Windows
Analysis Report
Superority.exe1.exe
Overview
General Information
Detection
LummaC Stealer
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Classification
- System is w10x64
Superority.exe1.exe (PID: 1648 cmdline:
"C:\Users\ user\Deskt op\Superor ity.exe1.e xe" MD5: 56EC4FE0D12094A8750B70B3A0BF54BE) Superority.exe1.exe (PID: 5988 cmdline:
"C:\Users\ user\Deskt op\Superor ity.exe1.e xe" MD5: 56EC4FE0D12094A8750B70B3A0BF54BE) WerFault.exe (PID: 644 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 1 648 -s 820 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-10T15:31:07.705334+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49686 | 149.154.167.99 | 443 | TCP |
2025-03-10T15:31:10.298423+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49688 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:14.197756+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49690 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:37.362043+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49696 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:40.516358+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49697 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:44.094027+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49699 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:47.557755+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49700 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:32:11.432611+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49701 | 104.21.77.86 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 1_2_0041B889 | |
Source: | Code function: | 1_2_00420C7F |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_00411055 | |
Source: | Code function: | 1_2_0044F0D0 | |
Source: | Code function: | 1_2_0044F1F0 | |
Source: | Code function: | 1_2_00450290 | |
Source: | Code function: | 1_2_004504E0 | |
Source: | Code function: | 1_2_00450800 | |
Source: | Code function: | 1_2_0041B889 | |
Source: | Code function: | 1_2_0041B889 | |
Source: | Code function: | 1_2_0041B889 | |
Source: | Code function: | 1_2_0041B889 | |
Source: | Code function: | 1_2_0041A8B0 | |
Source: | Code function: | 1_2_0041292E | |
Source: | Code function: | 1_2_0040EABE | |
Source: | Code function: | 1_2_0040EABE | |
Source: | Code function: | 1_2_00410B5B | |
Source: | Code function: | 1_2_0040EBE0 | |
Source: | Code function: | 1_2_00421C80 | |
Source: | Code function: | 1_2_00421C80 | |
Source: | Code function: | 1_2_0042DD7A | |
Source: | Code function: | 1_2_0043806A | |
Source: | Code function: | 1_2_00434032 | |
Source: | Code function: | 1_2_00434032 | |
Source: | Code function: | 1_2_00434032 | |
Source: | Code function: | 1_2_00411151 | |
Source: | Code function: | 1_2_00411151 | |
Source: | Code function: | 1_2_0042B160 | |
Source: | Code function: | 1_2_0043919E | |
Source: | Code function: | 1_2_004301A3 | |
Source: | Code function: | 1_2_004371AD | |
Source: | Code function: | 1_2_0041D25D | |
Source: | Code function: | 1_2_0040A200 | |
Source: | Code function: | 1_2_0040A200 | |
Source: | Code function: | 1_2_004202DF | |
Source: | Code function: | 1_2_004242A6 | |
Source: | Code function: | 1_2_00420347 | |
Source: | Code function: | 1_2_0042137A | |
Source: | Code function: | 1_2_0044C3ED | |
Source: | Code function: | 1_2_00447390 | |
Source: | Code function: | 1_2_0043A45B | |
Source: | Code function: | 1_2_004334F2 | |
Source: | Code function: | 1_2_00434560 | |
Source: | Code function: | 1_2_00435500 | |
Source: | Code function: | 1_2_0042A5C0 | |
Source: | Code function: | 1_2_0042459C | |
Source: | Code function: | 1_2_0044C59B | |
Source: | Code function: | 1_2_00448641 | |
Source: | Code function: | 1_2_00448641 | |
Source: | Code function: | 1_2_00448641 | |
Source: | Code function: | 1_2_0041264D | |
Source: | Code function: | 1_2_0043765E | |
Source: | Code function: | 1_2_0044F670 | |
Source: | Code function: | 1_2_0041C6B9 | |
Source: | Code function: | 1_2_0041C6B9 | |
Source: | Code function: | 1_2_004386BE | |
Source: | Code function: | 1_2_0041B700 | |
Source: | Code function: | 1_2_0041F715 | |
Source: | Code function: | 1_2_0044C712 | |
Source: | Code function: | 1_2_004107D3 | |
Source: | Code function: | 1_2_0041A7F0 | |
Source: | Code function: | 1_2_00433857 | |
Source: | Code function: | 1_2_0044D850 | |
Source: | Code function: | 1_2_00434960 | |
Source: | Code function: | 1_2_0041B912 | |
Source: | Code function: | 1_2_0041B912 | |
Source: | Code function: | 1_2_004509A0 | |
Source: | Code function: | 1_2_0042EA52 | |
Source: | Code function: | 1_2_0042EA52 | |
Source: | Code function: | 1_2_00442A50 | |
Source: | Code function: | 1_2_0041DB0B | |
Source: | Code function: | 1_2_0042FB11 | |
Source: | Code function: | 1_2_0042FB11 | |
Source: | Code function: | 1_2_0044ABF0 | |
Source: | Code function: | 1_2_00437BBF | |
Source: | Code function: | 1_2_0042AC40 | |
Source: | Code function: | 1_2_0042AC40 | |
Source: | Code function: | 1_2_00433C93 | |
Source: | Code function: | 1_2_0041BD1D | |
