Windows
Analysis Report
#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe
Overview
General Information
Sample name: | #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exerenamed because original name is a hash value |
Original sample name: | .exe |
Analysis ID: | 1631822 |
MD5: | b0ea3bcb6a802deb7952ee8bd7780707 |
SHA1: | 6c816f5f444e2ce559b918693cfe3ef1bed1f5fd |
SHA256: | e9919bf4c4c4420a88ae9ff7527b62047b785644a08c6a3bf9d6d9523e0d5f7e |
Tags: | exeLummaStealeruser-aachum |
Infos: | |
Detection
LummaC Stealer
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64
#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe (PID: 7572 cmdline:
"C:\Users\ user\Deskt op\#Ud835# Ude4e#Ud83 5#Ude5a#Ud 835#Ude69# Ud835#Ude6 a#Ud835#Ud e65.exe" MD5: B0EA3BCB6A802DEB7952EE8BD7780707) cmd.exe (PID: 7748 cmdline:
"C:\Window s\system32 \cmd.exe" /c expand Labeled.pn g Labeled. png.bat & Labeled.pn g.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7756 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) expand.exe (PID: 7796 cmdline:
expand Lab eled.png L abeled.png .bat MD5: 544B0DBFF3F393BCE8BB9D815F532D51) tasklist.exe (PID: 7824 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) conhost.exe (PID: 7832 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) findstr.exe (PID: 7832 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) tasklist.exe (PID: 7872 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 7880 cmdline:
findstr "b dserviceho st AvastUI AVGUI nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 7964 cmdline:
cmd /c md 362398 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) extrac32.exe (PID: 7980 cmdline:
extrac32 / Y /E Peter son.png MD5: 9472AAB6390E4F1431BAA912FCFF9707) findstr.exe (PID: 8076 cmdline:
findstr /V "loops" L ost MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 8096 cmdline:
cmd /c cop y /b 36239 8\Print.co m + Pounds + Lyrics + Msg + Bl vd + Inser ted + Comp arison + M achinery + Olympus + Isaac + W ithdrawal 362398\Pri nt.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) cmd.exe (PID: 8144 cmdline:
cmd /c cop y /b ..\Ba sed.png + ..\Facilit ies.png + ..\Christo pher.png + ..\Page.p ng + ..\Tr ailers.png + ..\Semi nars.png + ..\Sims.p ng t MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Print.com (PID: 8160 cmdline:
Print.com t MD5: 62D09F076E6E0240548C2F837536A46A) choice.exe (PID: 7268 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:24:15.371437+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49719 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:17.422345+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49720 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:19.857719+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49721 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:22.210499+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49722 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:24.421841+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49723 | 104.21.89.159 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:24:15.836285+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49719 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:17.880813+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49720 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:24.880523+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49723 | 104.21.89.159 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:24:15.836285+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49719 | 104.21.89.159 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:24:20.311677+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49721 | 104.21.89.159 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062FC |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 121 Windows Management Instrumentation | 1 Scripting | 12 Process Injection | 11 Masquerading | 11 Input Capture | 21 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | LSASS Memory | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 1 Clipboard Data | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 3 File and Directory Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
17% | Virustotal | Browse | ||
21% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
techworld2025.top | 104.21.89.159 | true | true | unknown | |
