Windows
Analysis Report
Cb523jmji0.exe
Overview
General Information
Sample name: | Cb523jmji0.exerenamed because original name is a hash value |
Original sample name: | 3babce4f85902c7bcfde22e222508c4e.exe |
Analysis ID: | 1629799 |
MD5: | 3babce4f85902c7bcfde22e222508c4e |
SHA1: | 4898ae5c075322b47ab2f512b5463ee6116d98f7 |
SHA256: | 06b678b55cb81e6999b25903def2ac02336dc6c9ff3cd6afdaafffd55e2e5302 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 60 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Uses the Telegram API (likely for C&C communication)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
Cb523jmji0.exe (PID: 7612 cmdline:
"C:\Users\ user\Deskt op\Cb523jm ji0.exe" MD5: 3BABCE4F85902C7BCFDE22E222508C4E) conhost.exe (PID: 7620 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Code function: | 0_2_00007FF6703BEAC0 | |
Source: | Code function: | 0_2_00007FF6703BEC80 | |
Source: | Code function: | 0_2_00007FF6703E7410 | |
Source: | Code function: | 0_2_00007FF6703ED4F0 | |
Source: | Code function: | 0_2_00007FF6703BF8D0 | |
Source: | Code function: | 0_2_00007FF6703EFE00 | |
Source: | Code function: | 0_2_00007FF6703E6AD0 | |
Source: | Code function: | 0_2_00007FF6703EEDB0 | |
Source: | Code function: | 0_2_00007FF6703EEE30 | |
Source: | Code function: | 0_2_00007FF6703EEEC0 | |
Source: | Code function: | 0_2_00007FF6703ECEE0 | |
Source: | Code function: | 0_2_00007FF6703E6EF0 | |
Source: | Code function: | 0_2_00007FF6703ECF60 | |
Source: | Code function: | 0_2_00007FF6703ECF70 |
Source: | Code function: | 0_2_00007FF6703A1060 | |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00007FF6703D46A0 |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Networking |
---|
Source: | DNS query: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00007FF6703DFDB0 |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00007FF6703ED4F0 |
Source: | Code function: | 0_2_00007FF670391322 | |
Source: | Code function: | 0_2_00007FF6703DF8E0 | |
Source: | Code function: | 0_2_00007FF6703ABA50 | |
Source: | Code function: | 0_2_00007FF6703A4A70 | |
Source: | Code function: | 0_2_00007FF670398B60 | |
Source: | Code function: | 0_2_00007FF6704111A0 | |
Source: | Code function: | 0_2_00007FF670413208 | |
Source: | Code function: | 0_2_00007FF67040F378 | |
Source: | Code function: | 0_2_00007FF670427398 | |
Source: | Code function: | 0_2_00007FF6703A5510 | |
Source: | Code function: | 0_2_00007FF6704194D8 | |
Source: | Code function: | 0_2_00007FF6703ED4F0 | |
Source: | Code function: | 0_2_00007FF6704116A8 | |
Source: | Code function: | 0_2_00007FF6703ED760 | |
Source: | Code function: | 0_2_00007FF6703C19C0 | |
Source: | Code function: | 0_2_00007FF670399A90 | |
Source: | Code function: | 0_2_00007FF67041DA70 | |
Source: | Code function: | 0_2_00007FF6703EFD90 | |
Source: | Code function: | 0_2_00007FF670397E01 | |
Source: | Code function: | 0_2_00007FF6703EFE00 | |
Source: | Code function: | 0_2_00007FF6703B3E60 | |
Source: | Code function: | 0_2_00007FF670415EDA | |
Source: | Code function: | 0_2_00007FF6703F9F40 | |
Source: | Code function: | 0_2_00007FF6703D00B0 | |
Source: | Code function: | 0_2_00007FF6703F63D1 | |
Source: | Code function: | 0_2_00007FF6703AE4B0 | |
Source: | Code function: | 0_2_00007FF67042249C | |
Source: | Code function: | 0_2_00007FF6703D8500 | |
Source: | Code function: | 0_2_00007FF67041A514 | |
Source: | Code function: | 0_2_00007FF670418574 | |
Source: | Code function: | 0_2_00007FF67041C77C | |
Source: | Code function: | 0_2_00007FF670410754 | |