Source: | Code function: | 1_2_0041BD1D | |
Source: | Code function: | 1_2_00437EF0 | |
Source: | Code function: | 1_2_00448F76 | |
Source: | Code function: | 1_2_0044AF30 | |
Source: | Code function: | 1_2_0044AFF0 | |
Source: | Code function: | 1_2_0044AFF0 | |
Source: | Code function: | 1_2_00420F80 | |
Source: | Code function: | 1_2_0041EECC |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 1_2_00440D60 |
Source: | Code function: | 1_2_01351000 |
Source: | Code function: | 1_2_00440D60 |
Source: | Code function: | 0_2_0111253B | |
Source: | Code function: | 1_2_004171E0 | |
Source: | Code function: | 1_2_0044F1F0 | |
Source: | Code function: | 1_2_00431340 | |
Source: | Code function: | 1_2_004463E0 | |
Source: | Code function: | 1_2_0044A670 | |
Source: | Code function: | 1_2_00446730 | |
Source: | Code function: | 1_2_004157CD | |
Source: | Code function: | 1_2_0041B889 | |
Source: | Code function: | 1_2_0040B8B0 | |
Source: | Code function: | 1_2_0041A8B0 | |
Source: | Code function: | 1_2_0041292E | |
Source: | Code function: | 1_2_00439A83 | |
Source: | Code function: | 1_2_0040EABE | |
Source: | Code function: | 1_2_00421C80 | |
Source: | Code function: | 1_2_0042DD7A | |
Source: | Code function: | 1_2_0044CF50 | |
Source: | Code function: | 1_2_00401040 | |
Source: | Code function: | 1_2_0044E06D | |
Source: | Code function: | 1_2_0040E017 | |
Source: | Code function: | 1_2_00434032 | |
Source: | Code function: | 1_2_00426030 | |
Source: | Code function: | 1_2_00411151 | |
Source: | Code function: | 1_2_00448150 | |
Source: | Code function: | 1_2_004331D4 | |
Source: | Code function: | 1_2_004301A3 | |
Source: | Code function: | 1_2_004291B0 | |
Source: | Code function: | 1_2_0043E1B0 | |
Source: | Code function: | 1_2_0041D25D | |
Source: | Code function: | 1_2_00426260 | |
Source: | Code function: | 1_2_0043B265 | |
Source: | Code function: | 1_2_0040F27E | |
Source: | Code function: | 1_2_0040A200 | |
Source: | Code function: | 1_2_0043235C | |
Source: | Code function: | 1_2_0042137A | |
Source: | Code function: | 1_2_0042D379 | |
Source: | Code function: | 1_2_00428311 | |
Source: | Code function: | 1_2_00447390 | |
Source: | Code function: | 1_2_0043C3A4 | |
Source: | Code function: | 1_2_0043D411 | |
Source: | Code function: | 1_2_00409420 | |
Source: | Code function: | 1_2_0044442D | |
Source: | Code function: | 1_2_004034F0 | |
Source: | Code function: | 1_2_004334F2 | |
Source: | Code function: | 1_2_0042E480 | |
Source: | Code function: | 1_2_0041648E | |
Source: | Code function: | 1_2_0040D4A0 | |
Source: | Code function: | 1_2_00430550 | |
Source: | Code function: | 1_2_00434560 | |
Source: | Code function: | 1_2_0044E500 | |
Source: | Code function: | 1_2_0042A5C0 | |
Source: | Code function: | 1_2_004405D0 | |
Source: | Code function: | 1_2_0044E5E0 | |
Source: | Code function: | 1_2_00425580 | |
Source: | Code function: | 1_2_00448641 | |
Source: | Code function: | 1_2_0044F670 | |
Source: | Code function: | 1_2_0040C620 | |
Source: | Code function: | 1_2_00414637 | |
Source: | Code function: | 1_2_0041C6B9 | |
Source: | Code function: | 1_2_00404772 | |
Source: | Code function: | 1_2_0044E700 | |
Source: | Code function: | 1_2_0041F721 | |
Source: | Code function: | 1_2_004317C0 | |
Source: | Code function: | 1_2_0044E790 | |
Source: | Code function: | 1_2_00421795 | |
Source: | Code function: | 1_2_0042E7A0 | |
Source: | Code function: | 1_2_00433857 | |
Source: | Code function: | 1_2_0044E820 | |
Source: | Code function: | 1_2_004138D1 | |
Source: | Code function: | 1_2_004318D2 | |
Source: | Code function: | 1_2_004478D0 | |
Source: | Code function: | 1_2_004258B0 | |
Source: | Code function: | 1_2_00428950 | |
Source: | Code function: | 1_2_0041E960 | |
Source: | Code function: | 1_2_0043C966 | |
Source: | Code function: | 1_2_00430970 | |
Source: | Code function: | 1_2_0041B912 | |
Source: | Code function: | 1_2_004329D5 | |
Source: | Code function: | 1_2_0044F9E0 | |
Source: | Code function: | 1_2_0042EA52 | |
Source: | Code function: | 1_2_0044DA0C | |
Source: | Code function: | 1_2_00408A20 | |
Source: | Code function: | 1_2_0044EAD0 | |
Source: | Code function: | 1_2_00440AD0 | |
Source: | Code function: | 1_2_00402AF0 | |
Source: | Code function: | 1_2_0042DB70 | |
Source: | Code function: | 1_2_0042FB11 | |
Source: | Code function: | 1_2_00445B10 | |
Source: | Code function: | 1_2_00438BD0 | |
Source: | Code function: | 1_2_0043DBDD | |
Source: | Code function: | 1_2_0044ABF0 | |
Source: | Code function: | 1_2_0042AC40 | |
Source: | Code function: | 1_2_0040AC00 | |
Source: | Code function: | 1_2_00416CC5 | |
Source: | Code function: | 1_2_0041CCE6 | |
Source: | Code function: | 1_2_00443C89 | |
Source: | Code function: | 1_2_00438C9E | |
Source: | Code function: | 1_2_00444CA0 | |
Source: | Code function: | 1_2_0040CD70 | |
Source: | Code function: | 1_2_00407D10 | |
Source: | Code function: | 1_2_0041BD1D | |
Source: | Code function: | 1_2_00438D22 | |
Source: | Code function: | 1_2_00439E46 | |