kWEfhpXkjDIXt.kWEfhpXkjDIXt | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.89.159 | techworld2025.top | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1631822 |
Start date and time: | 2025-03-07 16:22:38 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exerenamed because original name is a hash value |
Original Sample Name: | .exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@29/24@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 23.199.214.10
- Excluded domains from analysis (whitelisted): fs.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
Time | Type | Description |
---|---|---|
10:23:46 | API Interceptor |
⊘No context
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | RMSRemoteAdmin | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mimikatz | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | KnowBe4 | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\362398\Print.com | Get hash | malicious | Discord Token Stealer | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 533056 |
Entropy (8bit): | 7.999671557082228 |
Encrypted: | true |
SSDEEP: | 12288:mqL8m3R8XDUfLfKhwrdcD97/1fc53VrC+f5pfkc4s2b/76U:Am3RyD8fKi0dx4lC+B12/6U |
MD5: | 8AF5F4294345A8E68FD1B0180DFDC0E0 |
SHA1: | 3B27CDD64500F816FE50BA86F552E7527EBAA812 |
SHA-256: | EF86E9B53695E8F35D7A6CF4B0DF7B22A044773E648C54A7B49721ECCD0342E5 |
SHA-512: | F8B75888E12BA920F72EBF148E0E2C257781EF2CCADF16E01A0935B7E4DCF627B193F6422956D212839E2CCAC7044BC3289CCDD1812324FE30D3F2E450EC7A9A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 7.997666973922749 |
Encrypted: | true |
SSDEEP: | 1536:m6ApS+dcO2Sy2RrMcKihibo1A+iDNzRHS3/7RwUf6SZI/rU+h8pu/fxjQ:mHKwKt81A3RtS3FNSKMU+8k/fxQ |
MD5: | 1037C00258074196B331CF3D6490C354 |
SHA1: | 69F53F961A317866AE9AE6E113D5EAAACC1DEE38 |
SHA-256: | 9B333154A0CB2BDF40CB873CC3C6366257B56DADC3B1463F546C06F7C792B649 |
SHA-512: | AFE87D337E2ED489E8AF68E64568987940753A6DC180ECE108DEEF17D3EEA62AC5804101AF2DAF2C166F4005BA8D6B9C0F105F6456610BACD9D26556AA5CFE07 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 125952 |
Entropy (8bit): | 6.711920967813209 |
Encrypted: | false |
SSDEEP: | 3072:cydTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2u5X:c7HS3zcNPj0nEo3tb2m |
MD5: | EF34FAD32970BD4B5EEE7EC758F3E27F |
SHA1: | F88E55C04F422048FFB4A0521A036C7736DB958B |
SHA-256: | F76D8104DE05DD1964D53D1EEA0B31304C37F68FC97673A1C79C6ACF8C0258D9 |
SHA-512: | 0BA1904C06528EF8EA3145371EC62DE5D4E706DB66066CEBCFB03327DF4BCC006C5E4AEF786013978BE7CC37862CAF653CAD72627ACF6FF347A0DE0544BE4E61 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 76800 |
Entropy (8bit): | 7.997679661755175 |
Encrypted: | true |
SSDEEP: | 1536:h6FnfkLu0Bgt/g8zrykwTSpOZzFuB9Su0EwM9nyQAU6DJRs4e2t8XW:hGnyejwfkBku0EwaWN5e2tMW |
MD5: | 6C400935A419CA4224D2FF88DBA7A3BD |
SHA1: | 4E67437CCB122888C50FB32632BC421DA24CA16B |
SHA-256: | 4B56C5ED05E5066FE09A6388DA3B641ECAA0F19EB0A3BD3ED6F11360E21F6279 |
SHA-512: | BBA5503E18F1D0293E2C1AB39CFC9223C5AC7E0208C6C08CBE236B633E2B8ED570795AFEF8EDD6B755EABA216C710272CE499CA043FB4A5347D5694D54E877EB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 6.574603769452225 |
Encrypted: | false |
SSDEEP: | 1536:tqFqaynB6GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrHL/uDoiouK+ry:kqVnBypIbv18mLthfhnueoMmOqDoioOy |
MD5: | E05ACD80F981BEAA6003AF4E616EB834 |
SHA1: | FDB9E6943AF353791DCF1DD64F7359E1A887F8F1 |
SHA-256: | 3A08AAC4C83F61709DB4AF62D493B75ECEC23D0C038F1B46BF537F17285092E3 |
SHA-512: | 422794C4F475D1C9458D90EB9C791975F82D0B1673161225E50979996DA89C554DE9BC2B6CDC74C7FDF1A52AB6293D10471D146C63D6D902C2F1C10D71708597 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 93184 |
Entropy (8bit): | 7.998063301128279 |
Encrypted: | true |
SSDEEP: | 1536:twRYtyYPhLKFNuPAeTTpUy7sCVSA+ZhULD9dMUXPH+S9odorAvzaDX6Xfu4d1yDb:iOosK/8AeTxYA+MXTPH7Bcrnu4d1yZF |
MD5: | 9AAC8948398DA27B9913D7F90C2218AC |
SHA1: | A5EB3D6F32C2316EED64F3F2E2E2BE1A5AC3E1E8 |
SHA-256: | 34265BF20DF6594B3DFA606F813AEB443C037BBC99637ECD449FA793A6376C4E |
SHA-512: | EE52B393F7BEBBA5303611D63680FC60FC1A03473DEEB5CD574C5B8B8637EDB3D7343D4163F9BFCEE32BEAA9A12359BCFDAD7B986966A3C178411F66F3115C64 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61440 |
Entropy (8bit): | 6.598999314781182 |
Encrypted: | false |
