Loading ...

Play interactive tourEdit tour

Windows Analysis Report TMB1fxNaqR

Overview

General Information

Sample Name:TMB1fxNaqR (renamed file extension from none to exe)
Analysis ID:458974
MD5:a92922a71a9bf58cc2d95a6039c9a1b6
SHA1:f419ba1e6da5dfc295857598e44b0a4eb0b3ecfc
SHA256:213ea943865069cf1210a58860c619a8fa8928258abe8919fee8180feafea547
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Creates processes via WMI
Contains functionality to dynamically determine API calls
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • TMB1fxNaqR.exe (PID: 1740 cmdline: 'C:\Users\user\Desktop\TMB1fxNaqR.exe' MD5: A92922A71A9BF58CC2D95A6039C9A1B6)
    • conhost.exe (PID: 2332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • TMB1fxNaqR.exe (PID: 4704 cmdline: 'C:\Users\user\Desktop\TMB1fxNaqR.exe' -a MD5: A92922A71A9BF58CC2D95A6039C9A1B6)
      • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: google.vrthcobj.comVirustotal: Detection: 7%Perma Link
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Temp\sqlite.dllVirustotal: Detection: 13%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: TMB1fxNaqR.exeVirustotal: Detection: 44%Perma Link
Source: TMB1fxNaqR.exeReversingLabs: Detection: 59%
Source: TMB1fxNaqR.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: unknownHTTPS traffic detected: 172.67.146.70:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: Binary string: D:\Administrator\Desktop\Qt5\Release\Qt5WebSockets.pdb source: sqlite.dll.2.dr

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 1948 DNS zone transfer UDP 192.168.2.3:58824 -> 34.97.69.225:53
Source: Joe Sandbox ViewIP Address: 172.67.146.70 172.67.146.70
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownDNS traffic detected: queries for: a.goatgame.co
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 172.67.146.70:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: TMB1fxNaqR.exe, 00000000.00000002.199960320.000000000075A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_004048FD
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\sqlite.dll 7250A8A1B98D09BE823CD6EFD30D85E5418DFC3541D220BB0694DFCC547478BD
Source: TMB1fxNaqR.exe, 00000000.00000002.200008451.00000000020F0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000000.00000000.197015002.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLicenseHelper.exe> vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000000.00000002.199945139.0000000000730000.00000002.00000001.sdmpBinary or memory string: originalfilename vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000000.00000002.199945139.0000000000730000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000002.00000002.215054840.00000000021B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000002.00000002.214734311.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLicenseHelper.exe> vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000002.00000002.215069964.0000000002200000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewinhttp.dll.muij% vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000002.00000002.215033311.0000000002110000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000002.00000002.215017751.0000000002100000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exe, 00000002.00000002.215012630.00000000020F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exeBinary or memory string: OriginalFilenameLicenseHelper.exe> vs TMB1fxNaqR.exe
Source: TMB1fxNaqR.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal76.winEXE@5/2@3/1
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_00401050 lstrcatW,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocString,SysAllocString,SysAllocString,SysAllocString,lstrlenW,lstrlenW,VariantClear,VariantClear,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,VariantClear,VariantClear,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5376:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2332:120:WilError_01
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeFile created: C:\Users\user\AppData\Local\Temp\sqlite.datJump to behavior
Source: TMB1fxNaqR.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: TMB1fxNaqR.exeVirustotal: Detection: 44%
Source: TMB1fxNaqR.exeReversingLabs: Detection: 59%
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeFile read: C:\Users\user\Desktop\TMB1fxNaqR.exe:Zone.IdentifierJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\TMB1fxNaqR.exe 'C:\Users\user\Desktop\TMB1fxNaqR.exe'
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeProcess created: C:\Users\user\Desktop\TMB1fxNaqR.exe 'C:\Users\user\Desktop\TMB1fxNaqR.exe' -a
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeProcess created: C:\Users\user\Desktop\TMB1fxNaqR.exe 'C:\Users\user\Desktop\TMB1fxNaqR.exe' -a
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: Binary string: D:\Administrator\Desktop\Qt5\Release\Qt5WebSockets.pdb source: sqlite.dll.2.dr
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_004018A0 LoadLibraryA,GetProcAddress,ShellExecuteExW,
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_004065A0 push eax; ret

Persistence and Installation Behavior:

barindex
Creates processes via WMIShow sources
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeFile created: C:\Users\user\AppData\Local\Temp\sqlite.dllJump to dropped file
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sqlite.dllJump to dropped file
Source: C:\Users\user\Desktop\TMB1fxNaqR.exe TID: 3148Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\TMB1fxNaqR.exe TID: 5076Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_004018A0 LoadLibraryA,GetProcAddress,ShellExecuteExW,
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_004053C0 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_004053D2 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeProcess created: C:\Users\user\Desktop\TMB1fxNaqR.exe 'C:\Users\user\Desktop\TMB1fxNaqR.exe' -a
Source: C:\Users\user\Desktop\TMB1fxNaqR.exeCode function: 0_2_0040268E EntryPoint,GetVersion,GetCommandLineA,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation11Path InterceptionProcess Injection11Virtualization/Sandbox Evasion1Input Capture1Security Software Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
TMB1fxNaqR.exe45%VirustotalBrowse
TMB1fxNaqR.exe59%ReversingLabsWin32.Trojan.Wacatac

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\sqlite.dll14%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\sqlite.dll15%ReversingLabsWin32.Trojan.Generic

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
google.vrthcobj.com8%VirustotalBrowse
a.goatgame.co2%VirustotalBrowse

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
google.vrthcobj.com
34.97.69.225
truetrueunknown
a.goatgame.co
172.67.146.70
truefalseunknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
172.67.146.70
a.goatgame.coUnited States
13335CLOUDFLARENETUSfalse

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:458974
Start date:03.08.2021
Start time:23:37:18
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 47s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:TMB1fxNaqR (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:27
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal76.winEXE@5/2@3/1
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 93.6%)
  • Quality average: 79.3%
  • Quality standard deviation: 28.9%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): audiodg.exe, dllhost.exe, BackgroundTransferHost.exe, rundll32.exe, backgroundTaskHost.exe, SgrmBroker.exe, svchost.exe, wuapihost.exe
  • TCP Packets have been reduced to 100
  • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 20.82.209.183, 20.189.173.20, 23.211.6.115, 104.43.193.48, 52.255.188.83
  • Excluded domains from analysis (whitelisted): www.bing.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, dual-a-0001.a-msedge.net, onedsblobprdwus15.westus.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Simulations

Behavior and APIs

TimeTypeDescription
23:38:09API Interceptor4x Sleep call for process: TMB1fxNaqR.exe modified

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
172.67.146.70LRios3pM39.exeGet hashmaliciousBrowse
    85d8c.exeGet hashmaliciousBrowse
      QfVER41Fwx.exeGet hashmaliciousBrowse
        O3h9kRdG7d.exeGet hashmaliciousBrowse
          1A263B2603212FF1E492D9E0C718F12601789E27EAABA.exeGet hashmaliciousBrowse
            U7HCBc2SVy.exeGet hashmaliciousBrowse
              76xAf6BYg8.exeGet hashmaliciousBrowse
                E4lwAiXNCE.exeGet hashmaliciousBrowse
                  pLF8TJmHlD.exeGet hashmaliciousBrowse

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    google.vrthcobj.comLRios3pM39.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    85d8c.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    QfVER41Fwx.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    93ejLcdBh5.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    k2VFD3gNGE.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    MIN56KgzBN.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    U7HCBc2SVy.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    TIoFSlDlv6.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    76xAf6BYg8.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    E4lwAiXNCE.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    pLF8TJmHlD.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    sonia_6.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    5H4iRfY1ek.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    Copy.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    pMVkvSyeIy.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    w7pR0EOMwd.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    BoLQVCmIZB.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    DhWFvSKvSb.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    U2HHCJvDj4.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    CLnraL1yNc.exeGet hashmaliciousBrowse
                    • 34.97.69.225
                    a.goatgame.coLRios3pM39.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    85d8c.exeGet hashmaliciousBrowse
                    • 104.21.79.144
                    85d8c.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    QfVER41Fwx.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    O3h9kRdG7d.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    puzlXYxqKK.exeGet hashmaliciousBrowse
                    • 104.21.79.144
                    k2VFD3gNGE.exeGet hashmaliciousBrowse
                    • 104.21.79.144
                    MIN56KgzBN.exeGet hashmaliciousBrowse
                    • 104.21.79.144
                    U7HCBc2SVy.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    TIoFSlDlv6.exeGet hashmaliciousBrowse
                    • 104.21.79.144
                    76xAf6BYg8.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    E4lwAiXNCE.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    pLF8TJmHlD.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    sonia_6.exeGet hashmaliciousBrowse
                    • 104.21.79.144