Source: | Code function: | 0_2_00007FF6703E07C0 | |
Source: | Code function: | 0_2_00007FF6703AE8B0 | |
Source: | Code function: | 0_2_00007FF6703B68B0 | |
Source: | Code function: | 0_2_00007FF670422930 | |
Source: | Code function: | 0_2_00007FF6703A68C0 | |
Source: | Code function: | 0_2_00007FF67040C8F4 | |
Source: | Code function: | 0_2_00007FF670410958 | |
Source: | Code function: | 0_2_00007FF6703FE9D0 | |
Source: | Code function: | 0_2_00007FF6703C2AF0 | |
Source: | Code function: | 0_2_00007FF670412B48 | |
Source: | Code function: | 0_2_00007FF670410B5C | |
Source: | Code function: | 0_2_00007FF6703FCC00 | |
Source: | Code function: | 0_2_00007FF67040ED30 | |
Source: | Code function: | 0_2_00007FF67040CE00 | |
Source: | Code function: | 0_2_00007FF670424E8C | |
Source: | Code function: | 0_2_00007FF6703BAEB0 | |
Source: | Code function: | 0_2_00007FF670422FB0 | |
Source: | Code function: | 0_2_00007FF67042D00C | |
Source: | Code function: | 0_2_00007FF6703B1040 | |
Source: | Code function: | 0_2_00007FF6703F5060 | |
Source: | Code function: | 0_2_00007FF6703FD130 | |
Source: | Code function: | 0_2_00007FF67042711C |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF6703AB860 |
Source: | Code function: | 0_2_00007FF6703BC565 | |
Source: | Code function: | 0_2_00007FF6703CCBE1 | |
Source: | Code function: | 0_2_00007FF6703CCBE9 | |
Source: | Code function: | 0_2_00007FF6703BCC8D | |
Source: | Code function: | 0_2_00007FF6703BCD25 |
Source: | Decision node followed by non-executed suspicious API: | graph_0-70290 |
Source: | Evasive API call chain: | graph_0-69767 |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00007FF6704016C0 |
Source: | Code function: | 0_2_00007FF6703AB860 |
Source: | Code function: | 0_2_00007FF6704016C0 | |
Source: | Code function: | 0_2_00007FF670401864 | |
Source: | Code function: | 0_2_00007FF6704068A8 | |
Source: | Code function: | 0_2_00007FF670400A50 |
Source: | Code function: | 0_2_00007FF67042B450 | |
Source: | Code function: | 0_2_00007FF67042B7AC | |
Source: | Code function: | 0_2_00007FF67042B87C | |
Source: | Code function: | 0_2_00007FF67042BCB4 | |
Source: | Code function: | 0_2_00007FF67042BE98 | |
Source: | Code function: | 0_2_00007FF6704207F0 | |
Source: | Code function: | 0_2_00007FF670420D88 |
Source: | Code function: | 0_2_00007FF6704015B0 |
Source: | Code function: | 0_2_00007FF670427398 |
Source: | Code function: | 0_2_00007FF6703BE0E0 | |
Source: | Code function: | 0_2_00007FF6703DF2C0 | |
Source: | Code function: | 0_2_00007FF6703D00B0 | |
Source: | Code function: | 0_2_00007FF6703C4859 | |
Source: | Code function: | 0_2_00007FF6703C4AD0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 2 System Time Discovery | 1 Exploitation of Remote Services | 12 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | 1 Data Encrypted for Impact |
Credentials | Domains | Default Accounts | 2 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 22 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | 2 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
65% | Virustotal | Browse | ||
55% | ReversingLabs | Win64.Trojan.Amadey | ||
100% | Avira | TR/Dldr.Agent.tizjt |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.telegram.org | 149.154.167.220 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1629799 |
Start date and time: | 2025-03-05 08:05:35 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Cb523jmji0.exerenamed because original name is a hash value |
Original Sample Name: | 3babce4f85902c7bcfde22e222508c4e.exe |