SSDEEP: | 1536:RRu+OoQjz7nts/M26N7oKzYkBvRmLORuCYm9PrpmESvn+j:RVOoQ7t8T6pUkBJR8CThpmESv+j |
MD5: | 40B97293CD5EFE440AFEFFF8B568AE4E |
SHA1: | 61460A6E89A36F7E57B7F222AAFB20440F2C568C |
SHA-256: | 2D9680E4D5DCF4A3397F7CB7875304400401105A73F5339548F7F2FCA41B9A30 |
SHA-512: | E6A8D9579FA5D91C87795A6C41908A9DC0E7CC585E508A7A5C99908207556957902F90EBAC412EE8ABE73697D0FDEF3C1434377D5FF63E8715174DDD1F594A60 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 152576 |
Entropy (8bit): | 5.492115743028522 |
Encrypted: | false |
SSDEEP: | 1536:1Kaj6iTcPAsAhxjgarB/5el3EYrDWyu0uZo2+9BGmdATR:p6whxjgarB/5elDWy4ZNoGmu |
MD5: | 47679B5861746F1517BAE2EF9E4238CE |
SHA1: | B193C12B75F3BA10B41FF4BD32D3D24BCBDF56DC |
SHA-256: | F483E2EC7B3EA2DA80E323FF6708D7DD67A3C1A799132ED0445942DA05292421 |
SHA-512: | C2C815AAF39868ACF220CDFE34A61DD7B2A35996A627C74F25E3CCA0B02885122751E5195CC2AE310901E504F2DB32628ED1218326EA5E26F78DC15D8721D112 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34935 |
Entropy (8bit): | 5.087313738825535 |
Encrypted: | false |
SSDEEP: | 768:jzjDUGW05G8DVg8npS2wzjMxABDIvbzTVXXihQ69FUWgVDEUcV:EGE8Rwzjz9sU24ghM |
MD5: | A7FBFB804E74F83A02711DE41FFB6265 |
SHA1: | 22EEEDA7A692B6CC87F4CEEACCA49117B957813F |
SHA-256: | A9CCBE80A39D6707F6F64838C4F0D8F96B86FD2D36855B795BDF59D4E7D4ACA6 |
SHA-512: | 82A8C76770994308CA3E7EBE502D97C04524C7F2D4DD1843FA4C55B34EAC8C91198F6C92D44EEEF8F00A89BF5A43254BD5F85AEC2CFC1DB641EF5CB08815C212 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2572 |
Entropy (8bit): | 5.367658021500566 |
Encrypted: | false |
SSDEEP: | 48:s9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+Mh:gSEA5O5W+MfH5S1CqlVJcI6h |
MD5: | F09F95AFFD74BAA8BBD9C8EB7E22CF7D |
SHA1: | 1BA0B1E18D871BB7D26E832B7D772ED5A9DC5DB2 |
SHA-256: | 80750089F597C4DD20D5A3862D10477DF0AB87DFEB15E32109DF80AD350C3E24 |
SHA-512: | 66D6891CE5DFE5476EB4313CD379A632D5A48F7393B7E86236A402530FD5281337FBE2193C38B95B5247999D7B35F3CDC429E2CDDE5A8286BAD8D513A4F8883E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 70656 |
Entropy (8bit): | 6.66385731436992 |
Encrypted: | false |
SSDEEP: | 1536:Q/xv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvI932eOp:05mjccBiqXvpgF4qv+32eOp |
MD5: | C814BFCD2221700BADBDF74B1DCF2BE4 |
SHA1: | 9E1D9B67DDBB6D21FC857DE207279184D1C79C7D |
SHA-256: | 4DBBE56AB720CE60440980AE165DE15866A933FCD02A8D5C0135CCFA140803DD |
SHA-512: | CE2B7B1920BD37003219167E07E19EBA6216D61F42FCAF59FC1F0C6BCB866666C7E6D3282E167E479F775F2A3E64D363A7ACF7AD27D6778E4875D8C339F2F9C5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 102400 |
Entropy (8bit): | 6.245536035186267 |
Encrypted: | false |
SSDEEP: | 3072:6bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0FuL:6bLezWWt/Dd314V14ZgP0JaAOL |
MD5: | 91634DE8EF9CF9B27C6CB388D9A73B0B |
SHA1: | DB05E00AEE3F5C0BF2078882F60DBEBFF727E41B |
SHA-256: | 68D13FAC4666E6CBB46BBFB8FB0E9B1DF73F0B73CFC3B501CAC77E4174921B71 |
SHA-512: | 3DEE8B8A27B538AE2A50326F531B64D2BDAF1F631DAC1F1B4083CBF50408AE655FBDF455DF4AE709FE5F58389563C495252CE9CD48F99848DF3A678E721A25D5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 120832 |
Entropy (8bit): | 6.6861464245574185 |
Encrypted: | false |
SSDEEP: | 3072:oKODOSpQSAU4CE0Imbi80PtCZEMnVIPPBxT/sA:miS+SAhClbfSCOMVIPPL/sA |
MD5: | 14EC14B0BD1CAE1952FABF565A3F001A |
SHA1: | 544EAC5D76A7DCB6CEE53E52DA5985242C66F8FF |
SHA-256: | 8F286A5908F0707C60085BCA49A958CE3FEFAB4D9A6662BFC774D55C877BB8DE |
SHA-512: | 48AF81657B2DCF7CCCD34F93C1B8A3F26AB61996E7344D1FA66A558B2B46680E2A841404E8B4083BD1250EB776569894A7FB83EAA9C80A59BE72E665B39A767E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 5.691750229843594 |
Encrypted: | false |
SSDEEP: | 768:nSLKPDvFQC7Vkr5M4INduPbOU7aI4kCD9vmPukxhSaAwuXc/mex/1:n08QuklMBNIimuzaAwusP/ |
MD5: | 4F389DD938781155D0D90F90A86EEE5F |
SHA1: | 713EB99FEA885B848F8CA3173C1E7DD11098C529 |
SHA-256: | F6E51ACD504E0EB05524FB8ACBE39A7A0F59600D7345E8B9589650D69D7A9EEF |
SHA-512: | 7D833B769EA8C263389A5AEEF60439599153F836DEA539327C4A3ED74AAE7FA646154D6BA1DEE395AD8759BAAEB72E898BF9EC071E570A6C821D93A90243A3AE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74752 |
Entropy (8bit): | 7.997300968696696 |
Encrypted: | true |
SSDEEP: | 1536:jLLqscOS7M/5cZeAvWHtu1WqX2K9MOwJsw6EQECxNxrScgewfbfGAxy7ez8Kv:jM7MhQeqX1WqzWdqwByYswfbfG2yqzx |
MD5: | B722532B2A6A8C4A64786F1C0DCDCFDE |
SHA1: | 47FDE21CAE6FBF9700F6E40CE47AC92D9BEB6819 |