Source: | Code function: | 1_2_0041DE50 | |
Source: | Code function: | 1_2_0043EE51 | |
Source: | Code function: | 1_2_00433E50 | |
Source: | Code function: | 1_2_0044EE30 | |
Source: | Code function: | 1_2_00411EE6 | |
Source: | Code function: | 1_2_00403E90 | |
Source: | Code function: | 1_2_00408E90 | |
Source: | Code function: | 1_2_0043CF36 | |
Source: | Code function: | 1_2_0043FFD2 | |
Source: | Code function: | 1_2_0044AFF0 | |
Source: | Code function: | 1_2_00420F80 | |
Source: | Code function: | 1_2_0044BF8B |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 1_2_00446730 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00457236 | |
Source: | Code function: | 1_2_00457252 | |
Source: | Code function: | 1_2_00457286 | |
Source: | Code function: | 1_2_00457292 | |
Source: | Code function: | 1_2_0045743A | |
Source: | Code function: | 1_2_0045744E | |
Source: | Code function: | 1_2_00457452 | |
Source: | Code function: | 1_2_0045745E | |
Source: | Code function: | 1_2_0045745A | |
Source: | Code function: | 1_2_00457466 | |
Source: | Code function: | 1_2_0045746A | |
Source: | Code function: | 1_2_00457482 | |
Source: | Code function: | 1_2_0045743A | |
Source: | Code function: | 1_2_0045744E | |
Source: | Code function: | 1_2_00456D62 | |
Source: | Code function: | 1_2_00456D6A | |
Source: | Code function: | 1_2_00456D6E | |
Source: | Code function: | 1_2_00456D82 | |
Source: | Code function: | 1_2_00456DF9 | |
Source: | Code function: | 1_2_00456DB2 | |
Source: | Code function: | 1_2_00454DDF | |
Source: | Code function: | 1_2_00456E46 | |
Source: | Code function: | 1_2_00456E52 | |
Source: | Code function: | 1_2_00456E5E | |
Source: | Code function: | 1_2_00456E96 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_1-23723 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 1_2_0044C8F0 |
Source: | Code function: | 0_2_02BA21FD | |
Source: | Code function: | 0_2_02BA237A |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02BA21FD |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 231 Security Software Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 23 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | 3 Clipboard Data | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Software Packing | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
56% | Virustotal | Browse | ||
58% | ReversingLabs | ByteCode-MSIL.Trojan.LummaStealer | ||
100% | Avira | TR/Dropper.MSIL.Gen |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
t.me | 149.154.167.99 | true | false | high | |
astralconnec.icu | 104.21.77.86 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.77.86 | astralconnec.icu | United States | 13335 | CLOUDFLARENETUS | false | |
149.154.167.99 | t.me | United Kingdom | 62041 | TELEGRAMRU | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1633708 |
Start date and time: | 2025-03-10 15:29:44 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Superority.exe1.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/6@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, WerFault.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.12.23.50, 20.190.160.14, 23.60.203.209
- Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:31:10 | API Interceptor | |
10:31:11 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.77.86 | Get hash | malicious | Unknown | Browse |
| |
149.154.167.99 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cinoshi Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
t.me | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
astralconnec.icu | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Gabagool | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Gabagool | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Superority.exe1._69e57c9baf157eda2fe7e9bacb6e4947ee2fcc1f_96223681_7b5ef16b-fc02-411d-9bae-0dea8fce227e\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8685509801041308 |
Encrypted: | false |
SSDEEP: | 96:p0jFJCUnKJrlYsygtojTOAqyS3QXIDcQlc6VcEdcw3XYBYz+BHUHZ0ownOgHkEwZ:qjzzEZY0vA0LR30aeSzuiFgZ24IO85 |
MD5: | EAF1E5929C14F76525EF57EEA94FB5FD |
SHA1: | 97AA2A8E719C8586662938FDF3C6E770536D2563 |
SHA-256: | EA4E3A76D11A6BCBF44A2C25A4130A800A64B19F1F64704ECA8447467E33394D |
SHA-512: | 0064853443ED9DCE3D8C66E5EF732A029DFCE014F7F9AE8D6CE07CB67FDF139CFD00C3C70DA3ADD5467113025951231F3BA7E2698C2457FB281F746873BC78FA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 162089 |
Entropy (8bit): | 3.6498804105129703 |
Encrypted: | false |
SSDEEP: | 1536:dfZM78G5CDDeuBojRypN4uE2aOXJjLTghwAh7W8tT44:dRxBDGU4uEq5jLTghns |
MD5: | 8A28E0F2F77D9B375B5C94F58786B280 |
SHA1: | 6A412AB386EE0A428406260BBF00CE64C558BFAC |
SHA-256: | A2954EB5A823210C28838730CEE46D6B99B12B3B218FBF758197D240239EDFD1 |
SHA-512: | 81A06ACE90FC56905E21AEA3C58B9F972B2C6774E2E8F8164DB580F473A21B66E7D2B42DD5097B353EA0E6BA613D0630DF904A75D24CE183CA451DB0F2B1F627 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8416 |
Entropy (8bit): | 3.689345820200387 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJdY6FO6Y+sSU95LgmfzVJnprr89b3HsfiA9m:R6lXJy6c6YlSU9VgmfzVJm3MfiX |