Detection: | MAL |
Classification: | mal60.troj.winEXE@2/0@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
- Not all processes where analyzed, report is missing behavior information
⊘No simulations
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.220 | Get hash | malicious | HTMLPhisher | Browse | ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Amadey, LummaC Stealer, PureLog Stealer | Browse | |||
Get hash | malicious | GuLoader, Snake Keylogger | Browse | |||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.telegram.org | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bd0bf25947d4a37404f0424edf4db9ad | Get hash | malicious | DCRat | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.4280736982462265 |
TrID: |
|
File name: | Cb523jmji0.exe |
File size: | 931'328 bytes |
MD5: | 3babce4f85902c7bcfde22e222508c4e |
SHA1: | 4898ae5c075322b47ab2f512b5463ee6116d98f7 |
SHA256: | 06b678b55cb81e6999b25903def2ac02336dc6c9ff3cd6afdaafffd55e2e5302 |
SHA512: | f8687729c8931579f8120f6451f669726f115123c10a7c5ce6d9a24746940153efcf7e33b719e8f543f9b4316db485633272943f462bf948b4044f234795d629 |
SSDEEP: | 24576:9lBq4/QlK9/CqNzb5lgV6tZVPKilGRl1D:9lBj/V6QtGily |
TLSH: | BD157B5A63E828E5D1779138C7775383D7B6B8161320D6DF02E086663F276E27E3A390 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m...m...m...&...a...&.......&...q...|E@.j...|E..g...|E......|E..8...&...|...m.......t...n...t........E..l....EB.l...m.*.l.. |
Icon Hash: | 0d35784d5b5b4531 |
Entrypoint: | 0x1400709c0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67C42E75 [Sun Mar 2 10:09:57 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | cfca4a34c112c1814d56edc0be75de3a |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FDFB8D760ACh |
dec eax |
add esp, 28h |
jmp 00007FDFB8D75337h |
int3 |
int3 |
dec eax |
sub esp, 28h |
dec ebp |
mov eax, dword ptr [ecx+38h] |
dec eax |
mov ecx, edx |
dec ecx |
mov edx, ecx |
call 00007FDFB8D754D2h |
mov eax, 00000001h |
dec eax |
add esp, 28h |
ret |
int3 |
int3 |
int3 |
inc eax |
push ebx |
inc ebp |
mov ebx, dword ptr [eax] |
dec eax |
mov ebx, edx |
inc ecx |
and ebx, FFFFFFF8h |
dec esp |
mov ecx, ecx |
inc ecx |
test byte ptr [eax], 00000004h |
dec esp |
mov edx, ecx |
je 00007FDFB8D754D5h |
inc ecx |
mov eax, dword ptr [eax+08h] |
dec ebp |
arpl word ptr [eax+04h], dx |
neg eax |
dec esp |
add edx, ecx |
dec eax |
arpl ax, cx |
dec esp |
and edx, ecx |
dec ecx |
arpl bx, ax |
dec edx |
mov edx, dword ptr [eax+edx] |
dec eax |
mov eax, dword ptr [ebx+10h] |
mov ecx, dword ptr [eax+08h] |
dec eax |
mov eax, dword ptr [ebx+08h] |
test byte ptr [ecx+eax+03h], 0000000Fh |
je 00007FDFB8D754CDh |
movzx eax, byte ptr [ecx+eax+03h] |
and eax, FFFFFFF0h |
dec esp |
add ecx, eax |
dec esp |
xor ecx, edx |
dec ecx |
mov ecx, ecx |
pop ebx |
jmp 00007FDFB8D75136h |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, ecx |
xor ecx, ecx |
call dword ptr [000329AFh] |
dec eax |
mov ecx, ebx |
call dword ptr [0003299Eh] |
call dword ptr [000329A8h] |
dec eax |
mov ecx, eax |
mov edx, C0000409h |
dec eax |
add esp, 20h |
pop ebx |
dec eax |
jmp dword ptr [0003299Ch] |
dec eax |