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    CLOUDFLARENETUSLRios3pM39.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    State Settlement Copy.htmlGet hashmaliciousBrowse
                    • 172.67.75.3
                    Request Quotation.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    invoice.vbsGet hashmaliciousBrowse
                    • 162.159.130.233
                    kKZZ0J8y0c.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    RFQ 29.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    ATT80307.HTMGet hashmaliciousBrowse
                    • 104.16.19.94
                    2C.TA9.HTMLGet hashmaliciousBrowse
                    • 104.18.11.207
                    Dosusign_Na_Sign.htmGet hashmaliciousBrowse
                    • 172.67.145.176
                    RoyalMail_Requestform0729.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    sbcss_Richard.DeNava_#inv0549387TWQYqzTPaYeqvaYMnpdIfJAwwzbguzauViQVRRplvOktNmAire.HTMGet hashmaliciousBrowse
                    • 104.16.18.94
                    Fake.HTMGet hashmaliciousBrowse
                    • 104.16.19.94
                    RoyalMail_Requestform1.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    Nouveau bon de commande. 3007021_pdf.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    MFS0175, MFS0117 MFS0194.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    ORIGINAL PROFORMA INVOICE COAU7220898130,PDF.exeGet hashmaliciousBrowse
                    • 172.67.176.89
                    Purchase Requirements.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    items.docGet hashmaliciousBrowse
                    • 104.21.19.200
                    ZI09484474344.exeGet hashmaliciousBrowse
                    • 104.21.49.41
                    #Ud83d#Udda8rocket.com 7335931#Ufffd90-queue-1675.htmGet hashmaliciousBrowse
                    • 104.16.19.94

                    JA3 Fingerprints

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    ce5f3254611a8c095a3d821d44539877LRios3pM39.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    24um7vU1BD.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    JQ2bNBDOcO.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    Dpwipnj1gx.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    19G1ZLyqr2.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    ULylDR5F36.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    SecuriteInfo.com.W32.AIDetect.malware2.26285.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    banload.msiGet hashmaliciousBrowse
                    • 172.67.146.70
                    yQShMhZ7Hi.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    zW4oE2ASRB.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    run.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    RNrtE1qOSL.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    hDJzf1oo7U.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    hpDcwMoScr.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    JGJtVyC9dr.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    QqcQ1EteWS.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    Ya50avl5OT.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    8xCetBLoAt.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    7xt9iOfzN2.exeGet hashmaliciousBrowse
                    • 172.67.146.70
                    5mTnLT28B7.exeGet hashmaliciousBrowse
                    • 172.67.146.70

                    Dropped Files

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    C:\Users\user\AppData\Local\Temp\sqlite.dllLRios3pM39.exeGet hashmaliciousBrowse
                      CyLELjM5zk.exeGet hashmaliciousBrowse
                        setup_x86_x64_install.exeGet hashmaliciousBrowse

                          Created / dropped Files

                          C:\Users\user\AppData\Local\Temp\sqlite.dat
                          Process:C:\Users\user\Desktop\TMB1fxNaqR.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):578669
                          Entropy (8bit):7.965453587440716
                          Encrypted:false
                          SSDEEP:12288:C11ticqWIMMXa2ad3KNjZi+VUYgokNxcg8aVg1gKtY7SQgCO:ePeBaRKNjoklalbVygKtY7xgd
                          MD5:C78BF51EE294161707A6766E71CEE582
                          SHA1:3BB4FF0B06FC5B3753AB39F21E959895834BF7F8
                          SHA-256:BE449F187EC6EE4C4FA40642E698FFA3BFA19EC08848F4E0273B70427A1F1FC2
                          SHA-512:B2D7D6D8C12B0DBDD677BC8ACD764AB0687E976268E46F461B98C5CF941197785B5D5718D2E3A734EAE49B0D358064EE23D9AAE217AF5F98DA5252A8A11D531D
                          Malicious:false
                          Reputation:low
                          Preview: .<..Hh.j...?...O}3..8v,)cml.T/.....V.r.....n.?y..oz#V......N.{.....!....Y."..)v.T.........Ub.V..*.)..8..,.%.{4.yWrA.a36&..,...V...l9.y....39.y...wW.j.ox.....I..;..%..p.b..>..j.....j..awT..r...j....o./.7...,=uk..i../h..j*j.P.j..?.-X.k..R}.j.5.b-F.k..c........j...j..Q?...).qe......,o'k.....j.J..))O.......k..\.....u,..k...,..k....k...tOT.X.jXe-.k..7.k...83U.......%..o.....Y%.....7.F.(j...KP..I..j..y...o..no......z......u/..DJP.e+.Dj..Z....k.......j$T.X.j[..`....o....k{..2|6...H.....c%..........z......~^..j.-s.....o.-........6.L.`.j.-s.....i|..y.Q'....k...}FT.X.jY..Y....o......y..=|6..%..z/........s....>.j.-s.k../.:..........>|/...h...2/..R..-......k....9.y.....j.6Z.j.o....l&..%.UD..`....&..t>".6g..j,..../W=..5...n.......X..h>.k..'...|/h..jfDX.S...`&*...Y....)U]bc[......'(..l..+....b.i....[...If!S...r......i.....Q^..*.....aeddT.`.'....*.[.h....e...?>....n....5......-..j..T..ow......k....-...k16.+i(~..L....j,...c.L./w=j...~./
                          C:\Users\user\AppData\Local\Temp\sqlite.dll
                          Process:C:\Users\user\Desktop\TMB1fxNaqR.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):81408
                          Entropy (8bit):6.295064838876099
                          Encrypted:false
                          SSDEEP:1536:jkOh0YR+kfbE+2AJk64OceTbkS9Co5sWzcdSzEdY+wJpxpbcNop//:jkcjHY+fJhPN9H2SIdY+wJpxpQ8//
                          MD5:05250AA12AD3C6A86DAB6DAB708D17FF
                          SHA1:E41AD72C9A43070BB11FD7411800F71DDDF6BDD8
                          SHA-256:7250A8A1B98D09BE823CD6EFD30D85E5418DFC3541D220BB0694DFCC547478BD
                          SHA-512:A56DF11AF5243150753154E1CBA74E3CDD0CDECF09269B88A3944AC12B73DE59909CE6DBBBD3B1B6DA691D144FAC2599645B2017F66BAC64A106437168EC38C8
                          Malicious:true
                          Antivirus:
                          • Antivirus: Virustotal, Detection: 14%, Browse
                          • Antivirus: ReversingLabs, Detection: 15%
                          Joe Sandbox View:
                          • Filename: LRios3pM39.exe, Detection: malicious, Browse
                          • Filename: CyLELjM5zk.exe, Detection: malicious, Browse
                          • Filename: setup_x86_x64_install.exe, Detection: malicious, Browse
                          Reputation:low
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V..f.x.5.x.5.x.5..r5.x.5..p5dx.5..q5.x.5@..4.x.5@..4.x.5@..4.x.5...5.x.5.x.5Jx.5...4.x.5...4.x.5..|5.x.5...4.x.5Rich.x.5........................PE..L...f@.a...........!................8........................................p............@..........................&..L...<'..(....P.......................`...... ...p...................0...........@............................................text...M........................... ..`.rdata...].......^..................@..@.data........0....... ..............@....rsrc........P.......(..............@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................

                          Static File Info

                          General

                          File type:PE32 executable (console) Intel 80386, for MS Windows
                          Entropy (8bit):4.581071120397606
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:TMB1fxNaqR.exe
                          File size:57344
                          MD5:a92922a71a9bf58cc2d95a6039c9a1b6
                          SHA1:f419ba1e6da5dfc295857598e44b0a4eb0b3ecfc
                          SHA256:213ea943865069cf1210a58860c619a8fa8928258abe8919fee8180feafea547
                          SHA512:0bb8f350ab4ba4570806b70e6bf82d986782d4635f5058eaf8c36550b1ba9e3bd6b6e5df098fbb9167dece0684bbae047824822bb55f54ee8a17993f29fd8007
                          SSDEEP:768:URFJRVA3O2pxNojkTnJQ6XWzQjkpC/xbjNxxuCqXKClZt9:MMoITVXGpC5bpHPmlZt9
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../Q..N?..N?..N?.CF`..N?..l4..N?.NR1..N?..h4..N?..h5..N?.NFb..N?..N>..N?..m...N?.Rich.N?.........PE..L...RF.a.................p.

                          File Icon

                          Icon Hash:00828e8e8686b000

                          Static PE Info

                          General

                          Entrypoint:0x40268e
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows cui
                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                          DLL Characteristics:
                          Time Stamp:0x61074652 [Mon Aug 2 01:11:46 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:2cdeda7a0aa27475a825e9c41d4d95f0

                          Entrypoint Preview

                          Instruction
                          push ebp
                          mov ebp, esp
                          push FFFFFFFFh
                          push 00408150h
                          push 00403E48h
                          mov eax, dword ptr fs:[00000000h]
                          push eax
                          mov dword ptr fs:[00000000h], esp
                          sub esp, 10h
                          push ebx
                          push esi
                          push edi
                          mov dword ptr [ebp-18h], esp
                          call dword ptr [00408050h]
                          xor edx, edx
                          mov dl, ah
                          mov dword ptr [0040CF70h], edx
                          mov ecx, eax
                          and ecx, 000000FFh
                          mov dword ptr [0040CF6Ch], ecx
                          shl ecx, 08h
                          add ecx, edx
                          mov dword ptr [0040CF68h], ecx
                          shr eax, 10h
                          mov dword ptr [0040CF64h], eax
                          push 00000001h
                          call 00007FE49C86475Bh
                          pop ecx
                          test eax, eax
                          jne 00007FE49C86306Ah
                          push 0000001Ch
                          call 00007FE49C863110h
                          pop ecx
                          call 00007FE49C863BC3h
                          test eax, eax
                          jne 00007FE49C86306Ah
                          push 00000010h
                          call 00007FE49C8630FFh
                          pop ecx
                          and dword ptr [ebp-04h], 00000000h
                          call 00007FE49C864403h
                          call dword ptr [0040804Ch]
                          mov dword ptr [0040D658h], eax
                          call 00007FE49C8642C1h
                          mov dword ptr [0040CF54h], eax
                          call 00007FE49C86406Ah
                          call 00007FE49C863FACh
                          call 00007FE49C863D0Fh
                          mov eax, dword ptr [0040CF80h]
                          mov dword ptr [0040CF84h], eax
                          push eax
                          push dword ptr [0040CF78h]
                          push dword ptr [0040CF74h]
                          call 00007FE49C862B32h
                          add esp, 0Ch

                          Rich Headers

                          Programming Language:
                          • [C++] VS98 (6.0) SP6 build 8804
                          • [ C ] VS98 (6.0) SP6 build 8804

                          Data Directories

                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x8af00x64.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x3d4.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x150.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                          Sections

                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x6bb70x7000False0.593296595982data6.44358253732IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x11860x2000False0.270629882812data3.63030337834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x365c0x3000False0.0801595052083data0.843436221473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                          .rsrc0xe0000x10000x1000False0.111083984375data1.09363315293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                          Resources

                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0xe0580x37cdataEnglishUnited States

                          Imports

                          DLLImport
                          KERNEL32.dllGetProcAddress, LoadLibraryA, lstrlenW, InterlockedDecrement, CloseHandle, WriteFile, CreateFileW, lstrcatW, GetModuleFileNameW, RaiseException, LocalFree, lstrlenA, InterlockedIncrement, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, MultiByteToWideChar, RtlUnwind, GetCommandLineA, GetVersion, ExitProcess, HeapFree, HeapAlloc, GetCurrentThreadId, TlsSetValue, TlsAlloc, SetLastError, TlsGetValue, GetLastError, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetModuleHandleA, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, IsBadWritePtr, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, IsBadReadPtr, IsBadCodePtr, GetCPInfo, GetACP, GetOEMCP, HeapSize
                          USER32.dllwsprintfW
                          ole32.dllCoInitializeSecurity, CoUninitialize, CoInitialize, CoCreateInstance, CoSetProxyBlanket
                          OLEAUT32.dllVariantInit, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayGetUBound, SafeArrayAccessData, SafeArrayUnaccessData, SysStringLen, SysAllocStringLen, SysAllocString, VariantClear, SysFreeString, GetErrorInfo

                          Version Infos

                          DescriptionData
                          LegalCopyrightCopyright (C) 1995-2018 VanDyke Software, Inc.
                          InternalNameLicense Helper
                          FileVersion8.5.0.1740
                          CompanyNameVanDyke Software, Inc.
                          Comments\$Revision: 122570 \$
                          ProductNameLicense Helper
                          ProductVersion8.5.0.1740
                          FileDescriptionLicense Helper
                          OriginalFilenameLicenseHelper.exe
                          Translation0x0409 0x04b0

                          Possible Origin

                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States

                          Network Behavior

                          Snort IDS Alerts

                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          08/03/21-23:38:25.660129UDP1948DNS zone transfer UDP5882453192.168.2.334.97.69.225
                          08/03/21-23:38:31.551839UDP1948DNS zone transfer UDP5882453192.168.2.334.97.69.225
                          08/03/21-23:38:39.386795UDP1948DNS zone transfer UDP5882453192.168.2.334.97.69.225
                          08/03/21-23:38:50.171576UDP1948DNS zone transfer UDP5882453192.168.2.334.97.69.225

                          Network Port Distribution

                          TCP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Aug 3, 2021 23:38:06.097122908 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.114178896 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.114345074 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.119462967 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.136428118 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.144661903 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.144718885 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.144751072 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.144821882 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.150866985 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.167779922 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.167906046 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.215509892 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.232352018 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769733906 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769762993 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769779921 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769804001 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769818068 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769840956 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769855976 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769893885 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769905090 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.769912004 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.769963026 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.769974947 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.769979954 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.770143032 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.770167112 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.770183086 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.770209074 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.770230055 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.770538092 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.770561934 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.770582914 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.770606041 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.770627975 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.770677090 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:06.771333933 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:06.811240911 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.030968904 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.030998945 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031023026 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031038046 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031059027 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031078100 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031090021 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031184912 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.031236887 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.031243086 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.031522989 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031546116 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031568050 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031590939 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.031598091 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.031620979 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.032304049 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.032377958 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.041439056 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041465998 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041485071 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041501999 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041523933 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041548967 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041564941 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041615009 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.041665077 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.041671991 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.041891098 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041918039 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041938066 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041956902 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.041964054 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.042023897 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.042691946 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.042717934 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.042741060 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.042763948 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.042768955 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.042800903 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.043505907 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.043582916 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.294538975 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.294569016 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.294590950 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.294611931 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.294626951 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.294715881 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.294802904 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.295092106 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.295165062 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.295166969 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.295197010 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.295249939 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.295593023 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.295634031 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.295669079 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.295691967 CEST49708443192.168.2.3172.67.146.70
                          Aug 3, 2021 23:38:07.295706987 CEST44349708172.67.146.70192.168.2.3
                          Aug 3, 2021 23:38:07.295763969 CEST49708443192.168.2.3172.67.146.70

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Aug 3, 2021 23:37:56.634107113 CEST6098553192.168.2.38.8.8.8
                          Aug 3, 2021 23:37:56.676135063 CEST53609858.8.8.8192.168.2.3
                          Aug 3, 2021 23:37:57.231653929 CEST5020053192.168.2.38.8.8.8
                          Aug 3, 2021 23:37:57.282186031 CEST53502008.8.8.8192.168.2.3
                          Aug 3, 2021 23:37:57.536907911 CEST5128153192.168.2.38.8.8.8
                          Aug 3, 2021 23:37:57.573438883 CEST53512818.8.8.8192.168.2.3
                          Aug 3, 2021 23:37:58.592097998 CEST4919953192.168.2.38.8.8.8
                          Aug 3, 2021 23:37:58.619740963 CEST53491998.8.8.8192.168.2.3
                          Aug 3, 2021 23:37:59.474395037 CEST5062053192.168.2.38.8.8.8
                          Aug 3, 2021 23:37:59.509958982 CEST53506208.8.8.8192.168.2.3
                          Aug 3, 2021 23:37:59.696528912 CEST6493853192.168.2.38.8.8.8
                          Aug 3, 2021 23:37:59.729441881 CEST53649388.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:01.026458025 CEST6015253192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:01.076482058 CEST53601528.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:01.869057894 CEST5754453192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:01.896617889 CEST53575448.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:03.027504921 CEST5598453192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:03.059770107 CEST53559848.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:04.618001938 CEST6418553192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:04.643836975 CEST53641858.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:05.781409025 CEST6511053192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:05.806092978 CEST53651108.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:06.049623966 CEST5836153192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:06.085091114 CEST53583618.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:06.987278938 CEST6349253192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:07.021372080 CEST53634928.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:07.800545931 CEST6083153192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:07.825484991 CEST53608318.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:08.934715986 CEST6010053192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:08.960048914 CEST53601008.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:09.537939072 CEST5319553192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:09.570741892 CEST53531958.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:10.155075073 CEST5014153192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:10.190376043 CEST53501418.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:11.050296068 CEST5302353192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:11.085692883 CEST53530238.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:12.071374893 CEST4956353192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:12.098846912 CEST53495638.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:13.260493994 CEST5135253192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:13.296123028 CEST53513528.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:13.925787926 CEST5934953192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:13.951874971 CEST53593498.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:14.363015890 CEST5708453192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:14.364244938 CEST5882353192.168.2.38.8.8.8
                          Aug 3, 2021 23:38:14.388151884 CEST53570848.8.8.8192.168.2.3
                          Aug 3, 2021 23:38:14.399341106 CEST53588238.8.8.8192.168.2.3

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Aug 3, 2021 23:38:06.049623966 CEST192.168.2.38.8.8.80x9251Standard query (0)a.goatgame.coA (IP address)IN (0x0001)
                          Aug 3, 2021 23:38:14.363015890 CEST192.168.2.38.8.8.80xc59Standard query (0)google.vrthcobj.comA (IP address)IN (0x0001)
                          Aug 3, 2021 23:38:14.364244938 CEST192.168.2.38.8.8.80x3308Standard query (0)google.vrthcobj.com28IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Aug 3, 2021 23:38:06.085091114 CEST8.8.8.8192.168.2.30x9251No error (0)a.goatgame.co172.67.146.70A (IP address)IN (0x0001)
                          Aug 3, 2021 23:38:06.085091114 CEST8.8.8.8192.168.2.30x9251No error (0)a.goatgame.co104.21.79.144A (IP address)IN (0x0001)
                          Aug 3, 2021 23:38:14.388151884 CEST8.8.8.8192.168.2.30xc59No error (0)google.vrthcobj.com34.97.69.225A (IP address)IN (0x0001)

                          HTTPS Packets

                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                          Aug 3, 2021 23:38:06.144718885 CEST172.67.146.70443192.168.2.349708CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IESun Jul 18 02:00:00 CEST 2021 Mon Jan 27 13:48:08 CET 2020Mon Jul 18 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                          CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:23:38:02
                          Start date:03/08/2021
                          Path:C:\Users\user\Desktop\TMB1fxNaqR.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\Desktop\TMB1fxNaqR.exe'
                          Imagebase:0x400000
                          File size:57344 bytes
                          MD5 hash:A92922A71A9BF58CC2D95A6039C9A1B6
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low

                          General

                          Start time:23:38:03
                          Start date:03/08/2021
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6b2800000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:23:38:03
                          Start date:03/08/2021
                          Path:C:\Users\user\Desktop\TMB1fxNaqR.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\Desktop\TMB1fxNaqR.exe' -a
                          Imagebase:0x400000
                          File size:57344 bytes
                          MD5 hash:A92922A71A9BF58CC2D95A6039C9A1B6
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low

                          General

                          Start time:23:38:04
                          Start date:03/08/2021
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6b2800000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Disassembly

                          Code Analysis

                          Reset < >