Windows
Analysis Report
#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe
Overview
General Information
Sample name: | #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exerenamed because original name is a hash value |
Original sample name: | .exe |
Analysis ID: | 1631838 |
MD5: | 5c4ca3e7135a0641ac01fbd73cd90ca8 |
SHA1: | 8297854dea681618bf432d5086dcd833aa416530 |
SHA256: | 4366cb256d6331d8634dff8847c2334e18baefa6b7f41ae2db3a8801a0aa9a72 |
Tags: | AutoITexeLummaStealeruser-aachum |
Infos: | |
Detection
LummaC Stealer
Score: | 96 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64
#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe (PID: 7272 cmdline:
"C:\Users\ user\Deskt op\#Ud835# Ude4e#Ud83 5#Ude5a#Ud 835#Ude69# Ud835#Ude6 a#Ud835#Ud e65.exe" MD5: 5C4CA3E7135A0641AC01FBD73CD90CA8) cmd.exe (PID: 7472 cmdline:
"C:\Window s\system32 \cmd.exe" /c expand Increases. pdf Increa ses.pdf.ba t & Increa ses.pdf.ba t MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) expand.exe (PID: 7528 cmdline:
expand Inc reases.pdf Increases .pdf.bat MD5: 544B0DBFF3F393BCE8BB9D815F532D51) tasklist.exe (PID: 7544 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 7552 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) tasklist.exe (PID: 7588 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) findstr.exe (PID: 7596 cmdline:
findstr "b dserviceho st AvastUI AVGUI nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 7632 cmdline:
cmd /c md 119035 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) extrac32.exe (PID: 7648 cmdline:
extrac32 / Y /E Leads .pdf MD5: 9472AAB6390E4F1431BAA912FCFF9707) findstr.exe (PID: 7672 cmdline:
findstr /V "Die" Pro tecting MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) cmd.exe (PID: 7688 cmdline:
cmd /c cop y /b 11903 5\Cuba.com + Handhel ds + Phase s + Merger + Conveni ent + Pick up + Den + Agent + I ntimate + Architect + Apparent + Relativ ely 119035 \Cuba.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) cmd.exe (PID: 7704 cmdline:
cmd /c cop y /b ..\Up dates.pdf + ..\Flore nce.pdf + ..\Pastor. pdf + ..\E xceptions. pdf + ..\A nthropolog y.pdf + .. \Oriented. pdf + ..\C ompletion. pdf + ..\L aunched.pd f R MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Cuba.com (PID: 7720 cmdline:
Cuba.com R MD5: 62D09F076E6E0240548C2F837536A46A) choice.exe (PID: 7736 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:28:29.760030+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49719 | 172.67.189.153 | 443 | TCP |
2025-03-07T16:28:31.730782+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49720 | 172.67.189.153 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:28:30.262474+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49719 | 172.67.189.153 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:28:30.262474+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49719 | 172.67.189.153 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062FC |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 1 Windows Management Instrumentation | 1 Scripting | 12 Process Injection | 11 Masquerading | 11 Input Capture | 1 Virtualization/Sandbox Evasion | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 3 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 File and Directory Discovery | SMB/Windows Admin Shares | 1 Clipboard Data | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 5 System Information Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
46% | Virustotal | Browse | ||
32% | ReversingLabs | |||
100% | Avira | TR/Redcap.drlyr |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
techworld2025.top | 172.67.189.153 | true | true | unknown | |
RemCXcBAgdPicYq.RemCXcBAgdPicYq | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.189.153 | techworld2025.top | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1631838 |