SHA-256: | 66C122975730DEADDFC2D562599D23B8444058933E518B48F0AF6157D8F38274 |
SHA-512: | 0E43D9B71678F558540C16EBA3560C33DC11918C56136E43387E7E24A5DEA9D9E94008DEFAA80F3F301624AB242042374A5EB9DD0078A4025449A7B49B89ED1D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 490770 |
Entropy (8bit): | 7.998560628614396 |
Encrypted: | true |
SSDEEP: | 12288:5XfcUcbTinuvhpc5JA7VDNaO8PJ8NNQJGv1Ix:5EUa+qiIER839M |
MD5: | 2EF40AE2C0F16D91B83273699045D110 |
SHA1: | 213349BC132AD4F7AFB2ADABB0322E98779109B9 |
SHA-256: | 0E55F5635CDE538902A164EB18150E3C6C08C2EAB86ADA716C86EF8A9BA2203B |
SHA-512: | 7F06CE611F58FA59C5BB7404224173D6056BA8194ABE06C830D81D320D12D036B250153F4CB6B5EC7B84D532350AD411C93451FBFBD6E168475B85B8BA9A6A9C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 128000 |
Entropy (8bit): | 6.353051002786251 |
Encrypted: | false |
SSDEEP: | 3072:Ag5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWfn:D5vPeDkjGgQaE/loUDtfn |
MD5: | EAC467972CC2450F08AC006773DF2F50 |
SHA1: | FB1ACD152EB816F8A21C0F66B425999FBA64468A |
SHA-256: | 053987EE2BE517F413AEA9DBA1A9573BDF40692957AF2F90FC7F94FBC35654FA |
SHA-512: | 33C2AAEAC9235B0545FC527F98FD755B6A369CDD5AB1DBA4BA5A7807ADA89253D188F441B3452A2271AC499372FD903EF1D51931DCED0D81D997D1F00D949BBE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58368 |
Entropy (8bit): | 7.997219604440567 |
Encrypted: | true |
SSDEEP: | 1536:oBsTTA+LpkFk1oWEKvnJxRXjv4UmbycOdqX:oBsTTJLpfEKvR/mbmqX |
MD5: | F05A2091CEAEC190F12846DDE74D6495 |
SHA1: | 6F5AA6E68BFEBE0A847F5E1089F9364AC0E75054 |
SHA-256: | D46BB47AADDBFDF94CDB250842C9FCFB32DEEA10274984F15DB98D82B4A02FD1 |
SHA-512: | 3C31CFBCAA2A62116FCA8F102EF39FBD843D5EC6E1B6F8E189BB1FF013151ED155F014BC55C2F56D8298BD7FDE6FC741D4ED5D4FE64E484C30BC1600E118288B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62016 |
Entropy (8bit): | 7.997103649524646 |
Encrypted: | true |
SSDEEP: | 1536:A46GszLo+uavOHUYCERFOYfRoL4KMwnDJVLAyS6WOqQ0uKwiGkf:A4VsCA2bCE3DfWk6WOJnir |
MD5: | 277F03B7561725ED3703F6D6A7A23DCD |
SHA1: | 58B20CA99B3B8A42D545B0B2709E7AECBC4056DA |
SHA-256: | FF868ED647AC63A729C7BAF3E0A784CDCEB29D49EDCB01A0106B20ECF47B83A4 |
SHA-512: | ABFD6D33A861F753782ADDE4ABCC6F43A844C4E3022BF4E6B58B6F970C8C052861CD05ED0FB470A50391D7069139602D8FC090BC84189295E11674B9689540A7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.9976403063111015 |
Encrypted: | true |
SSDEEP: | 1536:+fikESH7fVL99kevhdc62fsto9wLXp01Sk4M+GoylSKvFMIMLPt1:+qkHDZnZdc62fsto9wVmSk4MjPvGPt1 |
MD5: | A5AED6B17F31CCABFE64F5B19E4C3299 |
SHA1: | 4B4CE1DB62716AEF6480ACADE603D672E0D11D52 |
SHA-256: | C3D60D772710D9D5E7251D183973E7B875A2BECC7AF09BD9BEF2CB726FF7624B |
SHA-512: | F7B79C1898C7E9BB966752F36E82BCEBB0892524AD0A82444BD26880202E57FD746188ED26CFC92226300A83C738D29900F3B801D05A5194D99BA4D3992D5754 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 31313 |
Entropy (8bit): | 7.193270701448389 |
Encrypted: | false |
SSDEEP: | 768:IQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:IODv7xvTphAiPChgZ2kOE6 |
MD5: | A0778F012A6DA9DFFAF3C69C4733F641 |
SHA1: | 9F146C02328F52CC860E6349DB372C1007F1D261 |
SHA-256: | A5D2C3C6B0DFD5EA546FF8698CFE10C9A62C5BE89E79F62525AFEADDC2C2531D |
SHA-512: | 7987C471BB42163A6E9018B9537F00CD05F61744FCDEC127C25C9117B73D30C59AD94D0AA99BF4C95DED1790758D1C4C2A7559F77C29331441A7768B5000D1B6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\expand.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34935 |
Entropy (8bit): | 5.087313738825535 |
Encrypted: | false |
SSDEEP: | 768:jzjDUGW05G8DVg8npS2wzjMxABDIvbzTVXXihQ69FUWgVDEUcV:EGE8Rwzjz9sU24ghM |
MD5: | A7FBFB804E74F83A02711DE41FFB6265 |
SHA1: | 22EEEDA7A692B6CC87F4CEEACCA49117B957813F |
SHA-256: | A9CCBE80A39D6707F6F64838C4F0D8F96B86FD2D36855B795BDF59D4E7D4ACA6 |
SHA-512: | 82A8C76770994308CA3E7EBE502D97C04524C7F2D4DD1843FA4C55B34EAC8C91198F6C92D44EEEF8F00A89BF5A43254BD5F85AEC2CFC1DB641EF5CB08815C212 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\expand.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 176 |
Entropy (8bit): | 4.733829700187637 |
Encrypted: | false |
SSDEEP: | 3:RGXKRjN3MZ9aSLKLbzXDD9jmKXVM8/FAJoDYTzM/HbVTCVBoJxCVmWJzKkbow:zx3MmSLQHtBXVNsTaHmoPU5Ks7 |
MD5: | A559B973616C52D48046D4D9164546CA |
SHA1: | F52EE618A8741F45BC0BF7F1B1AECDAE68E64E9A |
SHA-256: | D24A448D6842136CF9B887970253B55CBA33E961AA73D9D37A1EA988BF070721 |