MD5: | ED1DC82EBFD45923BFB183F51209F4B6 |
SHA1: | B634EF58D887794FB591A596B6575C0FFCF76E89 |
SHA-256: | 1D05C781186EF53D892453F93B6A8C595F761F1AD44D29C71A340C4DA57996BA |
SHA-512: | FD619E2A8194604C9C6113E3BF1553B2A9ED6B1AD7B7A81437A3D9B97B181354D44A16B124627538BC688D94873B89ACA5AFE56EEEAF597328CA72C96BFD6FA8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4775 |
Entropy (8bit): | 4.457882858677097 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs+Jg77aI9t/mWpW8VYFYm8M4JQdxPcf6FH1P+q8vcdxPcfDv2j8Azrbi:uIjf0I7D/n7VdJhfERKNfLERzrb5pgd |
MD5: | 5D4ABACD5E833AA416F03223B1C22012 |
SHA1: | EB30A8D6B9B3B1EFF9100DB153833D088A6B35E0 |
SHA-256: | 1683B5B438DAF7A475AC4EA166F27F7F2CDCBD1A07A2F8F609C35C7E1AF44CD2 |
SHA-512: | 667CA4988B3285F6F486CB278ABC5C63DC52D77662A7BC33FC21A57771EFE17F41AF722E5565204C351271AD4AAD669605A2C97A6FEA16E42573148CFDF34491 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.421456790779818 |
Encrypted: | false |
SSDEEP: | 6144:M+ifpi6ceLPL9skLmb0mYSWSPtaJG8nAgexk8tq2QqZaKqFIeC/7ocX2tA:fi58YSWIZLI2QqYwj1mC |
MD5: | 6729A0D73062EAC016F074A85C04C28B |
SHA1: | E267004CF11E5F6A5850CC95BD721DFEEC179751 |
SHA-256: | BCD925657FD5342DDFA6E2FC997A9CB791F2EC34C43DFF173980E7E8EB174D1C |
SHA-512: | 9FA2AD1BAE6DB2D494D647DE3587C6462045CA1CEB2118A05098C86FE9EE1BE5B568CBF2270EA1C2DBBD78FB4BF4F81203CCC6B01DCA7EF47EA99FCD6CD3A9F9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 36864 |
Entropy (8bit): | 4.394747702855989 |
Encrypted: | false |
SSDEEP: | 768:104DoyFMRJmG6L/rNy2BC32cXsN/HVi9QlCdr+X7bs9NYrw:10tsTMgm9GNIQlIaB |
MD5: | B2F320D13C5F5D67A14F333B31F914D4 |
SHA1: | D30F787C657181E652C72A153037DD695C5A7E56 |
SHA-256: | 55DA654194C26173A68C00624609F3F9B8BD7ABEE0DEA2BD375D5F5C33958D72 |
SHA-512: | 71441DBC478D24BBFF8BBB63DE031D8F4724FD0B7D12010B7F4B729D11B282214A66ECD12F7B29A6A2BAE79CB80BA46D24902C036C29BA057D12690EAD44F76A |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 0.16441873246285094 |
TrID: |
|
File name: | Superority.exe1.exe |
File size: | 37'082'112 bytes |
MD5: | 56ec4fe0d12094a8750b70b3a0bf54be |
SHA1: | f010c27c7ba7083d71a9c4451bec9588e22ed72a |
SHA256: | 99ee408c7116fc4d9416be5248874cf6397b6c65e42a035afcd4f8ad59705303 |
SHA512: | b0bc4115d51ba89e423d5276096972e90e17d1eb0a57695a741209b85ff392cc3f1c6140b08089fb7c4c9ac9e4d8a8cc3ec2cf7e9aa8763d4b0d94fc1f5cb7bd |
SSDEEP: | 12288:1g/MBd+7aFYIQiEgNC5IeH7c3NVzYz1N2OSrP9B:WMBY7oYntP5IeH8tYH2trr |
TLSH: | 3E872314EAC485A2D1A98BBF425703A1F570D2127EC3F69F209D3F61CB83B914A32D6D |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q............"...0.."..........f;... ...`....@.. .......................`............`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x403b66 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xADFF511F [Mon Jul 3 22:20:15 2062 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v4.0.30319 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
push es |
js 00007F9CBCF7767Dh |
or al, 24h |
add eax, 15110704h |
or al, byte ptr [eax] |
add byte ptr [eax], al |
add byte ptr [eax], al |
pop esp |
jns 00007643h |
jno 00007F9CBCF7772Ah |
aam C8h |
outsd |
and eax, 4C604532h |
jmp far 5164h : 62FDD060h |
mov dword ptr [esi], ebx |
xor byte ptr [ebx+7BBFA4B8h], ah |
aam 4Ah |
ret |
jnbe 00007F9CBCF776E6h |
add al, 3Dh |
add byte ptr [eax], al |
add byte ptr [eax], al |
jns 00007F9CBCF77712h |
lea edx, dword ptr [eax] |
loope 00007F9CBCF776ABh |
sti |
jne 00007F9CBCF776C3h |
or esp, dword ptr [ecx] |
adc esi, ebp |
cmpsd |
in al, 03h |
mov bh, A3h |
cmpsb |
and dword ptr [eax], esp |
test esi, esp |
cwde |
push edx |
jmp 00007F9C6B24B7C1h |
sub dword ptr [edx+325E6BADh], esp |
adc dword ptr [ebx], esp |
lodsd |
rcl dword ptr [eax-35h], FFFFFFDCh |
sub ah, byte ptr [ebx] |
inc ebx |
jnc 00007F9CBCF776FBh |
jbe 00007F9CBCF77727h |
cmp dword ptr [ebp-00874B27h], esi |
push eax |
and ah, byte ptr [ecx+03FCEF36h] |
hlt |
xchg eax, edi |
int3 |
scasb |
add eax, A99A6234h |
aam 6Fh |
mov edx, 0A561172h |
mov al, C7h |
pop ds |
cmp esp, ebx |
fdivr qword ptr [edi] |
or bl, byte ptr [ebp-5Eh] |
shl al, FFFFFFBFh |
mov eax, 926A3B5Eh |
add byte ptr [ecx], 00000069h |
pop eax |
stosb |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3b14 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x6000 | 0x59c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x8000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x3a80 | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x20f8 | 0x2200 | 2336fc02d84ab7fe67bf872f8511b001 | False | 0.7184053308823529 | data | 6.597846647424806 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x6000 | 0x59c | 0x600 | 88026805aec0496128e320c861c25c4f | False | 0.41015625 | data | 4.0305393073644025 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x8000 | 0xc | 0x200 | fe25fe59d6526d5530f0d4f3420107c5 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.CSS | 0xa000 | 0x5a600 | 0x5a600 | 98e4e4605120c2cb709630879ecb5f06 | False | 1.0003268715421854 | data | 7.999586089466254 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x6090 | 0x30c | data | 0.4217948717948718 | ||