Start date and time: | 2025-03-07 16:26:54 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exerenamed because original name is a hash value |
Original Sample Name: | .exe |
Detection: | MAL |
Classification: | mal96.troj.evad.winEXE@28/26@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 23.199.214.10
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
10:28:29 | API Interceptor |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
techworld2025.top | Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | RMSRemoteAdmin | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mimikatz | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\119035\Cuba.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | Discord Token Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 537739 |
Entropy (8bit): | 7.999628872797117 |
Encrypted: | true |
SSDEEP: | 12288:/XgIu5NcYUPiJcq+6STgjIDt088Ox2ncHdw0Wmo:/XyOqZSx084nc9lo |
MD5: | 92428A254CD0E1F7470E5B30DCF9DBF9 |
SHA1: | 07471C83D951B04B7F55372FF51A23A0006CCC4F |
SHA-256: | 7C0AFDC0E3C2DAAFD6BDE1ED6F052704B93A3ED0AC12ECFF983E107C8FD8AE03 |
SHA-512: | 11D418669A7BC9EE9F8C73508EAD904477DF5D1B7A27D4D9D081F6A7827C883348DF814EBECA137DBDDFEC91B43F836C314C807301BD0256960D98EB2C0C61A1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 6.000138297522035 |
Encrypted: | false |
SSDEEP: | 1536:m8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwu:m8QLeAg0Fuz08XvBNbjaAt |
MD5: | 666DCC9BF42824A568C35E7A2E451856 |
SHA1: | 06E90C61F5193FA658692C387C7648854EC9F06D |
SHA-256: | 9ADDBBE5E244CE400EBD9DD21A55227EE361631E3C2DF56990401F45DB56EDDD |
SHA-512: | B608D65E35463E1F1E5C7F87565EF91597C4A2F8DC8B7CE74AD5CAEBD815E441D2B693C91EF3FD44154408408AA6463DD465ECF37EEDAC2BC9ED6A6C92670EBD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60416 |
Entropy (8bit): | 7.996787597192389 |
Encrypted: | true |
SSDEEP: | 1536:kPSi2RuJbv+w8cuwm+bY/vsNsAxsVjx8d2Mt+8pV:mSiRdvr8c3dFO8d2wV |
MD5: | 044588A61FD107657955656984EA7935 |
SHA1: | AD4BCEA1305BDE4BE2E222C911EDFCA4FC5CB308 |
SHA-256: | 1A0BE57CCC6953644E7E718F8175FB60A4BEA9EF2D669CB8D705AA2D98D79132 |
SHA-512: | B0B0F6C1FB7448E89B8D73C62FCE9E5DB0E4D374ABFCA90480292BD582F12696889890C770C6850BB8106118B60D3C25430CE12E202BBEBB09513ACD947F5CD3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55296 |
Entropy (8bit): | 6.8767364700922435 |
Encrypted: | false |
SSDEEP: | 768:ccDP8WBosd0bHazf0Tye4Ur2+9BGmd9OTGQ1Dv7sMvLHfR/B:GWyu0uZo2+9BGmdATGODv7xvTpp |
MD5: | BFF231DF2449D3B2B7C23ED321F8088D |
SHA1: | C2A30B656667F93E3EBE0D36DDC082EB561F343A |
SHA-256: | 9B9A0FFF21F113F05E8C78CFCAC60ABCFF96F8EED15E51FF61958F838A64604F |
SHA-512: | 107D7DF68A2EFF914F7A32B3EC08251E4230F9D3723B8A476ADB11C1CBEBA53A4C04E2331CCF1BC319B3165E960746BF5E84DA299E224B08F8422441267C64BB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 4.0358458225978096 |
Encrypted: | false |
SSDEEP: | 768:qAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R/OWel3EYr8x:qaj6iTcPAsAhxjgarB/5el3EYrq |
MD5: | 3D8740B76BFA0B164D5BC59C052E8FDC |
SHA1: | CCE3394A779F487A65F0FF7693C6FD690427655A |
SHA-256: | 8DE983EBF9F793E222AD69374EDA47897B40ECB89D32509D443C4BA56E2C500E |
SHA-512: | CC90E883D6DBE90160257E5EBA77B794CB70876EB1D4035B45FE2A4EC4BB89975C8A3C06829698F2FC1363FA0BDF1DCF66C9584B9C3822B93ECD0C84F0837825 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.997209004990073 |
Encrypted: | true |
SSDEEP: | 1536:wJfJ7Zfo4GF7JfmJfNiJsNUmfcGu8jMj5Fs:ufJ7y4YBmXRUl7WMjU |
MD5: | 76616493FC0238E416F720A8E9463815 |
SHA1: | 831EA8F73D4A17D2D0BEF39BF84C8218030F1ED8 |
SHA-256: | 80D26FEBACC485C6A0033495FBB2998FC897F59F8A286496DBCB1F3C07148CAD |
