Loading ...

Play interactive tourEdit tour

Windows Analysis Report LRios3pM39

Overview

General Information

Sample Name:LRios3pM39 (renamed file extension from none to exe)
Analysis ID:458972
MD5:bbd9c29060936aa812c2b8aefb14258c
SHA1:6fea71fbb8f46179942b99101c5b66e6801d43e6
SHA256:469e5cd00ef10c7cdc37c647e0beca77e233ed11a5f34df087277a7ff3584a72
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Creates processes via WMI
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • LRios3pM39.exe (PID: 6960 cmdline: 'C:\Users\user\Desktop\LRios3pM39.exe' MD5: BBD9C29060936AA812C2B8AEFB14258C)
    • conhost.exe (PID: 6976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • LRios3pM39.exe (PID: 7064 cmdline: 'C:\Users\user\Desktop\LRios3pM39.exe' -a MD5: BBD9C29060936AA812C2B8AEFB14258C)
      • conhost.exe (PID: 7084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: google.vrthcobj.comVirustotal: Detection: 7%Perma Link
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Temp\sqlite.dllVirustotal: Detection: 13%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: LRios3pM39.exeVirustotal: Detection: 21%Perma Link
Source: LRios3pM39.exeReversingLabs: Detection: 57%
Source: LRios3pM39.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: unknownHTTPS traffic detected: 172.67.146.70:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: Binary string: D:\Administrator\Desktop\Qt5\Release\Qt5WebSockets.pdb source: LRios3pM39.exe, 00000002.00000003.660210552.0000000000658000.00000004.00000001.sdmp, sqlite.dll.2.dr

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 1948 DNS zone transfer UDP 192.168.2.4:61523 -> 34.97.69.225:53
Source: Joe Sandbox ViewIP Address: 172.67.146.70 172.67.146.70
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownDNS traffic detected: queries for: a.goatgame.co
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownHTTPS traffic detected: 172.67.146.70:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_004048ED
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\sqlite.dll 7250A8A1B98D09BE823CD6EFD30D85E5418DFC3541D220BB0694DFCC547478BD
Source: LRios3pM39.exe, 00000000.00000002.648380780.00000000021F0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000000.00000002.648151672.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLicenseHelper.exe> vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000002.00000002.662144820.00000000020B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000002.00000000.647874488.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLicenseHelper.exe> vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000002.00000002.662171088.00000000021F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000002.00000002.662159981.00000000020D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000002.00000003.660210552.0000000000658000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameQt5Gui.dll( vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000002.00000002.662179091.0000000002200000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewinhttp.dll.muij% vs LRios3pM39.exe
Source: LRios3pM39.exe, 00000002.00000002.662149645.00000000020C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs LRios3pM39.exe
Source: LRios3pM39.exeBinary or memory string: OriginalFilenameLicenseHelper.exe> vs LRios3pM39.exe
Source: LRios3pM39.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal76.winEXE@5/2@3/1
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_00401050 lstrcatW,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocString,SysAllocString,SysAllocString,SysAllocString,lstrlenW,lstrlenW,VariantClear,VariantClear,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,VariantClear,VariantClear,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6976:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7084:120:WilError_01
Source: C:\Users\user\Desktop\LRios3pM39.exeFile created: C:\Users\user\AppData\Local\Temp\sqlite.datJump to behavior
Source: LRios3pM39.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\LRios3pM39.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\user\Desktop\LRios3pM39.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\LRios3pM39.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\LRios3pM39.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\LRios3pM39.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: LRios3pM39.exeVirustotal: Detection: 21%
Source: LRios3pM39.exeReversingLabs: Detection: 57%
Source: C:\Users\user\Desktop\LRios3pM39.exeFile read: C:\Users\user\Desktop\LRios3pM39.exe:Zone.IdentifierJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\LRios3pM39.exe 'C:\Users\user\Desktop\LRios3pM39.exe'
Source: C:\Users\user\Desktop\LRios3pM39.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\LRios3pM39.exeProcess created: C:\Users\user\Desktop\LRios3pM39.exe 'C:\Users\user\Desktop\LRios3pM39.exe' -a
Source: C:\Users\user\Desktop\LRios3pM39.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\LRios3pM39.exeProcess created: C:\Users\user\Desktop\LRios3pM39.exe 'C:\Users\user\Desktop\LRios3pM39.exe' -a
Source: C:\Users\user\Desktop\LRios3pM39.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: Binary string: D:\Administrator\Desktop\Qt5\Release\Qt5WebSockets.pdb source: LRios3pM39.exe, 00000002.00000003.660210552.0000000000658000.00000004.00000001.sdmp, sqlite.dll.2.dr
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_004018A0 LoadLibraryA,GetProcAddress,ShellExecuteExW,
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_00406590 push eax; ret

Persistence and Installation Behavior:

barindex
Creates processes via WMIShow sources
Source: C:\Users\user\Desktop\LRios3pM39.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\user\Desktop\LRios3pM39.exeFile created: C:\Users\user\AppData\Local\Temp\sqlite.dllJump to dropped file
Source: C:\Users\user\Desktop\LRios3pM39.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\LRios3pM39.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sqlite.dllJump to dropped file
Source: C:\Users\user\Desktop\LRios3pM39.exe TID: 7144Thread sleep time: -60000s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_004018A0 LoadLibraryA,GetProcAddress,ShellExecuteExW,
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_004053C2 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_004053B0 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\LRios3pM39.exeProcess created: C:\Users\user\Desktop\LRios3pM39.exe 'C:\Users\user\Desktop\LRios3pM39.exe' -a
Source: C:\Users\user\Desktop\LRios3pM39.exeCode function: 0_2_0040267E EntryPoint,GetVersion,GetCommandLineA,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation11Path InterceptionProcess Injection11Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
LRios3pM39.exe22%VirustotalBrowse
LRios3pM39.exe57%ReversingLabsWin32.Trojan.Wacatac

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\sqlite.dll14%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\sqlite.dll15%ReversingLabsWin32.Trojan.Generic

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
google.vrthcobj.com8%VirustotalBrowse
a.goatgame.co2%VirustotalBrowse

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
google.vrthcobj.com
34.97.69.225
truetrueunknown
a.goatgame.co
172.67.146.70
truefalseunknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
172.67.146.70
a.goatgame.coUnited States
13335CLOUDFLARENETUSfalse

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:458972
Start date:03.08.2021
Start time:23:29:15
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 53s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:LRios3pM39 (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:23
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal76.winEXE@5/2@3/1
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 93.6%)
  • Quality average: 79.3%
  • Quality standard deviation: 29%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, rundll32.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
  • TCP Packets have been reduced to 100
  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 40.88.32.150, 104.43.139.144
  • Excluded domains from analysis (whitelisted): skypedataprdcoleus15.cloudapp.net, skypedataprdcolwus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, watson.telemetry.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Simulations

Behavior and APIs

TimeTypeDescription
23:30:08API Interceptor3x Sleep call for process: LRios3pM39.exe modified

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
172.67.146.7085d8c.exeGet hashmaliciousBrowse
    QfVER41Fwx.exeGet hashmaliciousBrowse
      O3h9kRdG7d.exeGet hashmaliciousBrowse
        1A263B2603212FF1E492D9E0C718F12601789E27EAABA.exeGet hashmaliciousBrowse
          U7HCBc2SVy.exeGet hashmaliciousBrowse
            76xAf6BYg8.exeGet hashmaliciousBrowse
              E4lwAiXNCE.exeGet hashmaliciousBrowse
                pLF8TJmHlD.exeGet hashmaliciousBrowse

                  Domains

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  google.vrthcobj.com85d8c.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  QfVER41Fwx.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  93ejLcdBh5.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  k2VFD3gNGE.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  MIN56KgzBN.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  U7HCBc2SVy.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  TIoFSlDlv6.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  76xAf6BYg8.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  E4lwAiXNCE.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  pLF8TJmHlD.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  sonia_6.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  5H4iRfY1ek.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  Copy.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  pMVkvSyeIy.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  w7pR0EOMwd.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  BoLQVCmIZB.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  DhWFvSKvSb.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  U2HHCJvDj4.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  CLnraL1yNc.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  UAD1AhRXY7.exeGet hashmaliciousBrowse
                  • 34.97.69.225
                  a.goatgame.co85d8c.exeGet hashmaliciousBrowse
                  • 104.21.79.144
                  85d8c.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  QfVER41Fwx.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  O3h9kRdG7d.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  puzlXYxqKK.exeGet hashmaliciousBrowse
                  • 104.21.79.144
                  k2VFD3gNGE.exeGet hashmaliciousBrowse
                  • 104.21.79.144
                  MIN56KgzBN.exeGet hashmaliciousBrowse
                  • 104.21.79.144
                  U7HCBc2SVy.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  TIoFSlDlv6.exeGet hashmaliciousBrowse
                  • 104.21.79.144
                  76xAf6BYg8.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  E4lwAiXNCE.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  pLF8TJmHlD.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  sonia_6.exeGet hashmaliciousBrowse
                  • 104.21.79.144

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  CLOUDFLARENETUSState Settlement Copy.htmlGet hashmaliciousBrowse
                  • 172.67.75.3
                  Request Quotation.exeGet hashmaliciousBrowse
                  • 172.67.188.154
                  invoice.vbsGet hashmaliciousBrowse
                  • 162.159.130.233
                  kKZZ0J8y0c.exeGet hashmaliciousBrowse
                  • 104.21.19.200
                  RFQ 29.exeGet hashmaliciousBrowse
                  • 104.21.19.200
                  ATT80307.HTMGet hashmaliciousBrowse
                  • 104.16.19.94
                  2C.TA9.HTMLGet hashmaliciousBrowse
                  • 104.18.11.207
                  Dosusign_Na_Sign.htmGet hashmaliciousBrowse
                  • 172.67.145.176
                  RoyalMail_Requestform0729.exeGet hashmaliciousBrowse
                  • 172.67.188.154
                  sbcss_Richard.DeNava_#inv0549387TWQYqzTPaYeqvaYMnpdIfJAwwzbguzauViQVRRplvOktNmAire.HTMGet hashmaliciousBrowse
                  • 104.16.18.94
                  Fake.HTMGet hashmaliciousBrowse
                  • 104.16.19.94
                  RoyalMail_Requestform1.exeGet hashmaliciousBrowse
                  • 172.67.188.154
                  Nouveau bon de commande. 3007021_pdf.exeGet hashmaliciousBrowse
                  • 23.227.38.74
                  MFS0175, MFS0117 MFS0194.exeGet hashmaliciousBrowse
                  • 172.67.188.154
                  ORIGINAL PROFORMA INVOICE COAU7220898130,PDF.exeGet hashmaliciousBrowse
                  • 172.67.176.89
                  Purchase Requirements.exeGet hashmaliciousBrowse
                  • 23.227.38.74
                  items.docGet hashmaliciousBrowse
                  • 104.21.19.200
                  ZI09484474344.exeGet hashmaliciousBrowse
                  • 104.21.49.41
                  #Ud83d#Udda8rocket.com 7335931#Ufffd90-queue-1675.htmGet hashmaliciousBrowse
                  • 104.16.19.94
                  ATT66004.HTMGet hashmaliciousBrowse
                  • 104.16.19.94

                  JA3 Fingerprints

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  ce5f3254611a8c095a3d821d4453987724um7vU1BD.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  JQ2bNBDOcO.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  Dpwipnj1gx.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  19G1ZLyqr2.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  ULylDR5F36.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  SecuriteInfo.com.W32.AIDetect.malware2.26285.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  banload.msiGet hashmaliciousBrowse
                  • 172.67.146.70
                  yQShMhZ7Hi.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  zW4oE2ASRB.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  run.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  RNrtE1qOSL.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  hDJzf1oo7U.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  hpDcwMoScr.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  JGJtVyC9dr.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  QqcQ1EteWS.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  Ya50avl5OT.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  8xCetBLoAt.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  7xt9iOfzN2.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  5mTnLT28B7.exeGet hashmaliciousBrowse
                  • 172.67.146.70
                  CknLcKyFEZ.exeGet hashmaliciousBrowse
                  • 172.67.146.70

                  Dropped Files

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  C:\Users\user\AppData\Local\Temp\sqlite.dllCyLELjM5zk.exeGet hashmaliciousBrowse
                    setup_x86_x64_install.exeGet hashmaliciousBrowse

                      Created / dropped Files

                      C:\Users\user\AppData\Local\Temp\sqlite.dat
                      Process:C:\Users\user\Desktop\LRios3pM39.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):578665
                      Entropy (8bit):7.9654565999316835
                      Encrypted:false
                      SSDEEP:12288:811ticqWIMMXa2ad3KNjU++VUYgokNxcg8aVg1gKtY7SQOO:YPeBaRKNjFklalbVygKtY7xx
                      MD5:9C6F0C8D94B0B9761A327548F56F6256
                      SHA1:E8BB880A2A8B8F40509CDE71F56F1D02CD58E03E
                      SHA-256:4706A707EDEB1B676C1C396345729DCA100F1FBEAF660DAAEA442C69403DB0D3
                      SHA-512:47E2A5BD6D8866CD86A0F5E38C913601092C28D0FB9CBF564C4D16C25918818E96CC303651EA7D3511716567B3E4785942FB567ACD7DB766975A53587F2DCCEE
                      Malicious:false
                      Reputation:low
                      Preview: .<..Hh.j...?...O}3..8v,)cml.T/.....V.r.....n.?y..oz#V......N.{.....!....Y."..)v.T.........Ub.V..*.)..8..,.%.{4.yWrA.a36&..,...V...l9.y....39.y...wW.j.ox.....I..;..%..p.b..>..j.....j..awT..r...j....o./.7...,=uk..i../h..j*j.P.j..?.-X.k..R}.j.5.b-F.k..c........j...j..Q?...).qe......,o'k.....j.J..))O.......k..\.....u,..k...,..k....k...tOT.X.jXe-.k..7.k...83U.......%..o.....Y%.....7.F.(j...KP..I..j..y...o..no......z......u/..DJP.e+.Dj..Z....k.......j$T.X.j[..`....o....k{..2|6...H.....c%..........z......~^..j.-s.....o.-........6.L.`.j.-s.....i|..y.Q'....k...}FT.X.jY..Y....o......y..=|6..%..z/........s....>.j.-s.k../.:..........>|/...h...2/..R..-......k....9.y.....j.6Z.j.o....l&..%.UD..`....&..t>".6g..j,..../W=..5...n.......X..h>.k..'...|/h..jfDX.S...`&*...Y....)U]bc[......'(..l..+....b.i....[...If!S...r......i.....Q^..*.....aeddT.`.'....*.[.h....e...?>....n....5......-..j..T..ow......k....-...k16.+i(~..L....j,...c.L./w=j...~./
                      C:\Users\user\AppData\Local\Temp\sqlite.dll
                      Process:C:\Users\user\Desktop\LRios3pM39.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):81408
                      Entropy (8bit):6.295064838876099
                      Encrypted:false
                      SSDEEP:1536:jkOh0YR+kfbE+2AJk64OceTbkS9Co5sWzcdSzEdY+wJpxpbcNop//:jkcjHY+fJhPN9H2SIdY+wJpxpQ8//
                      MD5:05250AA12AD3C6A86DAB6DAB708D17FF
                      SHA1:E41AD72C9A43070BB11FD7411800F71DDDF6BDD8
                      SHA-256:7250A8A1B98D09BE823CD6EFD30D85E5418DFC3541D220BB0694DFCC547478BD
                      SHA-512:A56DF11AF5243150753154E1CBA74E3CDD0CDECF09269B88A3944AC12B73DE59909CE6DBBBD3B1B6DA691D144FAC2599645B2017F66BAC64A106437168EC38C8
                      Malicious:true
                      Antivirus:
                      • Antivirus: Virustotal, Detection: 14%, Browse
                      • Antivirus: ReversingLabs, Detection: 15%
                      Joe Sandbox View:
                      • Filename: CyLELjM5zk.exe, Detection: malicious, Browse
                      • Filename: setup_x86_x64_install.exe, Detection: malicious, Browse
                      Reputation:low
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V..f.x.5.x.5.x.5..r5.x.5..p5dx.5..q5.x.5@..4.x.5@..4.x.5@..4.x.5...5.x.5.x.5Jx.5...4.x.5...4.x.5..|5.x.5...4.x.5Rich.x.5........................PE..L...f@.a...........!................8........................................p............@..........................&..L...<'..(....P.......................`...... ...p...................0...........@............................................text...M........................... ..`.rdata...].......^..................@..@.data........0....... ..............@....rsrc........P.......(..............@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................

                      Static File Info

                      General

                      File type:PE32 executable (console) Intel 80386, for MS Windows
                      Entropy (8bit):4.579085192120164
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:LRios3pM39.exe
                      File size:57344
                      MD5:bbd9c29060936aa812c2b8aefb14258c
                      SHA1:6fea71fbb8f46179942b99101c5b66e6801d43e6
                      SHA256:469e5cd00ef10c7cdc37c647e0beca77e233ed11a5f34df087277a7ff3584a72
                      SHA512:80d101a71f3d074be3053420158ed0d100dde722e77c6cfbbe0e462e1e5b6038e31efdb304d749b393e45de0e87dae957e39179acb9becdc609f7e0a23977ee3
                      SSDEEP:768:PQR+JJlY3yGJxNojkTnJI6TWzzejkZy/xbD9BxufhqXKCljb9:TAoITdT0Zy5bZXYmljb9
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../Q..N?..N?..N?.CF`..N?..l4..N?.NR1..N?..h4..N?..h5..N?.NFb..N?..N>..N?..m...N?.Rich.N?.........PE..L....E.a.................p.

                      File Icon

                      Icon Hash:00828e8e8686b000

                      Static PE Info

                      General

                      Entrypoint:0x40267e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      DLL Characteristics:
                      Time Stamp:0x610745F4 [Mon Aug 2 01:10:12 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:2cdeda7a0aa27475a825e9c41d4d95f0

                      Entrypoint Preview

                      Instruction
                      push ebp
                      mov ebp, esp
                      push FFFFFFFFh
                      push 00408150h
                      push 00403E38h
                      mov eax, dword ptr fs:[00000000h]
                      push eax
                      mov dword ptr fs:[00000000h], esp
                      sub esp, 10h
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [ebp-18h], esp
                      call dword ptr [00408050h]
                      xor edx, edx
                      mov dl, ah
                      mov dword ptr [0040CF70h], edx
                      mov ecx, eax
                      and ecx, 000000FFh
                      mov dword ptr [0040CF6Ch], ecx
                      shl ecx, 08h
                      add ecx, edx
                      mov dword ptr [0040CF68h], ecx
                      shr eax, 10h
                      mov dword ptr [0040CF64h], eax
                      push 00000001h
                      call 00007F7EE483BFCBh
                      pop ecx
                      test eax, eax
                      jne 00007F7EE483A8DAh
                      push 0000001Ch
                      call 00007F7EE483A980h
                      pop ecx
                      call 00007F7EE483B433h
                      test eax, eax
                      jne 00007F7EE483A8DAh
                      push 00000010h
                      call 00007F7EE483A96Fh
                      pop ecx
                      and dword ptr [ebp-04h], 00000000h
                      call 00007F7EE483BC73h
                      call dword ptr [0040804Ch]
                      mov dword ptr [0040D658h], eax
                      call 00007F7EE483BB31h
                      mov dword ptr [0040CF54h], eax
                      call 00007F7EE483B8DAh
                      call 00007F7EE483B81Ch
                      call 00007F7EE483B57Fh
                      mov eax, dword ptr [0040CF80h]
                      mov dword ptr [0040CF84h], eax
                      push eax
                      push dword ptr [0040CF78h]
                      push dword ptr [0040CF74h]
                      call 00007F7EE483A3A2h
                      add esp, 0Ch

                      Rich Headers

                      Programming Language:
                      • [C++] VS98 (6.0) SP6 build 8804
                      • [ C ] VS98 (6.0) SP6 build 8804

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8af00x64.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x3d4.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x150.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x6ba70x7000False0.592808314732data6.44090698985IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x80000x11860x2000False0.27001953125data3.62785728692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xa0000x365c0x3000False0.0802408854167data0.841200769543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .rsrc0xe0000x10000x1000False0.111083984375data1.09363315293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_VERSION0xe0580x37cdataEnglishUnited States

                      Imports

                      DLLImport
                      KERNEL32.dllGetProcAddress, LoadLibraryA, lstrlenW, InterlockedDecrement, CloseHandle, WriteFile, CreateFileW, lstrcatW, GetModuleFileNameW, RaiseException, LocalFree, lstrlenA, InterlockedIncrement, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, MultiByteToWideChar, RtlUnwind, GetCommandLineA, GetVersion, ExitProcess, HeapFree, HeapAlloc, GetCurrentThreadId, TlsSetValue, TlsAlloc, SetLastError, TlsGetValue, GetLastError, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetModuleHandleA, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, IsBadWritePtr, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, IsBadReadPtr, IsBadCodePtr, GetCPInfo, GetACP, GetOEMCP, HeapSize
                      USER32.dllwsprintfW
                      ole32.dllCoInitializeSecurity, CoUninitialize, CoInitialize, CoCreateInstance, CoSetProxyBlanket
                      OLEAUT32.dllVariantInit, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayGetUBound, SafeArrayAccessData, SafeArrayUnaccessData, SysStringLen, SysAllocStringLen, SysAllocString, VariantClear, SysFreeString, GetErrorInfo

                      Version Infos

                      DescriptionData
                      LegalCopyrightCopyright (C) 1995-2018 VanDyke Software, Inc.
                      InternalNameLicense Helper
                      FileVersion8.5.0.1740
                      CompanyNameVanDyke Software, Inc.
                      Comments\$Revision: 122570 \$
                      ProductNameLicense Helper
                      ProductVersion8.5.0.1740
                      FileDescriptionLicense Helper
                      OriginalFilenameLicenseHelper.exe
                      Translation0x0409 0x04b0

                      Possible Origin

                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States

                      Network Behavior

                      Snort IDS Alerts

                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      08/03/21-23:30:25.906443UDP1948DNS zone transfer UDP6152353192.168.2.434.97.69.225
                      08/03/21-23:30:32.336214UDP1948DNS zone transfer UDP6152353192.168.2.434.97.69.225
                      08/03/21-23:30:45.138738UDP1948DNS zone transfer UDP6152353192.168.2.434.97.69.225
                      08/03/21-23:30:52.389943UDP1948DNS zone transfer UDP6152353192.168.2.434.97.69.225
                      08/03/21-23:30:58.627455ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.434.97.69.225
                      08/03/21-23:30:59.347406ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.434.97.69.225
                      08/03/21-23:31:00.428363ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.434.97.69.225
                      08/03/21-23:31:02.050949ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.434.97.69.225
                      08/03/21-23:31:03.007850ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.434.97.69.225

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Aug 3, 2021 23:30:05.307374001 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.324290037 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.324474096 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.328849077 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.345643997 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.349910975 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.349936008 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.349947929 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.350028992 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.357999086 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.374893904 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.376185894 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.426561117 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.440557003 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.457418919 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.991862059 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.991976023 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992001057 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992023945 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992038965 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992060900 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992082119 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992108107 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992130995 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.992340088 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:05.993311882 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.993371964 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.993395090 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.993412971 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.993432999 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:05.993781090 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.248852968 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.248888969 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.248912096 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.248923063 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.248992920 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.249017954 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.249033928 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.249066114 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.249093056 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.249475956 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.249505997 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.249528885 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.249551058 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.249566078 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.249712944 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.250284910 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.250382900 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.250983953 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251009941 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251044035 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251059055 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251091003 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.251127958 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.251254082 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251276970 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251291037 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251358986 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.251729965 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251754999 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251775026 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251796007 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.251820087 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.251868963 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.252494097 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.252566099 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.252583027 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.252636909 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.252655983 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.252774000 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.252796888 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.252819061 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.252834082 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.252882957 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.252896070 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.253429890 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.301661968 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.504026890 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504053116 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504065037 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504071951 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504200935 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.504245043 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504261971 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504272938 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504334927 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.504657984 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504673958 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504744053 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.504981995 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.504996061 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.505039930 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.505115032 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.505132914 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.505148888 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.505165100 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.505214930 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.505250931 CEST49739443192.168.2.4172.67.146.70
                      Aug 3, 2021 23:30:06.505769014 CEST44349739172.67.146.70192.168.2.4
                      Aug 3, 2021 23:30:06.505808115 CEST44349739172.67.146.70192.168.2.4

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Aug 3, 2021 23:29:55.561557055 CEST5802853192.168.2.48.8.8.8
                      Aug 3, 2021 23:29:55.590217113 CEST53580288.8.8.8192.168.2.4
                      Aug 3, 2021 23:29:56.562306881 CEST5309753192.168.2.48.8.8.8
                      Aug 3, 2021 23:29:56.594803095 CEST53530978.8.8.8192.168.2.4
                      Aug 3, 2021 23:29:57.433166981 CEST4925753192.168.2.48.8.8.8
                      Aug 3, 2021 23:29:57.468291998 CEST53492578.8.8.8192.168.2.4
                      Aug 3, 2021 23:29:58.369524002 CEST6238953192.168.2.48.8.8.8
                      Aug 3, 2021 23:29:58.403479099 CEST53623898.8.8.8192.168.2.4
                      Aug 3, 2021 23:29:59.030754089 CEST4991053192.168.2.48.8.8.8
                      Aug 3, 2021 23:29:59.055938005 CEST53499108.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:00.170743942 CEST5585453192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:00.206274033 CEST53558548.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:00.866367102 CEST6454953192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:00.901896000 CEST53645498.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:01.905112028 CEST6315353192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:01.933101892 CEST53631538.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:02.607628107 CEST5299153192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:02.632546902 CEST53529918.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:03.644952059 CEST5370053192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:03.675741911 CEST53537008.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:04.500962973 CEST5172653192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:04.533834934 CEST53517268.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:05.245203018 CEST5679453192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:05.253396034 CEST5653453192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:05.280611992 CEST53567948.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:05.290131092 CEST53565348.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:06.291057110 CEST5662753192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:06.316445112 CEST53566278.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:07.023241043 CEST5662153192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:07.055711985 CEST53566218.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:08.034720898 CEST6311653192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:08.070385933 CEST53631168.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:08.872760057 CEST6407853192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:08.907968044 CEST53640788.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:09.665730953 CEST6480153192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:09.698440075 CEST53648018.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:10.310719013 CEST6172153192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:10.346422911 CEST53617218.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:13.649374962 CEST5125553192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:13.650245905 CEST6152253192.168.2.48.8.8.8
                      Aug 3, 2021 23:30:13.678105116 CEST53615228.8.8.8192.168.2.4
                      Aug 3, 2021 23:30:13.681931973 CEST53512558.8.8.8192.168.2.4

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Aug 3, 2021 23:30:05.253396034 CEST192.168.2.48.8.8.80x2608Standard query (0)a.goatgame.coA (IP address)IN (0x0001)
                      Aug 3, 2021 23:30:13.649374962 CEST192.168.2.48.8.8.80x59c6Standard query (0)google.vrthcobj.comA (IP address)IN (0x0001)
                      Aug 3, 2021 23:30:13.650245905 CEST192.168.2.48.8.8.80x7714Standard query (0)google.vrthcobj.com28IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Aug 3, 2021 23:30:05.290131092 CEST8.8.8.8192.168.2.40x2608No error (0)a.goatgame.co172.67.146.70A (IP address)IN (0x0001)
                      Aug 3, 2021 23:30:05.290131092 CEST8.8.8.8192.168.2.40x2608No error (0)a.goatgame.co104.21.79.144A (IP address)IN (0x0001)
                      Aug 3, 2021 23:30:13.681931973 CEST8.8.8.8192.168.2.40x59c6No error (0)google.vrthcobj.com34.97.69.225A (IP address)IN (0x0001)

                      HTTPS Packets

                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                      Aug 3, 2021 23:30:05.349936008 CEST172.67.146.70443192.168.2.449739CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IESun Jul 18 02:00:00 CEST 2021 Mon Jan 27 13:48:08 CET 2020Mon Jul 18 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                      CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:23:30:01
                      Start date:03/08/2021
                      Path:C:\Users\user\Desktop\LRios3pM39.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\Desktop\LRios3pM39.exe'
                      Imagebase:0x400000
                      File size:57344 bytes
                      MD5 hash:BBD9C29060936AA812C2B8AEFB14258C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low

                      General

                      Start time:23:30:02
                      Start date:03/08/2021
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff724c50000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:23:30:03
                      Start date:03/08/2021
                      Path:C:\Users\user\Desktop\LRios3pM39.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\Desktop\LRios3pM39.exe' -a
                      Imagebase:0x400000
                      File size:57344 bytes
                      MD5 hash:BBD9C29060936AA812C2B8AEFB14258C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low

                      General

                      Start time:23:30:04
                      Start date:03/08/2021
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff724c50000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Disassembly

                      Code Analysis

                      Reset < >