SHA-512: | B7C051F361BA1DA2EF5DFC438F6BA11F9DA504664B5E4392182087AD67E68E66E6FE6CA02CBE602C1DA424423E295B94B36E5F3BBB060E246251C47A2A5C6DF6 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.3332253560683744 |
TrID: |
|
File name: | #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File size: | 70'254'595 bytes |
MD5: | b0ea3bcb6a802deb7952ee8bd7780707 |
SHA1: | 6c816f5f444e2ce559b918693cfe3ef1bed1f5fd |
SHA256: | e9919bf4c4c4420a88ae9ff7527b62047b785644a08c6a3bf9d6d9523e0d5f7e |
SHA512: | 1aa8b6930cd863b8a16a958b44951562a56512df2666b83aa7216d482e7a4127df9b0679495c5cafabb22b0069030f681649f6c1a34d9020a6cabf3eac935167 |
SSDEEP: | 49152:6bAumYSb9rBPNc1fIPSlLWNKleS5Hf60u/Fs:szBs9tPNc9IKlLTle4i0u/2 |
TLSH: | B8F7233A7B7035DF7646225B2BB109A98864A5D3B3531FBD344F849A735232343F932A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8..... |
Icon Hash: | 8b6b676303939103 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007FB59161FCCBh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007FB59161F9ADh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007FB59161F99Bh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007FB59161D29Ah |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007FB59161F671h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FB59161D323h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FB59161D29Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x5e168 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x5e168 | 0x5e200 | 8053afc3a0025221de62b656b5424b78 | False | 0.9854125166002656 | data | 7.91382317420989 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x153000 | 0xf32 | 0x1000 | 3298e4489630f1350e7f1a3a92e713fe | False | 1.002685546875 | OpenPGP Secret Key | 7.916360388154981 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf41f0 | 0x59036 | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.9874793608302843 |
RT_ICON | 0x14d228 | 0x28ff | PNG image data, 72 x 72, 8-bit/color RGBA, non-interlaced | English | United States | 1.0010481181515007 |
RT_ICON | 0x14fb28 | 0x20b1 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0013143744772375 |
RT_DIALOG | 0x151be0 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x151ce0 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x151e00 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x151e60 | 0x30 | data | English | United States | 0.8958333333333334 |
RT_MANIFEST | 0x151e90 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:24:15.371437+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49719 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:15.836285+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49719 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:15.836285+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49719 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:17.422345+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49720 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:17.880813+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49720 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:19.857719+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49721 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:20.311677+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49721 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:22.210499+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49722 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:24.421841+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49723 | 104.21.89.159 | 443 | TCP |
2025-03-07T16:24:24.880523+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49723 | 104.21.89.159 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 7, 2025 16:24:13.123650074 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:13.123697996 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:13.123899937 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:13.145333052 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:13.145351887 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.371328115 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.371437073 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.374486923 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.374510050 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.374768972 