SHA-512: | 1CDD92A22CFB94427B1DD82C79FBF52413291699B2655F4B3B397CB140941CB34B85BB841BE9549F931F6637D809A2F1674312AC438A6521E6513FEFE32FB088 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 6.639157029810907 |
Encrypted: | false |
SSDEEP: | 3072:YImbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxS:GbfSCOMVIPPL/sZ7HS3zS |
MD5: | D162FAE653D5BEA835BD8DA2EC16B686 |
SHA1: | 61DD3B6E36D5B31A2F60CE57E868A50A4C896C0C |
SHA-256: | 22518DFFBCE492602A72ED3A44F63C56A7B69E84FB21BA1FEE0A4A2CAFFF84CC |
SHA-512: | 9754D9DAEFEEEACB7F7DE377F99B0FF7D9137FC6019E51AC520891327398DABC4468E0F5F5BF9813209D5B6C9EF723A09CFD17C91244DFE1BE4AFD7D545FC5AB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 151552 |
Entropy (8bit): | 6.514186962755082 |
Encrypted: | false |
SSDEEP: | 3072:rAqVnBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRr:xVnjphfhnvO5bLezWWt/Dd314V14ZgPl |
MD5: | 7F712915E7852D5F1A500D58AC77001D |
SHA1: | 9B36851BDF685BD8AB51B41A1B9084BB5840F3E8 |
SHA-256: | 85598CEADF3EE46335F6128C54D7900E2CA470E0EBBBC849C32FBA94C2D3E676 |
SHA-512: | D9FF37180BC423D40A38FF1FDE2C7289E6691B326E84F5EBEB52ACE69E43BC9EB69B36AFDBA130FC06DA6DF1A1E71994C51366EEB6627A68EBE3723529C2EB77 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 100352 |
Entropy (8bit): | 7.998302480287169 |
Encrypted: | true |
SSDEEP: | 3072:YOg31MlFcVG5PWBzoaYLeY5xGCbsRkKmqDxlgI:YXKFunQeYaxGqtlgI |
MD5: | 9AC91DED17531C82C76E0E0CDA7EA371 |
SHA1: | 1FBFBC2F5C6FFF1636682F09B2EBB9220A0D0708 |
SHA-256: | 6A61F1B634276E91531C404172E539660F56BAB926576CE5BF0ACCBECDCD76A8 |
SHA-512: | 39C7838522CBD3C396020D5A4EF915344CE1F48AF5381BA5FA8E06ADB6FF20543C438951625B083ADC0DCA70981A5C4901F4A6BEAB49BBC8FE381E351F2D80E3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 7.996700664672934 |
Encrypted: | true |
SSDEEP: | 1536:qRuBlyfMI+KRY18RU4li3FyQIREtS0LHQd:qcyP+KR/RUkilAoS0LH8 |
MD5: | E1690EBFBB31E9C37C34BA20391E65D8 |
SHA1: | 1EE08F166A7CE6F44AF86D82C292B9DA814CF3E4 |
SHA-256: | 39FED20F355C7226CA98F69454FA3C88827DEDAEE8E814BF199EE617EF6748F7 |
SHA-512: | 0BA62FBD662008D395805E35D069B6BFE2C29CC458E2EA776C9163DA849BFB9CE3CCEA260B47A8B849140B49EE27CC03DB25CC381416990854467FB03DA06B00 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 6.26772686782239 |
Encrypted: | false |
SSDEEP: | 1536:fAD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdlDfFgQa8BpDzdZPp7HE+t6:fg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/Lk |
MD5: | 2393F51B7C88A39DCF6932ECBC66753C |
SHA1: | 8EF30F2B3C0D8075C8E19F4EAEBBBF83A0065B4B |
SHA-256: | 72792BFE764E161E13F722173B8687E7E704C7F9A5C609ABD521545057758BA5 |
SHA-512: | 137D256EB787116B8167116571A2FC8B970647A694D2EF72C38F77E74AE0B0A1D60265E684933F1C1DE3324A2BFC1FC02646D3B8B504009CF4C207410D910C22 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11804 |
Entropy (8bit): | 5.167705642471121 |
Encrypted: | false |
SSDEEP: | 192:W9y6DHQYrQaisDZzZqCKGqUHsgSZL2gMIK+3EjFDCQVLXcLSoBJ06EEIYMKBHJ1n:WwCHQYrdDCCdmgyUIlrQMD06E1iR3hau |
MD5: | 5B022D12C808072C92D84602C71065AF |
SHA1: | 37C9B62E687333545F80EDD826235C061EFB2B7E |
SHA-256: | 910A06731E2691E663536C2B53D6CD74008E8C83400ECEA9893F8A27E79F7DEE |
SHA-512: | 04916388D799931EA3F7C04588A76B1FFBC298F5BDAD20C2A30653F03AF804BE5E29A0D0CB90F1FD85AE7473EB565E6C62A77702AF443CFF03A84B399EEC3D28 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 70656 |
Entropy (8bit): | 4.781249497623978 |
Encrypted: | false |
SSDEEP: | 384:5zc/mwftIQXoSpu88888888888888888888888888888zv888888NfU84444QnoD:Bc/mex/SGH |
MD5: | 053C0A1420E3442EB1886568BF535A37 |
SHA1: | 2E79837842AD5944299BC457B248F175CCF2706B |
SHA-256: | 8D3D5EA7F814BC6D17764837233328B6DDEEDCC723D539D6F5EE8C702CF8D652 |
SHA-512: | 796B1459DB7506E7BD98A92DFAAE798DDA8DC3CB2B44BEA09DFDA9BD6A5CC938686E381482675123723087BBA38651A2688B9F3E85622172F8171A8DFCC5690A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 49291 |
