 16:55:21.963825941 CET | 53 | 57130 | 1.1.1.1 | 192.168.2.4 |
Feb 14, 2025 16:55:54.656527996 CET | 51185 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 14, 2025 16:55:54.680768967 CET | 53 | 51185 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 14, 2025 16:55:21.955965996 CET | 192.168.2.4 | 1.1.1.1 | 0x6d9e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 14, 2025 16:55:54.656527996 CET | 192.168.2.4 | 1.1.1.1 | 0xf895 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 14, 2025 16:55:21.963825941 CET | 1.1.1.1 | 192.168.2.4 | 0x6d9e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Feb 14, 2025 16:55:54.680768967 CET | 1.1.1.1 | 192.168.2.4 | 0xf895 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2025 16:55:54.680768967 CET | 1.1.1.1 | 192.168.2.4 | 0xf895 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:55:55 UTC | 262 | OUT | |
2025-02-14 15:55:55 UTC | 8 | OUT | |
2025-02-14 15:55:55 UTC | 1120 | IN | |
2025-02-14 15:55:55 UTC | 7 | IN | |
2025-02-14 15:55:55 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:55:56 UTC | 263 | OUT | |
2025-02-14 15:55:56 UTC | 46 | OUT | |
2025-02-14 15:55:56 UTC | 1122 | IN | |
2025-02-14 15:55:56 UTC | 247 | IN | |
2025-02-14 15:55:56 UTC | 1369 | IN | |
2025-02-14 15:55:56 UTC | 1369 | IN | |
2025-02-14 15:55:56 UTC | 1369 | IN | |
2025-02-14 15:55:56 UTC | 1369 | IN | |
2025-02-14 15:55:56 UTC | 1369 | IN | |
2025-02-14 15:55:56 UTC | 251 | IN | |
2025-02-14 15:55:56 UTC | 1369 | IN | |
2025-02-14 15:55:56 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:55:57 UTC | 281 | OUT | |
2025-02-14 15:55:57 UTC | 15331 | OUT | |
2025-02-14 15:55:57 UTC | 2832 | OUT | |
2025-02-14 15:55:58 UTC | 1121 | IN | |
2025-02-14 15:55:58 UTC | 20 | IN | |
2025-02-14 15:55:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:55:59 UTC | 278 | OUT | |
2025-02-14 15:55:59 UTC | 8772 | OUT | |
2025-02-14 15:55:59 UTC | 1130 | IN | |
2025-02-14 15:55:59 UTC | 20 | IN | |
2025-02-14 15:55:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:56:00 UTC | 271 | OUT | |
2025-02-14 15:56:00 UTC | 15331 | OUT | |
2025-02-14 15:56:00 UTC | 5046 | OUT | |
2025-02-14 15:56:01 UTC | 1123 | IN | |
2025-02-14 15:56:01 UTC | 20 | IN | |
2025-02-14 15:56:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:56:01 UTC | 273 | OUT | |
2025-02-14 15:56:01 UTC | 2617 | OUT | |
2025-02-14 15:56:02 UTC | 1127 | IN | |
2025-02-14 15:56:02 UTC | 20 | IN | |
2025-02-14 15:56:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49743 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:56:03 UTC | 277 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:03 UTC | 15331 | OUT | |
2025-02-14 15:56:04 UTC | 1128 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | 7884 | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-14 15:56:05 UTC | 263 | OUT | |
2025-02-14 15:56:05 UTC | 80 | OUT | |
2025-02-14 15:56:05 UTC | 1122 | IN | |
2025-02-14 15:56:05 UTC | 54 | IN | |
2025-02-14 15:56:05 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:55:16 |
Start date: | 14/02/2025 |
Path: | C:\Users\user\Desktop\Setup-Latest.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'444'885 bytes |
MD5 hash: | D905D14928E2766285ED7CA83EAAF4B3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:55:16 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:55:16 |
Start date: | 14/02/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:55:16 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\expand.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x430000 |
File size: | 53'248 bytes |
MD5 hash: | 544B0DBFF3F393BCE8BB9D815F532D51 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 4 |
Start time: | 10:55:18 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x50000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:55:18 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x300000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 10:55:18 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x50000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 10:55:18 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x300000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 10:55:19 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 10:55:19 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9c0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 10:55:20 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x300000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 10:55:20 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 10:55:20 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 10:55:20 |
Start date: | 14/02/2025 |
Path: | C:\Users\user\AppData\Local\Temp\562639\Wages.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8b0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 10:55:21 |
Start date: | 14/02/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3c0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 28 |