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.425285101 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.425776005 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.425820112 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.425930023 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.836353064 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.836481094 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.836554050 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.836558104 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.836617947 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.836694956 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.839291096 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.839536905 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.839607000 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.840591908 CET | 49719 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.840626955 CET | 443 | 49719 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.842559099 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.842663050 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:15.842773914 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.843070984 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:15.843113899 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.422147989 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.422344923 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.423624992 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.423641920 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.423978090 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.425070047 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.425091982 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.425143957 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.880929947 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.881066084 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.881124020 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.881150961 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.883483887 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.883543015 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.883548975 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.883690119 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.883739948 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.885229111 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.885243893 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.885256052 CET | 49720 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.885262012 CET | 443 | 49720 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.975117922 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.975162983 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:17.975245953 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.975626945 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:17.975641012 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:19.857495070 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:19.857718945 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:19.859241009 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:19.859251022 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:19.859618902 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:19.860898018 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:19.861035109 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:19.861078024 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.311743975 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.319890976 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.320120096 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:20.320154905 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.325520992 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.325592041 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:20.325602055 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.325743914 CET | 443 | 49721 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.325795889 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:20.363972902 CET | 49721 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:20.548351049 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:20.548407078 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:20.548567057 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:20.548758984 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:20.548775911 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.210319996 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.210499048 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.211568117 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.211580038 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.211910009 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.213016987 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.213099003 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.213104010 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.596451044 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.596507072 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.596550941 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.596565962 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.596599102 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.596715927 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.599102020 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.599186897 CET | 443 | 49722 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.599268913 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.603516102 CET | 49722 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.610693932 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.610742092 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:22.610833883 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.611126900 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:22.611140966 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.421765089 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.421840906 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.423095942 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.423109055 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.423437119 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.425129890 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.425177097 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.425204039 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.880584955 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.880641937 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.880678892 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.880691051 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.880702972 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.880743027 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.880748034 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.880808115 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.880850077 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.881172895 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.881187916 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Mar 7, 2025 16:24:24.881198883 CET | 49723 | 443 | 192.168.2.4 | 104.21.89.159 |
Mar 7, 2025 16:24:24.881205082 CET | 443 | 49723 | 104.21.89.159 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 7, 2025 16:23:47.241779089 CET | 55634 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 7, 2025 16:23:47.250704050 CET | 53 | 55634 | 1.1.1.1 | 192.168.2.4 |
Mar 7, 2025 16:24:12.686656952 CET | 57601 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 7, 2025 16:24:13.047167063 CET | 53 | 57601 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 7, 2025 16:23:47.241779089 CET | 192.168.2.4 | 1.1.1.1 | 0x14a2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 7, 2025 16:24:12.686656952 CET | 192.168.2.4 | 1.1.1.1 | 0x61fd | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 7, 2025 16:23:47.250704050 CET | 1.1.1.1 | 192.168.2.4 | 0x14a2 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 7, 2025 16:24:13.047167063 CET | 1.1.1.1 | 192.168.2.4 | 0x61fd | No error (0) | 104.21.89.159 | A (IP address) | IN (0x0001) | false | ||
Mar 7, 2025 16:24:13.047167063 CET | 1.1.1.1 | 192.168.2.4 | 0x61fd | No error (0) | 172.67.189.153 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49719 | 104.21.89.159 | 443 | 8160 | C:\Users\user\AppData\Local\Temp\362398\Print.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-07 15:24:15 UTC | 264 | OUT | |