RT_MANIFEST | 0x63ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
Comments | |
CompanyName | |
FileDescription | Portals |
FileVersion | 1.0.0.0 |
InternalName | Portals.exe |
LegalCopyright | Copyright 2025 |
LegalTrademarks | |
OriginalFilename | Portals.exe |
ProductName | Portals |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-10T15:31:07.705334+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49686 | 149.154.167.99 | 443 | TCP |
2025-03-10T15:31:10.298423+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49688 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:14.197756+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49690 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:37.362043+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49696 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:40.516358+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49697 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:44.094027+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49699 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:31:47.557755+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49700 | 104.21.77.86 | 443 | TCP |
2025-03-10T15:32:11.432611+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49701 | 104.21.77.86 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 10, 2025 15:31:05.436335087 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:05.436391115 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:05.436490059 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:05.439495087 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:05.439508915 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:07.704570055 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:07.705333948 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:07.710628986 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:07.710642099 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:07.710927010 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:07.752727985 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:07.780343056 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:07.824331999 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.415595055 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.415625095 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.415635109 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.415690899 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.415718079 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.415747881 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:08.415803909 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:08.476675987 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:08.476711035 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.476723909 CET | 49686 | 443 | 192.168.2.7 | 149.154.167.99 |
Mar 10, 2025 15:31:08.476731062 CET | 443 | 49686 | 149.154.167.99 | 192.168.2.7 |
Mar 10, 2025 15:31:08.566956997 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:08.566997051 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:08.567099094 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:08.571857929 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:08.571873903 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:10.298049927 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:10.298423052 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:10.300234079 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:10.300241947 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:10.300501108 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:10.301920891 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:10.301920891 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:10.301990032 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.130794048 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.136703014 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.136749029 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.136759043 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.136781931 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.136821985 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.136828899 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.160785913 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.160871029 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.160903931 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.165823936 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.165858030 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.165884018 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.165910959 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.165946007 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.181564093 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.236654997 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.236687899 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.279313087 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.279443979 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.352602005 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.352639914 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.352654934 CET | 49688 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.352663040 CET | 443 | 49688 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.623591900 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.623635054 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:11.623711109 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.625152111 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:11.625161886 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:14.197499990 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:14.197756052 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:14.199357033 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:14.199368954 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:14.199621916 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:14.200997114 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:14.201137066 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:14.201155901 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:35.051729918 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:35.051839113 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:35.051918030 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:35.052126884 CET | 49690 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:35.052140951 CET | 443 | 49690 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:35.082737923 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:35.082866907 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:35.082971096 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:35.083329916 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:35.083379030 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:37.361934900 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:37.362042904 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:37.363403082 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:37.363409996 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:37.363662004 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:37.364897013 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:37.365029097 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:37.365061045 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:37.365113020 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:37.412322998 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:38.299590111 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:38.299709082 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:38.299789906 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:38.299926043 CET | 49696 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:38.299952984 CET | 443 | 49696 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:38.484838963 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:38.484899044 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:38.485049009 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:38.485615015 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:38.485626936 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:40.516189098 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:40.516357899 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:40.517762899 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:40.517770052 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:40.518014908 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:40.519279957 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:40.519431114 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:40.519450903 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:40.519506931 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:40.519517899 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:41.692526102 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:41.721098900 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:41.721226931 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:41.736434937 CET | 49697 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:41.736457109 CET | 443 | 49697 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:42.154195070 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:42.154252052 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:42.154342890 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:42.154707909 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:42.154722929 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:44.093929052 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:44.094027042 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:44.096170902 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:44.096189022 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:44.096506119 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:44.098118067 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:44.098216057 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:44.098269939 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:45.115977049 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:45.116113901 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:45.116170883 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:45.116274118 CET | 49699 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:45.116295099 CET | 443 | 49699 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:45.434415102 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:45.434525013 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:45.434645891 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:45.435018063 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:45.435055017 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.557637930 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.557754993 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.559119940 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.559140921 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.559407949 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.560729027 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.561548948 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.561594963 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.561741114 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.561784983 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.561959028 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.561996937 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.562182903 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.562227964 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.562441111 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.562479973 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.562707901 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.562745094 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.562777996 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.562803984 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.562917948 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.562953949 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.562994957 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.563021898 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.563097000 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.563163042 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.563215017 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.563251019 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.563349962 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.563410044 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:31:47.563415051 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:31:47.563441038 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:09.562134027 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:09.562236071 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:09.562321901 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:09.562508106 CET | 49700 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:09.562527895 CET | 443 | 49700 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:09.567795992 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:09.567857027 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:09.567940950 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:09.568284035 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:09.568295002 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:11.432534933 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:11.432610989 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:11.434552908 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:11.434575081 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:11.434887886 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:11.436300993 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:11.436336994 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:11.436431885 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.345854998 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.345904112 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.345928907 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.345953941 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.346023083 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.346031904 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.346105099 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.346858978 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.346919060 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.346987009 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.348104954 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.348140001 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.348186016 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.348191977 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.348225117 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.348248959 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.348284960 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.348506927 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.348521948 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Mar 10, 2025 15:32:12.348536015 CET | 49701 | 443 | 192.168.2.7 | 104.21.77.86 |
Mar 10, 2025 15:32:12.348541975 CET | 443 | 49701 | 104.21.77.86 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 10, 2025 15:31:05.372323036 CET | 63054 | 53 | 192.168.2.7 | 1.1.1.1 |
Mar 10, 2025 15:31:05.384941101 CET | 53 | 63054 | 1.1.1.1 | 192.168.2.7 |
Mar 10, 2025 15:31:08.510880947 CET | 55446 | 53 | 192.168.2.7 | 1.1.1.1 |
Mar 10, 2025 15:31:08.526149035 CET | 53 | 55446 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 10, 2025 15:31:05.372323036 CET | 192.168.2.7 | 1.1.1.1 | 0xc7b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 10, 2025 15:31:08.510880947 CET | 192.168.2.7 | 1.1.1.1 | 0xdd0e | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 10, 2025 15:31:05.384941101 CET | 1.1.1.1 | 192.168.2.7 | 0xc7b | No error (0) | 149.154.167.99 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 15:31:08.526149035 CET | 1.1.1.1 | 192.168.2.7 | 0xdd0e | No error (0) | 104.21.77.86 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 15:31:08.526149035 CET | 1.1.1.1 | 192.168.2.7 | 0xdd0e | No error (0) | 172.67.205.192 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49686 | 149.154.167.99 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:31:07 UTC | 61 | OUT | |
2025-03-10 14:31:08 UTC | 511 | IN | |
2025-03-10 14:31:08 UTC | 12333 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.7 | 49688 | 104.21.77.86 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:31:10 UTC | 267 | OUT | |
2025-03-10 14:31:10 UTC | 65 | OUT | |
2025-03-10 14:31:11 UTC | 789 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN | |
2025-03-10 14:31:11 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.7 | 49690 | 104.21.77.86 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:31:14 UTC | 282 | OUT | |
2025-03-10 14:31:14 UTC | 14507 | OUT | |
2025-03-10 14:31:35 UTC | 818 | IN | |
2025-03-10 14:31:35 UTC | 76 | IN | |
2025-03-10 14:31:35 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.7 | 49696 | 104.21.77.86 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:31:37 UTC | 276 | OUT | |
2025-03-10 14:31:37 UTC | 15039 | OUT | |
2025-03-10 14:31:38 UTC | 820 | IN | |
2025-03-10 14:31:38 UTC | 76 | IN | |
2025-03-10 14:31:38 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.7 | 49697 | 104.21.77.86 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:31:40 UTC | 285 | OUT | |
2025-03-10 14:31:40 UTC | 15331 | OUT | |
2025-03-10 14:31:40 UTC | 5078 | OUT | |
2025-03-10 14:31:41 UTC | 816 | IN | |
2025-03-10 14:31:41 UTC | 76 | IN | |
2025-03-10 14:31:41 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.7 | 49699 | 104.21.77.86 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:31:44 UTC | 274 | OUT | |
2025-03-10 14:31:44 UTC | 2601 | OUT | |
2025-03-10 14:31:45 UTC | 814 | IN | |
2025-03-10 14:31:45 UTC | 76 | IN | |
2025-03-10 14:31:45 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.7 | 49700 | 104.21.77.86 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:31:47 UTC | 277 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:31:47 UTC | 15331 | OUT | |
2025-03-10 14:32:09 UTC | 828 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.7 | 49701 | 104.21.77.86 | 443 | 5988 | C:\Users\user\Desktop\Superority.exe1.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-10 14:32:11 UTC | 268 | OUT | |
2025-03-10 14:32:11 UTC | 103 | OUT | |
2025-03-10 14:32:12 UTC | 783 | IN | |
2025-03-10 14:32:12 UTC | 586 | IN | |
2025-03-10 14:32:12 UTC | 1369 | IN | |
2025-03-10 14:32:12 UTC | 1369 | IN | |
2025-03-10 14:32:12 UTC | 1369 | IN | |
2025-03-10 14:32:12 UTC | 1369 | IN | |
2025-03-10 14:32:12 UTC | 1369 | IN | |
2025-03-10 14:32:12 UTC | 592 | IN | |
2025-03-10 14:32:12 UTC | 1369 | IN | |
2025-03-10 14:32:12 UTC | 1059 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:31:02 |
Start date: | 10/03/2025 |
Path: | C:\Users\user\Desktop\Superority.exe1.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x720000 |
File size: | 37'082'112 bytes |
MD5 hash: | 56EC4FE0D12094A8750B70B3A0BF54BE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:31:03 |
Start date: | 10/03/2025 |
Path: | C:\Users\user\Desktop\Superority.exe1.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xda0000 |
File size: | 37'082'112 bytes |
MD5 hash: | 56EC4FE0D12094A8750B70B3A0BF54BE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 10:31:04 |
Start date: | 10/03/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfd0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |