Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EoN1VzwYYa.exe

Overview

General Information

Sample name:EoN1VzwYYa.exe
renamed because original name is a hash value
Original sample name:d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11.exe
Analysis ID:1640835
MD5:7994502ed5c8ffe9fc84e164b440124e
SHA1:3bf7c1be79c753352b5a6787fb10d84918897887
SHA256:d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11
Tags:46-4-119-125exeuser-JAMESWT_MHT
Infos:

Detection

Score:48
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Creates COM task schedule object (often to register a task for autostart)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Enables security privileges
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine

Classification

  • System is w10x64
  • EoN1VzwYYa.exe (PID: 6536 cmdline: "C:\Users\user\Desktop\EoN1VzwYYa.exe" MD5: 7994502ED5C8FFE9FC84E164B440124E)
  • EoN1VzwYYa.exe (PID: 4652 cmdline: C:\Users\user\Desktop\EoN1VzwYYa.exe MD5: 7994502ED5C8FFE9FC84E164B440124E)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EoN1VzwYYa.exeVirustotal: Detection: 32%Perma Link
Source: EoN1VzwYYa.exeReversingLabs: Detection: 33%
Source: EoN1VzwYYa.exe, 00000000.00000000.1254873442.00007FF602B07000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_2585039d-7
Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49698 version: TLS 1.2
Source: EoN1VzwYYa.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Proj\MegaCrypt\MonsterCrypt\out\build\x64-release\MonsterCrypt.pdb source: EoN1VzwYYa.exe
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 46.4.119.125:7712
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
Source: EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
Source: EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/RK
Source: EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org7K;
Source: EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgm
Source: EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgm=K%
Source: EoN1VzwYYa.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: EoN1VzwYYa.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: EoN1VzwYYa.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49698 version: TLS 1.2
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeProcess token adjusted: SecurityJump to behavior
Source: classification engineClassification label: mal48.winEXE@2/0@1/3
Source: EoN1VzwYYa.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EoN1VzwYYa.exe, 00000000.00000002.2498657469.0000018FE6BE4000.00000004.00000020.00020000.00000000.sdmp, EoN1VzwYYa.exe, 00000000.00000002.2499876586.00007FF602166000.00000002.00000001.01000000.00000003.sdmp, EoN1VzwYYa.exe, 00000000.00000000.1254873442.00007FF602166000.00000002.00000001.01000000.00000003.sdmp, EoN1VzwYYa.exe, 00000002.00000002.1270138032.000001BB7D926000.00000004.00000020.00020000.00000000.sdmp, EoN1VzwYYa.exe, 00000002.00000002.1283609601.00007FF602166000.00000002.00000001.01000000.00000003.sdmp, EoN1VzwYYa.exe, 00000002.00000000.1264151854.00007FF602166000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: EoN1VzwYYa.exe, 00000000.00000002.2498657469.0000018FE6BE4000.00000004.00000020.00020000.00000000.sdmp, EoN1VzwYYa.exe, 00000000.00000002.2499876586.00007FF602166000.00000002.00000001.01000000.00000003.sdmp, EoN1VzwYYa.exe, 00000000.00000000.1254873442.00007FF602166000.00000002.00000001.01000000.00000003.sdmp, EoN1VzwYYa.exe, 00000002.00000002.1270138032.000001BB7D926000.00000004.00000020.00020000.00000000.sdmp, EoN1VzwYYa.exe, 00000002.00000002.1283609601.00007FF602166000.00000002.00000001.01000000.00000003.sdmp, EoN1VzwYYa.exe, 00000002.00000000.1264151854.00007FF602166000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: EoN1VzwYYa.exeVirustotal: Detection: 32%
Source: EoN1VzwYYa.exeReversingLabs: Detection: 33%
Source: EoN1VzwYYa.exeString found in binary or memory: Accept-Additions
Source: EoN1VzwYYa.exeString found in binary or memory: List-Help
Source: EoN1VzwYYa.exeString found in binary or memory: MMHS-Exempted-Address
Source: EoN1VzwYYa.exeString found in binary or memory: Originator-Return-Address
Source: EoN1VzwYYa.exeString found in binary or memory: id-cmc-addExtensions
Source: EoN1VzwYYa.exeString found in binary or memory: set-addPolicy
Source: EoN1VzwYYa.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectorycw-outbodyheadercw_out, wrote %zu %s bytes -> %zuWrite callback asked for PAUSE when not supportedcw_out, PAUSE requested by clientclient returned ERROR on write of %zu bytesFailure writing output to destination, passed %zu returned %zd notcw-out is%spausedcw-out done--:--:--%2lld:%02lld:%02lld%3lldd %02lldh%7lldd%5lld%4lldk%2lld.%0lldM%4lldM%2lld.%0lldG%4lldG%4lldT%4lldP** Resuming transfer from byte position %lld
Source: unknownProcess created: C:\Users\user\Desktop\EoN1VzwYYa.exe "C:\Users\user\Desktop\EoN1VzwYYa.exe"
Source: unknownProcess created: C:\Users\user\Desktop\EoN1VzwYYa.exe C:\Users\user\Desktop\EoN1VzwYYa.exe
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: EoN1VzwYYa.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: EoN1VzwYYa.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: EoN1VzwYYa.exeStatic file information: File size 13577216 > 1048576
Source: EoN1VzwYYa.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x134a00
Source: EoN1VzwYYa.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xba9a00
Source: EoN1VzwYYa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: EoN1VzwYYa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: EoN1VzwYYa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: EoN1VzwYYa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: EoN1VzwYYa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: EoN1VzwYYa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: EoN1VzwYYa.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: EoN1VzwYYa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Proj\MegaCrypt\MonsterCrypt\out\build\x64-release\MonsterCrypt.pdb source: EoN1VzwYYa.exe
Source: EoN1VzwYYa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EoN1VzwYYa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EoN1VzwYYa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EoN1VzwYYa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EoN1VzwYYa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmp, EoN1VzwYYa.exe, 00000002.00000002.1269912361.000001BB7BF60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeCode function: 0_2_00007FF6020ECB64 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6020ECB64
Source: C:\Users\user\Desktop\EoN1VzwYYa.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Scheduled Task/Job
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
Scheduled Task/Job
1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
Obfuscated Files or InformationSecurity Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EoN1VzwYYa.exe33%VirustotalBrowse
EoN1VzwYYa.exe33%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.ipify.orgm0%Avira URL Cloudsafe
https://api.ipify.orgm=K%0%Avira URL Cloudsafe
https://api.ipify.org7K;0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
104.26.12.205
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.ipify.org/EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://curl.se/docs/hsts.htmlEoN1VzwYYa.exefalse
        high
        https://api.ipify.orgEoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://api.ipify.orgmEoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.ipify.orgm=K%EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/docs/alt-svc.htmlEoN1VzwYYa.exefalse
            high
            https://api.ipify.org/RKEoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://curl.se/docs/http-cookies.htmlEoN1VzwYYa.exefalse
                high
                https://api.ipify.org7K;EoN1VzwYYa.exe, 00000000.00000002.2498463314.0000018FE5245000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                46.4.119.125
                unknownGermany
                24940HETZNER-ASDEfalse
                104.26.12.205
                api.ipify.orgUnited States
                13335CLOUDFLARENETUSfalse
                IP
                127.0.0.1
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1640835
                Start date and time:2025-03-17 19:17:19 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 36s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:EoN1VzwYYa.exe
                renamed because original name is a hash value
                Original Sample Name:d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11.exe
                Detection:MAL
                Classification:mal48.winEXE@2/0@1/3
                EGA Information:Failed
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 23.60.203.209, 4.245.163.56
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target EoN1VzwYYa.exe, PID 6536 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                TimeTypeDescription
                19:18:17Task SchedulerRun new task: MSTR tsk path: C:\Users\user\Desktop\EoN1VzwYYa.exe
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                46.4.119.125LHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                  12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                    ykshuami.ps1Get hashmaliciousUnknownBrowse
                      12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                        104.26.12.205ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        LauncherV9.exeGet hashmaliciousLummaC StealerBrowse
                        • api.ipify.org/
                        Catch Me If You Can (2002) 1080p.BluRay.x264.Full 744MB.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/?format=xml
                        NightFixed 1.0.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        VibeCall.exeGet hashmaliciousRHADAMANTHYSBrowse
                        • api.ipify.org/
                        VRChat_ERP_Setup 1.0.0.msiGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        wEY98gM1Jj.ps1Get hashmaliciousLummaC StealerBrowse
                        • api.ipify.org/
                        oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        DeepLauncher.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        api.ipify.orgLHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                        • 104.26.13.205
                        SOA - HUAFENG (JAN INVOICE OVERDUE).exeGet hashmaliciousAgentTeslaBrowse
                        • 172.67.74.152
                        New requirement Orders.exeGet hashmaliciousAgentTeslaBrowse
                        • 104.26.12.205
                        ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                        • 172.67.74.152
                        eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                        • 172.67.74.152
                        K9PwdfoVnG.exeGet hashmaliciousAgentTeslaBrowse
                        • 104.26.13.205
                        ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                        • 172.67.74.152
                        nn1jUU3YSs.msiGet hashmaliciousUnknownBrowse
                        • 104.26.13.205
                        sample.zip.zipGet hashmaliciousGlobeimposterBrowse
                        • 172.67.74.152
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSEmarine System Contact Update.pdfGet hashmaliciousHTMLPhisherBrowse
                        • 104.18.95.41
                        LHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                        • 104.26.13.205
                        https://analytics.zoho.com/open-view/3062125000000006086Get hashmaliciousUnknownBrowse
                        • 104.21.112.1
                        https://u17065553.ct.sendgrid.net/ls/click?upn=u001.Rw-2FXpvWBRDxNoiEvv-2B0VhMl349dE-2BIxYKCLpL5-2B-2FL8px39hmRTYxAZ-2BeMH1CR7jYvsg3f7mQR-2BtgzEdpv6rWDyoEa1Isq60WafIaat9IMqfozrbRuGiDhSD5zRfw1vSUnaPfHOkeKVWyjmgPghsIl-2FnSiz3vjd-2BgNdZNW1WWi7RlhTni8jQbV4O1UkQOa0-2F2VYGlXOPUclqMwRi50Vl1PR4j2jhVrjOnUdA6E03jJF3YxTMCgxElFH-2Bjnu2oS6ZdGJGXf9TKr37Eh3pnVym0G5ilxnSN6bJyz-2FWbi47cL6vQDH-2FLX6HDdsxLQr4OiWNyplfwZIjGldJH3Oj3k-2B0Sr92pyHOs07I3QG9CN9BFC52s0blv8XoiBzACqb7MDZTgdhgx-2Fj3fdHjRUqn0E0aUxawEH-2F-2B7SQiAWk4bi4jHEXI-3DlKA5_AMa9RrBWZfrIG11ZEW0ArF1BRI9e8rcrPZr5T9DlZ7Ba2ZAvuJPwiS8cX4aFrXjFerUDwGcfFdNk6Ly7G30W-2FpJZ3vwwQM6aCBocvejnros7-2FYckwVQH02a6C13hCOZXCH6DxRozn9HOBenC-2BdqPCIwBV1vvkSKYyJjB4wo2MVyi5b4Ko6F9xhTiwowhGgTSo1JEnvhUu4BAFpCuBdmsFw-3D-3DGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                        • 104.26.0.100
                        SOA - HUAFENG (JAN INVOICE OVERDUE).exeGet hashmaliciousAgentTeslaBrowse
                        • 172.67.74.152
                        1099-NEC.pdfGet hashmaliciousRHADAMANTHYSBrowse
                        • 104.17.25.14
                        http://email.shop2.wonderpark.my/c/eJwUyk1uhSAQAODTwJIM8wPzFiy68R4KYzX1iRHTprdvuv9aiRbTDN5KzIyIokp-K7YirKlWzVWAeRFKVVflF5OpSvJ7QUABijkKKVBgihmqGWBeYGnsGMbWLww__Wx2X_P9Fd6__ijb81zD0YfDyeFk80tZKK9iUJtASjaTNA2LnWO_eqj97XDyd7EWtv45n6OfjqHeNp5jP23rjx3jn_nvgn8BAAD__y9yPWoGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                        • 172.67.214.184
                        2450856955_.svgGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                        • 104.17.25.14
                        1099-NEC.pdfGet hashmaliciousUnknownBrowse
                        • 172.64.41.3
                        REQUIRED-ORDER-REFERENCE-WITH-COMPANY-DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                        • 104.21.48.1
                        HETZNER-ASDELHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                        • 46.4.119.125
                        Arrival Notice.exeGet hashmaliciousFormBookBrowse
                        • 213.133.99.48
                        73ybGtnYXx.exeGet hashmaliciousWhiteSnake StealerBrowse
                        • 95.216.147.179
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 88.198.246.242
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 88.198.246.242
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 88.198.246.242
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 88.198.246.242
                        Q3N5HdmTIp.exeGet hashmaliciousUnknownBrowse
                        • 148.251.198.84
                        mKv3sKQ5Q4E7waF.exeGet hashmaliciousFormBookBrowse
                        • 144.76.229.203
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 88.198.246.242
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        bd0bf25947d4a37404f0424edf4db9adLHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        ykshuami.ps1Get hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        1.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        valorant_ESP_aimbot.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        setup.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        Cb523jmji0.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        leFhB1aYaW.exeGet hashmaliciousDCRatBrowse
                        • 104.26.12.205
                        Loader.exeGet hashmaliciousUnknownBrowse
                        • 104.26.12.205
                        No context
                        No created / dropped files found
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):6.668299283121651
                        TrID:
                        • Win64 Executable GUI (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:EoN1VzwYYa.exe
                        File size:13'577'216 bytes
                        MD5:7994502ed5c8ffe9fc84e164b440124e
                        SHA1:3bf7c1be79c753352b5a6787fb10d84918897887
                        SHA256:d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11
                        SHA512:5f41ed0ff3f3e062815cca49d0a77842db11b24f39b46bdf658d7f9ca3b2a7f80c164f64d8b71a827e7c7c40f2b5a13c2a6c3a92f09a34f86eabe5110a458c1a
                        SSDEEP:196608:V28BF5UoykUxv987qMNR4Ok/RDpgPnqSuR3pfRkGJ6:Q8BhUxFUqMNR4Ok5DpgPnqSuR3pfRZ6
                        TLSH:B1D6AE5AA6B800D9D4BBC078CA965617E772741903F097DB269496F62F23BE03F3B740
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........0@XO^.XO^.XO^..7].PO^..7[..O^..7Z.JO^.H...YO^.H.].RO^.H.Z.HO^.H.[..O^...Z.iO^..7_.SO^.XO_..O^...[.nO^.....YO^...\.YO^.RichXO^
                        Icon Hash:90cececece8e8eb0
                        Entrypoint:0x1400bbf80
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x67D40276 [Fri Mar 14 10:18:30 2025 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:f9ce97f20d703221b13ec3bd8569d230
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007F0E387D5590h
                        dec eax
                        add esp, 28h
                        jmp 00007F0E387D47C7h
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov ebx, ecx
                        xor ecx, ecx
                        call dword ptr [0007A3DBh]
                        dec eax
                        mov ecx, ebx
                        call dword ptr [0007A3CAh]
                        call dword ptr [0007A0ACh]
                        dec eax
                        mov ecx, eax
                        mov edx, C0000409h
                        dec eax
                        add esp, 20h
                        pop ebx
                        dec eax
                        jmp dword ptr [0007A3C0h]
                        dec eax
                        mov dword ptr [esp+08h], ecx
                        dec eax
                        sub esp, 38h
                        mov ecx, 00000017h
                        call dword ptr [0007A3B4h]
                        test eax, eax
                        je 00007F0E387D49B9h
                        mov ecx, 00000002h
                        int 29h
                        dec eax
                        lea ecx, dword ptr [00C27482h]
                        call 00007F0E387D4C92h
                        dec eax
                        mov eax, dword ptr [esp+38h]
                        dec eax
                        mov dword ptr [00C27569h], eax
                        dec eax
                        lea eax, dword ptr [esp+38h]
                        dec eax
                        add eax, 08h
                        dec eax
                        mov dword ptr [00C274F9h], eax
                        dec eax
                        mov eax, dword ptr [00C27552h]
                        dec eax
                        mov dword ptr [00C273C3h], eax
                        dec eax
                        mov eax, dword ptr [esp+40h]
                        dec eax
                        mov dword ptr [00C274C7h], eax
                        mov dword ptr [00C2739Dh], C0000409h
                        mov dword ptr [00C27397h], 00000001h
                        mov dword ptr [00C273A1h], 00000001h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xcde5b40x78.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xcf40000x1e0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xce50000xec1c.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xcf50000x26f8.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xcbf5100x54.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0xcbf8000x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xcbf3d00x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x1360000x590.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x1349d40x134a00a3b42e0ff86ea6c3ab704c2cbc2b8f84False0.41648076777035237data6.493128631799101IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x1360000xba99760xba9a0044d55ca6bebccdcc357b3e9668236252unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xce00000x4efc0x2c007c11dab7c377a41e54d5ab621e7c6457False0.15589488636363635data3.8513984918201007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0xce50000xec1c0xee00676570f49f115683d33ac6c606741dddFalse0.5150177258403361data6.128961819448572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0xcf40000x1e00x200ce1e8897d6d8b0abaae67f545b439da5False0.53125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xcf50000x26f80x2800e5fd69a201c48e74f6a7abb28695ef93False0.641015625data6.31140498691491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_MANIFEST0xcf40600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                        DLLImport
                        ntdll.dllRtlLookupFunctionEntry, RtlCaptureContext, RtlVirtualUnwind, RtlPcToFileHeader, RtlUnwindEx, RtlLeaveCriticalSection, RtlEnterCriticalSection, NtAllocateVirtualMemory, LdrEnumerateLoadedModules, RtlUnwind
                        KERNEL32.dllGetCommandLineA, SetEndOfFile, LoadLibraryA, CreateDirectoryA, SetFileAttributesA, GetTempPathA, CloseHandle, WaitForSingleObject, CreateProcessA, GetCurrentProcess, GetModuleFileNameW, lstrcpyW, lstrcatW, GetLastError, VirtualProtect, VirtualQueryEx, ReadProcessMemory, WriteProcessMemory, GetSystemInfo, GetCommandLineW, VirtualFree, VirtualQuery, GetProcAddress, OutputDebugStringA, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, GetLargePageMinimum, GetTimeZoneInformation, GetOEMCP, GetACP, WriteConsoleW, SetStdHandle, OutputDebugStringW, GetProcessHeap, SetEnvironmentVariableW, GetEnvironmentStringsW, VirtualAlloc, DecodePointer, IsValidCodePage, SetConsoleCtrlHandler, HeapQueryInformation, HeapSize, HeapReAlloc, LocalFree, FormatMessageA, GetLocaleInfoEx, SetCurrentDirectoryW, GetCurrentDirectoryW, CreateDirectoryW, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetDiskFreeSpaceExW, GetFileAttributesW, GetFileAttributesExW, GetFileInformationByHandle, GetFinalPathNameByHandleW, GetFullPathNameW, SetFileAttributesW, SetFileInformationByHandle, SetFileTime, GetTempPathW, AreFileApisANSI, DeviceIoControl, GetModuleHandleW, CreateDirectoryExW, CopyFileW, MoveFileExW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, MultiByteToWideChar, WideCharToMultiByte, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetCurrentThreadId, InitializeCriticalSectionEx, EncodePointer, ReadConsoleW, LCMapStringEx, QueryPerformanceCounter, QueryPerformanceFrequency, InitOnceExecuteOnce, CreateEventExW, CreateSemaphoreExW, FlushProcessWriteBuffers, GetCurrentProcessorNumber, GetSystemTimeAsFileTime, GetTickCount64, FreeLibraryWhenCallbackReturns, CreateThreadpoolTimer, SetThreadpoolTimer, WaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, SetThreadpoolWait, CloseThreadpoolWait, GetStringTypeW, CompareStringEx, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, WakeAllConditionVariable, SleepConditionVariableSRW, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, InitializeSListHead, RaiseException, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetCurrentThread, HeapAlloc, HeapFree, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, FreeEnvironmentStringsW
                        SHELL32.dllSHGetKnownFolderPath
                        ole32.dllCoInitializeEx, CoUninitialize, CoTaskMemFree, CoGetObject
                        ADVAPI32.dllOpenProcessToken, GetTokenInformation
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 17, 2025 19:18:18.295763016 CET496957712192.168.2.646.4.119.125
                        Mar 17, 2025 19:18:18.300445080 CET77124969546.4.119.125192.168.2.6
                        Mar 17, 2025 19:18:18.300570011 CET496957712192.168.2.646.4.119.125
                        Mar 17, 2025 19:18:18.327708960 CET49698443192.168.2.6104.26.12.205
                        Mar 17, 2025 19:18:18.327753067 CET44349698104.26.12.205192.168.2.6
                        Mar 17, 2025 19:18:18.327807903 CET49698443192.168.2.6104.26.12.205
                        Mar 17, 2025 19:18:18.338799953 CET49698443192.168.2.6104.26.12.205
                        Mar 17, 2025 19:18:18.338818073 CET44349698104.26.12.205192.168.2.6
                        Mar 17, 2025 19:18:18.799602032 CET44349698104.26.12.205192.168.2.6
                        Mar 17, 2025 19:18:18.799789906 CET49698443192.168.2.6104.26.12.205
                        Mar 17, 2025 19:18:18.809005976 CET49698443192.168.2.6104.26.12.205
                        Mar 17, 2025 19:18:18.809077024 CET44349698104.26.12.205192.168.2.6
                        Mar 17, 2025 19:18:18.809156895 CET49698443192.168.2.6104.26.12.205
                        Mar 17, 2025 19:18:18.809478045 CET496957712192.168.2.646.4.119.125
                        Mar 17, 2025 19:18:18.814240932 CET77124969546.4.119.125192.168.2.6
                        Mar 17, 2025 19:18:19.004915953 CET77124969546.4.119.125192.168.2.6
                        Mar 17, 2025 19:18:19.046027899 CET496957712192.168.2.646.4.119.125
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 17, 2025 19:18:18.312633991 CET5727753192.168.2.61.1.1.1
                        Mar 17, 2025 19:18:18.320593119 CET53572771.1.1.1192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 17, 2025 19:18:18.312633991 CET192.168.2.61.1.1.10xc917Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 17, 2025 19:18:18.320593119 CET1.1.1.1192.168.2.60xc917No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                        Mar 17, 2025 19:18:18.320593119 CET1.1.1.1192.168.2.60xc917No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                        Mar 17, 2025 19:18:18.320593119 CET1.1.1.1192.168.2.60xc917No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to jump to process

                        Target ID:0
                        Start time:14:18:16
                        Start date:17/03/2025
                        Path:C:\Users\user\Desktop\EoN1VzwYYa.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\EoN1VzwYYa.exe"
                        Imagebase:0x7ff602030000
                        File size:13'577'216 bytes
                        MD5 hash:7994502ED5C8FFE9FC84E164B440124E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Target ID:2
                        Start time:14:18:17
                        Start date:17/03/2025
                        Path:C:\Users\user\Desktop\EoN1VzwYYa.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Users\user\Desktop\EoN1VzwYYa.exe
                        Imagebase:0x7ff602030000
                        File size:13'577'216 bytes
                        MD5 hash:7994502ED5C8FFE9FC84E164B440124E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Reset < >
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2499796284.00007FF602031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF602030000, based on PE: true
                          • Associated: 00000000.00000002.2499782456.00007FF602030000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2499876586.00007FF602166000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2499876586.00007FF602AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2499876586.00007FF602AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2499876586.00007FF602B07000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2500561876.00007FF602D10000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2500576765.00007FF602D11000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2500590759.00007FF602D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2500605334.00007FF602D15000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff602030000_EoN1VzwYYa.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 56ebb1c09139a98f3e47967b799df54b3e68fbe0086275fced64051825164333
                          • Instruction ID: d5152ebff8016934682213c7490283b1aca281753abb06c839c0efc9b3bf7834
                          • Opcode Fuzzy Hash: 56ebb1c09139a98f3e47967b799df54b3e68fbe0086275fced64051825164333
                          • Instruction Fuzzy Hash: F3114832B14B418AEB009B60E8842B837A4FB19758F040E35EA6D82BA8DFBCD1948340