mov dword ptr [esp+00h], ecx |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcd1ac | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xdb000 | 0xb8b8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xd3000 | 0x7adc | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe7000 | 0x10a0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xc2380 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xc2580 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xc2240 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xa3000 | 0x690 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xa17f4 | 0xa1800 | e3e6ddb2bdcda0f0fc2c7d101e49b52f | False | 0.5467011537345201 | data | 6.438684552464703 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xa3000 | 0x2b588 | 0x2b600 | ed10e9b3054678cfa05248974292de25 | False | 0.4128636077089337 | data | 5.588535169555013 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xcf000 | 0x3328 | 0x1c00 | 228b18e03f2261837a64219ebbe98b80 | False | 0.17243303571428573 | data | 3.2196114885132823 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xd3000 | 0x7adc | 0x7c00 | efba14f94c2015f75219dd1bb212f61e | False | 0.48541456653225806 | data | 5.889107770612065 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xdb000 | 0xb8b8 | 0xba00 | 2b301b26248e6505006540ae4ee476c8 | False | 0.17800739247311828 | data | 3.8917886492640217 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe7000 | 0x10a0 | 0x1200 | 987e9c2e166aa7ab4284815ed94d80b3 | False | 0.4233940972222222 | data | 5.282973197899523 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xdb2b0 | 0xb13 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.8867724867724868 |
RT_ICON | 0xdbdc8 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | English | United States | 0.10341151385927505 |
RT_ICON | 0xdcc70 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | English | United States | 0.12229241877256318 |
RT_ICON | 0xdd518 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | English | United States | 0.11416184971098266 |
RT_ICON | 0xdda80 | 0xc4a | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9164017800381437 |
RT_ICON | 0xde6d0 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.03672649976381672 |
RT_ICON | 0xe28f8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.04854771784232365 |
RT_ICON | 0xe4ea0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.0698874296435272 |
RT_ICON | 0xe5f48 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.1400709219858156 |
RT_GROUP_ICON | 0xe63b0 | 0x84 | data | English | United States | 0.6590909090909091 |
RT_VERSION | 0xe6438 | 0x2fc | data | English | United States | 0.4816753926701571 |
RT_MANIFEST | 0xe6738 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, GetCurrentProcessId, SleepEx, VerSetConditionMask, VerifyVersionInfoW, CreateFileA, GetFileSizeEx, WriteConsoleW, HeapSize, DeleteFileW, GetStdHandle, GetEnvironmentVariableA, WaitForSingleObjectEx, CloseHandle, MoveFileExA, FormatMessageW, SetLastError, GetLastError, WideCharToMultiByte, MultiByteToWideChar, GetProcessHeap, Sleep, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, GetTimeZoneInformation, GetFullPathNameW, GetCurrentDirectoryW, SetEndOfFile, SetStdHandle, GetFileAttributesExW, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, HeapReAlloc, HeapFree, HeapAlloc, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, DeleteCriticalSection, InitializeCriticalSectionEx, LeaveCriticalSection, EnterCriticalSection, GetTickCount, QueryPerformanceCounter, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetConsoleWindow, SetEnvironmentVariableW, VirtualAlloc, GetConsoleOutputCP, ReadConsoleW, GetConsoleMode, GetCommandLineW, GetCommandLineA, ExitProcess, GetModuleFileNameW, RtlUnwind, WriteFile, SetFilePointerEx, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, CreateThread, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, GetFileInformationByHandle, GetDriveTypeW, CreateFileW, LoadLibraryExW, TlsFree, TlsSetValue, EncodePointer, DecodePointer, LCMapStringEx, GetStringTypeW, GetCPInfo, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, WakeAllConditionVariable, SleepConditionVariableSRW, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue |
USER32.dll | ShowWindow |
ADVAPI32.dll | CryptAcquireContextA, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt, CryptReleaseContext, CryptGetHashParam |
WS2_32.dll | getpeername, sendto, recvfrom, freeaddrinfo, ioctlsocket, gethostname, recv, listen, htonl, getsockname, connect, bind, accept, select, __WSAFDIsSet, socket, htons, WSAIoctl, setsockopt, WSACleanup, WSAStartup, WSASetLastError, ntohs, WSAGetLastError, closesocket, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent, send, getsockopt, getaddrinfo |
CRYPT32.dll | CryptStringToBinaryA, CertFreeCertificateContext, CryptDecodeObjectEx, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CertAddCertificateContextToStore, PFXImportCertStore, CertFindExtension, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFindCertificateInStore, CertFreeCertificateChain |
WLDAP32.dll | |
Normaliz.dll | IdnToUnicode, IdnToAscii |
bcrypt.dll | BCryptGenRandom |
Description | Data |
---|---|
CompanyName | Epic Games Studio |
FileDescription | Epic Game Studio Console Host |
FileVersion | 1.2.9.0 |
InternalName | Epic Studios |
LegalCopyright | Copyright (C) 2025 |
OriginalFilename | Unreal Console Host |
ProductName | UNREAL ENGINE |
ProductVersion | 1.2.6.3 |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 5, 2025 08:06:47.624560118 CET | 49709 | 443 | 192.168.2.7 | 149.154.167.220 |
Mar 5, 2025 08:06:47.624589920 CET | 443 | 49709 | 149.154.167.220 | 192.168.2.7 |
Mar 5, 2025 08:06:47.624660969 CET | 49709 | 443 | 192.168.2.7 | 149.154.167.220 |
Mar 5, 2025 08:06:47.655558109 CET | 49709 | 443 | 192.168.2.7 | 149.154.167.220 |
Mar 5, 2025 08:06:47.655575991 CET | 443 | 49709 | 149.154.167.220 | 192.168.2.7 |
Mar 5, 2025 08:06:48.296828032 CET | 443 | 49709 | 149.154.167.220 | 192.168.2.7 |
Mar 5, 2025 08:06:48.296977043 CET | 49709 | 443 | 192.168.2.7 | 149.154.167.220 |
Mar 5, 2025 08:06:48.872028112 CET | 49709 | 443 | 192.168.2.7 | 149.154.167.220 |
Mar 5, 2025 08:06:48.872051001 CET | 443 | 49709 | 149.154.167.220 | 192.168.2.7 |
Mar 5, 2025 08:06:48.872314930 CET | 443 | 49709 | 149.154.167.220 | 192.168.2.7 |
Mar 5, 2025 08:06:48.872381926 CET | 49709 | 443 | 192.168.2.7 | 149.154.167.220 |
Mar 5, 2025 08:06:48.874644041 CET | 49709 | 443 | 192.168.2.7 | 149.154.167.220 |
Mar 5, 2025 08:06:48.874656916 CET | 443 | 49709 | 149.154.167.220 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 5, 2025 08:06:47.611347914 CET | 55774 | 53 | 192.168.2.7 | 1.1.1.1 |
Mar 5, 2025 08:06:47.618541002 CET | 53 | 55774 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 5, 2025 08:06:47.611347914 CET | 192.168.2.7 | 1.1.1.1 | 0x8c53 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 5, 2025 08:06:47.618541002 CET | 1.1.1.1 | 192.168.2.7 | 0x8c53 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:06:46 |
Start date: | 05/03/2025 |
Path: | C:\Users\user\Desktop\Cb523jmji0.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff670390000 |
File size: | 931'328 bytes |
MD5 hash: | 3BABCE4F85902C7BCFDE22E222508C4E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 02:06:46 |
Start date: | 05/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |