Windows
Analysis Report
EoN1VzwYYa.exe
Overview
General Information
Sample name: | EoN1VzwYYa.exerenamed because original name is a hash value |
Original sample name: | d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11.exe |
Analysis ID: | 1640835 |
MD5: | 7994502ed5c8ffe9fc84e164b440124e |
SHA1: | 3bf7c1be79c753352b5a6787fb10d84918897887 |
SHA256: | d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11 |
Tags: | 46-4-119-125exeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
EoN1VzwYYa.exe (PID: 6536 cmdline:
"C:\Users\ user\Deskt op\EoN1Vzw YYa.exe" MD5: 7994502ED5C8FFE9FC84E164B440124E)
EoN1VzwYYa.exe (PID: 4652 cmdline:
C:\Users\u ser\Deskto p\EoN1VzwY Ya.exe MD5: 7994502ED5C8FFE9FC84E164B440124E)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Binary or memory string: | memstr_2585039d-7 |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 0_2_00007FF6020ECB64 |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 Scheduled Task/Job | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 1 DLL Side-Loading | LSASS Memory | 1 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | Obfuscated Files or Information | Security Account Manager | 3 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 1 System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
33% | Virustotal | Browse | ||
33% | ReversingLabs | Win64.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ipify.org | 104.26.12.205 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
46.4.119.125 | unknown | Germany | 24940 | HETZNER-ASDE | false | |
104.26.12.205 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1640835 |
Start date and time: | 2025-03-17 19:17:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | EoN1VzwYYa.exerenamed because original name is a hash value |
Original Sample Name: | d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11.exe |
Detection: | MAL |
Classification: | mal48.winEXE@2/0@1/3 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 23.60.203.209, 4.245.163.56
- Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target EoN1VzwYYa.exe, PID 6536 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
19:18:17 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
46.4.119.125 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
104.26.12.205 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.ipify.org | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Globeimposter | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
HETZNER-ASDE | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | WhiteSnake Stealer | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Prometei | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bd0bf25947d4a37404f0424edf4db9ad | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 6.668299283121651 |
TrID: |
|
File name: | EoN1VzwYYa.exe |
File size: | 13'577'216 bytes |
MD5: | 7994502ed5c8ffe9fc84e164b440124e |
SHA1: | 3bf7c1be79c753352b5a6787fb10d84918897887 |
SHA256: | d6dc19434f42ead855996f06f8292266d3dcedeab440f7ddd9f1710badcf5c11 |
SHA512: | 5f41ed0ff3f3e062815cca49d0a77842db11b24f39b46bdf658d7f9ca3b2a7f80c164f64d8b71a827e7c7c40f2b5a13c2a6c3a92f09a34f86eabe5110a458c1a |
SSDEEP: | 196608:V28BF5UoykUxv987qMNR4Ok/RDpgPnqSuR3pfRkGJ6:Q8BhUxFUqMNR4Ok5DpgPnqSuR3pfRZ6 |
TLSH: | B1D6AE5AA6B800D9D4BBC078CA965617E772741903F097DB269496F62F23BE03F3B740 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........0@XO^.XO^.XO^..7].PO^..7[..O^..7Z.JO^.H...YO^.H.].RO^.H.Z.HO^.H.[..O^...Z.iO^..7_.SO^.XO_..O^...[.nO^.....YO^...\.YO^.RichXO^ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x1400bbf80 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67D40276 [Fri Mar 14 10:18:30 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | f9ce97f20d703221b13ec3bd8569d230 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F0E387D5590h |
dec eax |
add esp, 28h |
jmp 00007F0E387D47C7h |
int3 |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, ecx |
xor ecx, ecx |
call dword ptr [0007A3DBh] |
dec eax |
mov ecx, ebx |
call dword ptr [0007A3CAh] |
call dword ptr [0007A0ACh] |
dec eax |
mov ecx, eax |
mov edx, C0000409h |
dec eax |
add esp, 20h |
pop ebx |
dec eax |
jmp dword ptr [0007A3C0h] |
dec eax |
mov dword ptr [esp+08h], ecx |
dec eax |
sub esp, 38h |
mov ecx, 00000017h |
call dword ptr [0007A3B4h] |
test eax, eax |
je 00007F0E387D49B9h |
mov ecx, 00000002h |
int 29h |
dec eax |
lea ecx, dword ptr [00C27482h] |
call 00007F0E387D4C92h |
dec eax |
mov eax, dword ptr [esp+38h] |
dec eax |
mov dword ptr [00C27569h], eax |
dec eax |
lea eax, dword ptr [esp+38h] |
dec eax |
add eax, 08h |
dec eax |
mov dword ptr [00C274F9h], eax |
dec eax |
mov eax, dword ptr [00C27552h] |
dec eax |
mov dword ptr [00C273C3h], eax |
dec eax |
mov eax, dword ptr [esp+40h] |
dec eax |
mov dword ptr [00C274C7h], eax |
mov dword ptr [00C2739Dh], C0000409h |
mov dword ptr [00C27397h], 00000001h |
mov dword ptr [00C273A1h], 00000001h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcde5b4 | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xcf4000 | 0x1e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xce5000 | 0xec1c | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xcf5000 | 0x26f8 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xcbf510 | 0x54 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xcbf800 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xcbf3d0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x136000 | 0x590 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1349d4 | 0x134a00 | a3b42e0ff86ea6c3ab704c2cbc2b8f84 | False | 0.41648076777035237 | data | 6.493128631799101 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x136000 | 0xba9976 | 0xba9a00 | 44d55ca6bebccdcc357b3e9668236252 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xce0000 | 0x4efc | 0x2c00 | 7c11dab7c377a41e54d5ab621e7c6457 | False | 0.15589488636363635 | data | 3.8513984918201007 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xce5000 | 0xec1c | 0xee00 | 676570f49f115683d33ac6c606741ddd | False | 0.5150177258403361 | data | 6.128961819448572 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xcf4000 | 0x1e0 | 0x200 | ce1e8897d6d8b0abaae67f545b439da5 | False | 0.53125 | data | 4.7176788329467545 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xcf5000 | 0x26f8 | 0x2800 | e5fd69a201c48e74f6a7abb28695ef93 | False | 0.641015625 | data | 6.31140498691491 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0xcf4060 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
ntdll.dll | RtlLookupFunctionEntry, RtlCaptureContext, RtlVirtualUnwind, RtlPcToFileHeader, RtlUnwindEx, RtlLeaveCriticalSection, RtlEnterCriticalSection, NtAllocateVirtualMemory, LdrEnumerateLoadedModules, RtlUnwind |
KERNEL32.dll | GetCommandLineA, SetEndOfFile, LoadLibraryA, CreateDirectoryA, SetFileAttributesA, GetTempPathA, CloseHandle, WaitForSingleObject, CreateProcessA, GetCurrentProcess, GetModuleFileNameW, lstrcpyW, lstrcatW, GetLastError, VirtualProtect, VirtualQueryEx, ReadProcessMemory, WriteProcessMemory, GetSystemInfo, GetCommandLineW, VirtualFree, VirtualQuery, GetProcAddress, OutputDebugStringA, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, GetLargePageMinimum, GetTimeZoneInformation, GetOEMCP, GetACP, WriteConsoleW, SetStdHandle, OutputDebugStringW, GetProcessHeap, SetEnvironmentVariableW, GetEnvironmentStringsW, VirtualAlloc, DecodePointer, IsValidCodePage, SetConsoleCtrlHandler, HeapQueryInformation, HeapSize, HeapReAlloc, LocalFree, FormatMessageA, GetLocaleInfoEx, SetCurrentDirectoryW, GetCurrentDirectoryW, CreateDirectoryW, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetDiskFreeSpaceExW, GetFileAttributesW, GetFileAttributesExW, GetFileInformationByHandle, GetFinalPathNameByHandleW, GetFullPathNameW, SetFileAttributesW, SetFileInformationByHandle, SetFileTime, GetTempPathW, AreFileApisANSI, DeviceIoControl, GetModuleHandleW, CreateDirectoryExW, CopyFileW, MoveFileExW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, MultiByteToWideChar, WideCharToMultiByte, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetCurrentThreadId, InitializeCriticalSectionEx, EncodePointer, ReadConsoleW, LCMapStringEx, QueryPerformanceCounter, QueryPerformanceFrequency, InitOnceExecuteOnce, CreateEventExW, CreateSemaphoreExW, FlushProcessWriteBuffers, GetCurrentProcessorNumber, GetSystemTimeAsFileTime, GetTickCount64, FreeLibraryWhenCallbackReturns, CreateThreadpoolTimer, SetThreadpoolTimer, WaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, SetThreadpoolWait, CloseThreadpoolWait, GetStringTypeW, CompareStringEx, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, WakeAllConditionVariable, SleepConditionVariableSRW, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, InitializeSListHead, RaiseException, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetCurrentThread, HeapAlloc, HeapFree, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, FreeEnvironmentStringsW |
SHELL32.dll | SHGetKnownFolderPath |
ole32.dll | CoInitializeEx, CoUninitialize, CoTaskMemFree, CoGetObject |
ADVAPI32.dll | OpenProcessToken, GetTokenInformation |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 17, 2025 19:18:18.295763016 CET | 49695 | 7712 | 192.168.2.6 | 46.4.119.125 |
Mar 17, 2025 19:18:18.300445080 CET | 7712 | 49695 | 46.4.119.125 | 192.168.2.6 |
Mar 17, 2025 19:18:18.300570011 CET | 49695 | 7712 | 192.168.2.6 | 46.4.119.125 |
Mar 17, 2025 19:18:18.327708960 CET | 49698 | 443 | 192.168.2.6 | 104.26.12.205 |
Mar 17, 2025 19:18:18.327753067 CET | 443 | 49698 | 104.26.12.205 | 192.168.2.6 |
Mar 17, 2025 19:18:18.327807903 CET | 49698 | 443 | 192.168.2.6 | 104.26.12.205 |
Mar 17, 2025 19:18:18.338799953 CET | 49698 | 443 | 192.168.2.6 | 104.26.12.205 |
Mar 17, 2025 19:18:18.338818073 CET | 443 | 49698 | 104.26.12.205 | 192.168.2.6 |
Mar 17, 2025 19:18:18.799602032 CET | 443 | 49698 | 104.26.12.205 | 192.168.2.6 |
Mar 17, 2025 19:18:18.799789906 CET | 49698 | 443 | 192.168.2.6 | 104.26.12.205 |
Mar 17, 2025 19:18:18.809005976 CET | 49698 | 443 | 192.168.2.6 | 104.26.12.205 |
Mar 17, 2025 19:18:18.809077024 CET | 443 | 49698 | 104.26.12.205 | 192.168.2.6 |
Mar 17, 2025 19:18:18.809156895 CET | 49698 | 443 | 192.168.2.6 | 104.26.12.205 |
Mar 17, 2025 19:18:18.809478045 CET | 49695 | 7712 | 192.168.2.6 | 46.4.119.125 |
Mar 17, 2025 19:18:18.814240932 CET | 7712 | 49695 | 46.4.119.125 | 192.168.2.6 |
Mar 17, 2025 19:18:19.004915953 CET | 7712 | 49695 | 46.4.119.125 | 192.168.2.6 |
Mar 17, 2025 19:18:19.046027899 CET | 49695 | 7712 | 192.168.2.6 | 46.4.119.125 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 17, 2025 19:18:18.312633991 CET | 57277 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 17, 2025 19:18:18.320593119 CET | 53 | 57277 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 17, 2025 19:18:18.312633991 CET | 192.168.2.6 | 1.1.1.1 | 0xc917 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 17, 2025 19:18:18.320593119 CET | 1.1.1.1 | 192.168.2.6 | 0xc917 | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 19:18:18.320593119 CET | 1.1.1.1 | 192.168.2.6 | 0xc917 | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 19:18:18.320593119 CET | 1.1.1.1 | 192.168.2.6 | 0xc917 | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 14:18:16 |
Start date: | 17/03/2025 |
Path: | C:\Users\user\Desktop\EoN1VzwYYa.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff602030000 |
File size: | 13'577'216 bytes |
MD5 hash: | 7994502ED5C8FFE9FC84E164B440124E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 14:18:17 |
Start date: | 17/03/2025 |
Path: | C:\Users\user\Desktop\EoN1VzwYYa.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff602030000 |
File size: | 13'577'216 bytes |
MD5 hash: | 7994502ED5C8FFE9FC84E164B440124E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Function 00007FF6020ECB64 Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|