Entropy (8bit): | 7.9962409884634384 |
Encrypted: | true |
SSDEEP: | 768:2zmzcevfe0jjwiOe5MUT/4W17hc4+0uHv5+TNAd2hWhwgSV6dybT2X:DzVvfwW1ENv5ENAd2hWmZwX |
MD5: | 1EFB86E2127A36428A88C03324920DD0 |
SHA1: | DE7169DE4C0E38950BB4B4F999C2ABC7D1C25D47 |
SHA-256: | CABE4357E05B910D4F58D8E32DE9C9355DA7FBBEC2ABBF4C75FD3C28837A0216 |
SHA-512: | 03D3C412EE2DDDDB1958C9A61FA2F4A5AC316CD879ACF26335A7769516911350804BC059290FD95A58BB57142037618E9D815CDD6A9712746AD6AEF930E96C24 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 489997 |
Entropy (8bit): | 7.998624712832474 |
Encrypted: | true |
SSDEEP: | 12288:tjgYWAOESK8v4lRcSTpgJH/zqEKKb8wMLAXBweGr:hLWAOESDeRcegJfzhKKIwxe |
MD5: | CAE83B7E4A8600EA4E87516710F95FC9 |
SHA1: | 0530776BA59B6CD8C6EB7CD656537ADF60B07FD9 |
SHA-256: | BB991824A519356E99BEDEE67FE1F776BA580B7F61115D6485A7F855C8548666 |
SHA-512: | DCC7C360B7BB9AB0E0E28CE764AC1E5E4E758A9C374F088941E682DCC4FA09A3EEE826AF078A415F7A823825B5A0FB7363C10E80523012E5F7DD9B8077431357 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 104448 |
Entropy (8bit): | 6.67666988967826 |
Encrypted: | false |
SSDEEP: | 1536:PBiqXv+G/UXT6TvY464qvI932eOypvcLSDOSpZ+Sh+I+FrbCyI7P4Cxi8qb:PBiqXvpgF4qv+32eOyKODOSpQSAU4CEb |
MD5: | F3C4B7DAC0D85E0D975C094558CFC6AC |
SHA1: | 5DFAF51D3D89D8C8766C2CD0FC69F63A18B8EA2A |
SHA-256: | D763824D4038D34D4D6A30F828104E2813100901EFE3B911F02C0EC169C70EC2 |
SHA-512: | 4FF11321A57FC4A9245A66A2BC548BAA02899D6614FDB704C7FC1043EFFCE8CAF16F5F0CFB8CD61A46BBF4D9696EED4491A1CD940AD5FCF460B33DD53B70675D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 7.996775337636935 |
Encrypted: | true |
SSDEEP: | 1536:swbBtaLhWszd1QexBagAIVFZAzRkT8mIV:paLAUnQex9VZAzST8LV |
MD5: | 8253340EDFA7CC0820C132312F22373D |
SHA1: | 208996E6840C4A8F544AB2FBB2A1C200104823A9 |
SHA-256: | F5E4F123B5416FBBEFA18826D5516A929589EA75080211B2FB20CDF16D4958A5 |
SHA-512: | A6E3910F5BBF9399C7D20122452103BF6C896257524C914C15CB1E41DBFEED8811F8C20CC9D65657FD173501E86B42D44E88B8CB1D95115DCBF49A2E7D382153 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 80896 |
Entropy (8bit): | 7.997917561721419 |
Encrypted: | true |
SSDEEP: | 1536:zLr8KcKfd+Kp8UipAZ9rnGhBx08of9PWxZiInkgRoN6iLR4dZY:fWKF+Kp8bKWbo4rkjAI43Y |
MD5: | AF6CAD815DC867E726441ECA10662953 |
SHA1: | 242479CD9D5B50B8F6CDF04D8006AC9AFAFD6F58 |
SHA-256: | EE5AAAD337D8373EA88A3C51CF9B729F1FAD2AA3FAAFCC388D386335C25CEC89 |
SHA-512: | 03CD0BE0323C0CF4ED9CE71B0ED669CFBAC87E298CF7858B9FC638E4A1B807B0A373595D0CDD08D7849CBEE44CDB75357146386C059C4BBB6A75D63EA1ED6C8E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 6.657483532843025 |
Encrypted: | false |
SSDEEP: | 1536:VkvyNf7Xw2U0pkzUWBh2zGc/xv5mjKu2IwNnPS:OaW2UDQWf05mjcq |
MD5: | 2FD35C7CC9D620F0E1054787381E08E9 |
SHA1: | D37F41D8EEB64A27D7583D8DEE8CD2C3B54C9D51 |
SHA-256: | D52F124A587A435B8B913BF8E63E418A607F2C119AEBEFC3F1E430C1BC7F010C |
SHA-512: | 622B6668D9A2DC33E9FCD8EEAA41F88D1567B67893578B8C65387D370C8C2D7DDC012D5DA9463C681EC64E8E3BA30987104F544548AF4360DA9B489FA647CDB2 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 141312 |
Entropy (8bit): | 6.674401645527659 |
Encrypted: | false |
SSDEEP: | 3072:iHSBRtNPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESvG:BNPj0nEo3tb2j6AUkB0CThp6vG |
MD5: | BC82CE067085C50512B23A194FCCA069 |
SHA1: | 37BB384188A6FC39F591E332D946952258C2ACF9 |
SHA-256: | BFDE0C6E0A862A03BF5B5B0F364B369ACA11C200833A3302B181E3A48D7602AE |
SHA-512: | 90D7079124807FDB44D8B6C9008D70A4038C13377B2120F6406390DC0D7F8A1038166EE228EB32B6C79B612676137FFEE4822BA159775AA25669B9F7F798714C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2559 |
Entropy (8bit): | 5.3625058419203535 |
Encrypted: | false |
SSDEEP: | 48:f9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+MS:lSEA5O5W+MfH5S1CqlVJcI6S |
MD5: | B66A71BEA67FD3631A15D4B80CDB89C2 |