2025-03-07 15:24:15 UTC | 8 | OUT | |
2025-03-07 15:24:15 UTC | 200 | IN | |
2025-03-07 15:24:15 UTC | 1169 | IN | |
2025-03-07 15:24:15 UTC | 1369 | IN | |
2025-03-07 15:24:15 UTC | 1369 | IN | |
2025-03-07 15:24:15 UTC | 572 | IN | |
2025-03-07 15:24:15 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49720 | 104.21.89.159 | 443 | 8160 | C:\Users\user\AppData\Local\Temp\362398\Print.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-07 15:24:17 UTC | 362 | OUT | |
2025-03-07 15:24:17 UTC | 46 | OUT | |
2025-03-07 15:24:17 UTC | 566 | IN | |
2025-03-07 15:24:17 UTC | 803 | IN | |
2025-03-07 15:24:17 UTC | 1369 | IN | |
2025-03-07 15:24:17 UTC | 1369 | IN | |
2025-03-07 15:24:17 UTC | 1016 | IN | |
2025-03-07 15:24:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49721 | 104.21.89.159 | 443 | 8160 | C:\Users\user\AppData\Local\Temp\362398\Print.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-07 15:24:19 UTC | 374 | OUT | |
2025-03-07 15:24:19 UTC | 2543 | OUT | |
2025-03-07 15:24:20 UTC | 562 | IN | |
2025-03-07 15:24:20 UTC | 807 | IN | |
2025-03-07 15:24:20 UTC | 1369 | IN | |
2025-03-07 15:24:20 UTC | 1369 | IN | |
2025-03-07 15:24:20 UTC | 1012 | IN | |
2025-03-07 15:24:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49722 | 104.21.89.159 | 443 | 8160 | C:\Users\user\AppData\Local\Temp\362398\Print.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-07 15:24:22 UTC | 378 | OUT | |
2025-03-07 15:24:22 UTC | 1091 | OUT | |
2025-03-07 15:24:22 UTC | 560 | IN | |
2025-03-07 15:24:22 UTC | 809 | IN | |
2025-03-07 15:24:22 UTC | 1369 | IN | |
2025-03-07 15:24:22 UTC | 1369 | IN | |
2025-03-07 15:24:22 UTC | 1010 | IN | |
2025-03-07 15:24:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49723 | 104.21.89.159 | 443 | 8160 | C:\Users\user\AppData\Local\Temp\362398\Print.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-07 15:24:24 UTC | 362 | OUT | |
2025-03-07 15:24:24 UTC | 80 | OUT | |
2025-03-07 15:24:24 UTC | 564 | IN | |
2025-03-07 15:24:24 UTC | 805 | IN | |
2025-03-07 15:24:24 UTC | 1369 | IN | |
2025-03-07 15:24:24 UTC | 1369 | IN | |
2025-03-07 15:24:24 UTC | 1014 | IN | |
2025-03-07 15:24:24 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:23:37 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 70'254'595 bytes |
MD5 hash: | B0EA3BCB6A802DEB7952EE8BD7780707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:23:39 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:23:39 |
Start date: | 07/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 10:23:39 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\expand.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe90000 |
File size: | 53'248 bytes |
MD5 hash: | 544B0DBFF3F393BCE8BB9D815F532D51 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:23:42 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x750000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 10:23:42 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2b0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 10:23:43 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x750000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 10:23:43 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2b0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 10:23:44 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 10:23:44 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf30000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 14 |
Start time: | 10:23:45 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2b0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 15 |
Start time: | 10:23:45 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 16 |
Start time: | 10:23:45 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 17 |
Start time: | 10:23:45 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\AppData\Local\Temp\362398\Print.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4f0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 19 |
Start time: | 10:23:45 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2b0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 22 |
Start time: | 10:24:46 |
Start date: | 07/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1526 |
Total number of Limit Nodes: | 33 |