SHA1: | C0A281FF1715BC091BAB6C3A1424AE41F25E633E |
SHA-256: | FBAE82DEAB7BBB373B16A5F564DCADE0EBA80E1C63DD8A63ACA93547E8B0E63F |
SHA-512: | 6D5697BAE6B992F3B4E5ADC912185B0B04D4009875DB4C5F373DD8827A12BD1BA00DFA3A2D63A1FA53342A38A2637857EF306C76CEA987AE1F03008EF3C487A4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21084 |
Entropy (8bit): | 7.3125543652549405 |
Encrypted: | false |
SSDEEP: | 384:XHwWV8tnwmTihbn929MwO/ChZrzmZGhLdXVaeCVrVEVFJ8ZcGwGBk7/UMQ3rw:XByLiFuO/ChgZ45VatJVEV3GPkjF |
MD5: | 7E90A90B850650222B2764FC368D4055 |
SHA1: | 333D3A436ED59FB7F0F7CEE22F0E4BA7370B77E6 |
SHA-256: | AF1A664D014C740F51585F7B31FB9CFFF3C53B79E0D9BC76F619EF268408E6FB |
SHA-512: | 1B8925CA070A7A2F56521EAF6C908F0F4974629F24590595C8A414E85BDF06EF954DE924A4F33B79177503FAADBD667E0AD1157C37131133C66F9D212463BFA3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 7.9966799527795915 |
Encrypted: | true |
SSDEEP: | 1536:fuyyalTT3f/VCOgux8KAWQwgprfhYCcm/DMu64bWsbAIrfqUG:f7LFrnVdl0WTCIR4bRZrfqUG |
MD5: | BB6B99A871C3365195AEE4655C40482B |
SHA1: | 760FB6B4721478D9D703C009EC7E029EAE346560 |
SHA-256: | 2654EE50C8E177B1B25BF32ED4359AE8CD726F65F2E3EF1BECE4DC5E6A9ACA03 |
SHA-512: | 81DC161048B2955070412A054D4EF4FF20B2A62971120DD5A5FA71BCDB093EC0651DD71A7E07F7B29D985E170B0056397A03A50D4F7C238A79C86D1D81530CCC |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\expand.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11804 |
Entropy (8bit): | 5.167705642471121 |
Encrypted: | false |
SSDEEP: | 192:W9y6DHQYrQaisDZzZqCKGqUHsgSZL2gMIK+3EjFDCQVLXcLSoBJ06EEIYMKBHJ1n:WwCHQYrdDCCdmgyUIlrQMD06E1iR3hau |
MD5: | 5B022D12C808072C92D84602C71065AF |
SHA1: | 37C9B62E687333545F80EDD826235C061EFB2B7E |
SHA-256: | 910A06731E2691E663536C2B53D6CD74008E8C83400ECEA9893F8A27E79F7DEE |
SHA-512: | 04916388D799931EA3F7C04588A76B1FFBC298F5BDAD20C2A30653F03AF804BE5E29A0D0CB90F1FD85AE7473EB565E6C62A77702AF443CFF03A84B399EEC3D28 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\expand.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 182 |
Entropy (8bit): | 4.693530917321555 |
Encrypted: | false |
SSDEEP: | 3:RGXKRjN3MZ9aSLKLbzXDD9jmKXVM8/FAJoDYTzMK+DtDotwMNDm5AJkbow:zx3MmSLQHtBXVNsTN8xoqMRm5AJs7 |
MD5: | F92F29BD16B24BB03ED4B92321DB2E0F |
SHA1: | 547A3F64016AA114C18B94CD7EC7AF8CE2D9762B |
SHA-256: | 03C989BDD614C64697C1B9057983DEA4B01005C547A6A2C07AAE1F725D89DDE1 |
SHA-512: | 263D8FB3031C0A6B95134A47F1B6591D94690B371F9F6B8474885BA8BCB5852016D407102194C0BE696729C80654A03A9D2F0CCCDF1EA23B819A68AC7CFBBFA7 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.962965016948796 |
TrID: |
|
File name: | #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
File size: | 1'483'827 bytes |
MD5: | 5c4ca3e7135a0641ac01fbd73cd90ca8 |
SHA1: | 8297854dea681618bf432d5086dcd833aa416530 |
SHA256: | 4366cb256d6331d8634dff8847c2334e18baefa6b7f41ae2db3a8801a0aa9a72 |
SHA512: | f7b34cf19b55817aeb79fc079af9189d058ed89e6bd844e9fed6f703f0e7d00da99b0790a75f2068f423d12a46e8e86426fe17edfc3c638de604fda2379a7151 |
SSDEEP: | 24576:5G7u7tZv0wko/Q4UbOpMlV6tXJzyR+psawLc2ADordo71L7a5KCTOXGBTt5N8J:I7u7t6wkoIXIMlVyXI0BwLhA6dyPa5Kp |
TLSH: | B36533D99AFD5436D5D30EB20E318F210CACBC602420561F9385B99A75F3B9D89ACF6C |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8..... |
Icon Hash: | 6970f0b0f0f071b2 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F81D52FB6ABh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F81D52FB38Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F81D52FB37Bh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F81D52F8C7Ah |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F81D52FB051h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F81D52F8D03h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F81D52F8C7Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x5f050 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x5f050 | 0x5f200 | 0c5343685994638a0b534700cd0d57bd | False | 0.9613147790735874 | data | 7.845012808563989 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x154000 | 0xf32 | 0x1000 | 8802943328c95a47d5906a5c491da02c | False | 0.99853515625 | data | 7.808999300076349 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf4280 | 0x54b75 | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.9841151364421018 |
RT_ICON | 0x148df8 | 0x41a0 | PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced | English | United States | 1.0000595238095238 |
RT_ICON | 0x14cf98 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.46328315703824247 |
RT_ICON | 0x14f600 | 0x1f04 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0013853904282115 |
RT_ICON | 0x151508 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.46835154826958103 |
RT_ICON | 0x152630 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.4379432624113475 |
RT_DIALOG | 0x152a98 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x152b98 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x152cb8 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x152d18 | 0x5a | data | English | United States | 0.8 |
RT_MANIFEST | 0x152d78 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T16:28:29.760030+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49719 | 172.67.189.153 | 443 | TCP |
2025-03-07T16:28:30.262474+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49719 | 172.67.189.153 | 443 | TCP |
2025-03-07T16:28:30.262474+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49719 | 172.67.189.153 | 443 | TCP |
2025-03-07T16:28:31.730782+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49720 | 172.67.189.153 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 7, 2025 16:28:27.883137941 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:27.883193016 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:27.883316994 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:27.886320114 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:27.886332989 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:29.759871006 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:29.760030031 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:29.763607979 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:29.763617039 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:29.763901949 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:29.808645964 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:29.819741011 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:29.819770098 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:29.819845915 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.262456894 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263197899 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263246059 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263273954 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.263276100 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263288975 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263325930 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.263338089 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263376951 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.263385057 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263398886 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.263439894 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.266269922 CET | 49719 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.266284943 CET | 443 | 49719 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.274893999 CET | 49720 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.274926901 CET | 443 | 49720 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:30.275008917 CET | 49720 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.275382042 CET | 49720 | 443 | 192.168.2.4 | 172.67.189.153 |
Mar 7, 2025 16:28:30.275401115 CET | 443 | 49720 | 172.67.189.153 | 192.168.2.4 |
Mar 7, 2025 16:28:31.730782032 CET | 49720 | 443 | 192.168.2.4 | 172.67.189.153 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 7, 2025 16:28:00.526726961 CET | 58741 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 7, 2025 16:28:00.724164009 CET | 53 | 58741 | 1.1.1.1 | 192.168.2.4 |
Mar 7, 2025 16:28:27.728008032 CET | 57705 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 7, 2025 16:28:27.876403093 CET | 53 | 57705 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 7, 2025 16:28:00.526726961 CET | 192.168.2.4 | 1.1.1.1 | 0x1e9b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 7, 2025 16:28:27.728008032 CET | 192.168.2.4 | 1.1.1.1 | 0xff3d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 7, 2025 16:28:00.724164009 CET | 1.1.1.1 | 192.168.2.4 | 0x1e9b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 7, 2025 16:28:27.876403093 CET | 1.1.1.1 | 192.168.2.4 | 0xff3d | No error (0) | 172.67.189.153 | A (IP address) | IN (0x0001) | false | ||
Mar 7, 2025 16:28:27.876403093 CET | 1.1.1.1 | 192.168.2.4 | 0xff3d | No error (0) | 104.21.89.159 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49719 | 172.67.189.153 | 443 | 7720 | C:\Users\user\AppData\Local\Temp\119035\Cuba.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-07 15:28:29 UTC | 264 | OUT | |
2025-03-07 15:28:29 UTC | 8 | OUT | |
2025-03-07 15:28:30 UTC | 564 | IN | |
2025-03-07 15:28:30 UTC | 805 | IN | |
2025-03-07 15:28:30 UTC | 1369 | IN | |
2025-03-07 15:28:30 UTC | 1369 | IN | |
2025-03-07 15:28:30 UTC | 1014 | IN | |
2025-03-07 15:28:30 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:27:52 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\Desktop\#Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'483'827 bytes |
MD5 hash: | 5C4CA3E7135A0641AC01FBD73CD90CA8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:27:55 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:27:55 |
Start date: | 07/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 10:27:56 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\expand.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x600000 |
File size: | 53'248 bytes |
MD5 hash: | 544B0DBFF3F393BCE8BB9D815F532D51 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:27:56 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3a0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 10:27:56 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd40000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 10:27:57 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3a0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 10:27:57 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe60000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 10:27:58 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 10:27:58 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe40000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 11 |
Start time: | 10:27:58 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd40000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 10:27:58 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 10:27:59 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 14 |
Start time: | 10:27:59 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\AppData\Local\Temp\119035\Cuba.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfb0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 15 |
Start time: | 10:27:59 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |