Loading ...

Play interactive tourEdit tour

Windows Analysis Report T3AtsGGHEL.exe

Overview

General Information

Sample Name:T3AtsGGHEL.exe
Analysis ID:534006
MD5:89611c7a85fb5ccd4dd7edc076bc4ee8
SHA1:a29812244684e248d7fe4f9e65e180bb4cd3098a
SHA256:a5cf8668fc9624b386bbdad3a3dba28c029945048a7d15a0b0ee41dfe9e0a2df
Tags:exeSmokeLoader
Infos:

Most interesting Screenshot:

Errors
  • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Backup Database
  • Sigma runtime error: Invalid condition: all of selection* Rule: Stop Or Remove Antivirus Service
  • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Volume Shadow Listing
  • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With 7-ZIP
  • Sigma runtime error: Invalid condition: all of selection* Rule: Disable or Delete Windows Eventlog
  • Sigma runtime error: Invalid condition: all of selection* Rule: PowerShell SAM Copy
  • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With WINZIP

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for domain / URL
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware

Classification

Process Tree

  • System is w10x64
  • T3AtsGGHEL.exe (PID: 6980 cmdline: "C:\Users\user\Desktop\T3AtsGGHEL.exe" MD5: 89611C7A85FB5CCD4DD7EDC076BC4EE8)
    • conhost.exe (PID: 7044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: T3AtsGGHEL.exeVirustotal: Detection: 60%Perma Link
Source: T3AtsGGHEL.exeReversingLabs: Detection: 48%
Multi AV Scanner detection for domain / URLShow sources
Source: wfsdragon.ruVirustotal: Detection: 5%Perma Link
Source: http://wfsdragon.ru/api/setStats.phpVirustotal: Detection: 6%Perma Link
Machine Learning detection for sampleShow sources
Source: T3AtsGGHEL.exeJoe Sandbox ML: detected
Source: T3AtsGGHEL.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: T3AtsGGHEL.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00ECA061 FindFirstFileExW,

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 2010595 ET MALWARE User-Agent (???) 192.168.2.3:49741 -> 212.193.30.45:80
Source: TrafficSnort IDS: 2010595 ET MALWARE User-Agent (???) 192.168.2.3:49742 -> 172.67.133.215:80
Source: Joe Sandbox ViewASN Name: SPD-NETTR SPD-NETTR
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewIP Address: 212.193.30.45 212.193.30.45
Source: Joe Sandbox ViewIP Address: 172.67.133.215 172.67.133.215
Source: Joe Sandbox ViewIP Address: 172.67.133.215 172.67.133.215
Source: unknownTCP traffic detected without corresponding DNS query: 212.193.30.45
Source: unknownTCP traffic detected without corresponding DNS query: 212.193.30.45
Source: unknownTCP traffic detected without corresponding DNS query: 212.193.30.45
Source: unknownTCP traffic detected without corresponding DNS query: 212.193.30.45
Source: unknownTCP traffic detected without corresponding DNS query: 212.193.30.45
Source: unknownTCP traffic detected without corresponding DNS query: 212.193.30.45
Source: T3AtsGGHEL.exe, 00000001.00000002.275117847.000000000114A000.00000004.00000020.sdmpString found in binary or memory: http://212.193.30.45/
Source: T3AtsGGHEL.exe, 00000001.00000002.275106056.0000000001138000.00000004.00000020.sdmp, T3AtsGGHEL.exe, 00000001.00000002.275124847.0000000001159000.00000004.00000020.sdmp, T3AtsGGHEL.exe, 00000001.00000002.275094413.000000000111A000.00000004.00000020.sdmpString found in binary or memory: http://212.193.30.45/proxies.txt
Source: T3AtsGGHEL.exe, 00000001.00000002.275094413.000000000111A000.00000004.00000020.sdmpString found in binary or memory: http://212.193.30.45/proxies.txtOP-
Source: T3AtsGGHEL.exe, 00000001.00000002.275117847.000000000114A000.00000004.00000020.sdmpString found in binary or memory: http://wfsdragon.ru/(
Source: T3AtsGGHEL.exe, 00000001.00000002.275106056.0000000001138000.00000004.00000020.sdmpString found in binary or memory: http://wfsdragon.ru/api/setStats.php
Source: T3AtsGGHEL.exe, 00000001.00000002.275106056.0000000001138000.00000004.00000020.sdmpString found in binary or memory: http://wfsdragon.ru/api/setStats.php3t
Source: T3AtsGGHEL.exe, 00000001.00000002.275140606.0000000001185000.00000004.00000020.sdmpString found in binary or memory: http://wfsdragon.ru/api/setStats.phpAX
Source: unknownDNS traffic detected: queries for: wfsdragon.ru
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC1820 InternetOpenA,InternetOpenA,InternetOpenUrlA,InternetReadFile,__aulldiv,InternetReadFile,InternetReadFile,__aulldiv,InternetReadFile,CreateFileA,WriteFile,CloseHandle,InternetCloseHandle,InternetCloseHandle,
Source: global trafficHTTP traffic detected: GET /proxies.txt HTTP/1.1Connection: Keep-AliveUser-Agent: ????Host: 212.193.30.45
Source: global trafficHTTP traffic detected: GET /api/setStats.php HTTP/1.1Connection: Keep-AliveUser-Agent: ????llHost: wfsdragon.ru
Source: T3AtsGGHEL.exe, 00000001.00000002.275094413.000000000111A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: T3AtsGGHEL.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: T3AtsGGHEL.exeBinary or memory string: OriginalFilename vs T3AtsGGHEL.exe
Source: T3AtsGGHEL.exe, 00000001.00000002.275043561.0000000000ED5000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSetToken.exe< vs T3AtsGGHEL.exe
Source: T3AtsGGHEL.exe, 00000001.00000000.270223923.0000000000ED5000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSetToken.exe< vs T3AtsGGHEL.exe
Source: T3AtsGGHEL.exeBinary or memory string: OriginalFilenameSetToken.exe< vs T3AtsGGHEL.exe
Source: T3AtsGGHEL.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC2040
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC1820
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBC830
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBD500
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EB7630
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EB8600
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EB98FC
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EB98F4
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EB592D
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBC280
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC24F0
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBEED0
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00ED0E50
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EB6E30
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00ECFF12
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: String function: 00EC3DA0 appears 33 times
Source: T3AtsGGHEL.exeVirustotal: Detection: 60%
Source: T3AtsGGHEL.exeReversingLabs: Detection: 48%
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\user\Desktop\T3AtsGGHEL.exe "C:\Users\user\Desktop\T3AtsGGHEL.exe"
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7044:120:WilError_01
Source: classification engineClassification label: mal68.winEXE@2/0@1/2
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: T3AtsGGHEL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: T3AtsGGHEL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: T3AtsGGHEL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: T3AtsGGHEL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: T3AtsGGHEL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: T3AtsGGHEL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: T3AtsGGHEL.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: T3AtsGGHEL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC3DE6 push ecx; ret
Source: T3AtsGGHEL.exeStatic PE information: section name: .code
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC3002 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00ECA061 FindFirstFileExW,
Source: T3AtsGGHEL.exe, 00000001.00000002.275133735.0000000001175000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW{
Source: T3AtsGGHEL.exe, 00000001.00000002.275133735.0000000001175000.00000004.00000020.sdmp, T3AtsGGHEL.exe, 00000001.00000002.275094413.000000000111A000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC73C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBC830 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBD500 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBD500 mov ecx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBD500 mov ecx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EBD500 mov ecx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC6DF1 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC8752 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC2040 __aulldiv,HeapFree,GetProcessHeap,HeapFree,
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC3D29 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC38A6 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC73C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC3BC4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC39E4 cpuid
Source: C:\Users\user\Desktop\T3AtsGGHEL.exeCode function: 1_2_00EC703C GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationApplication Shimming1Process Injection1Process Injection1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsApplication Shimming1Deobfuscate/Decode Files or Information1LSASS MemorySecurity Software Discovery21Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
T3AtsGGHEL.exe61%VirustotalBrowse
T3AtsGGHEL.exe48%ReversingLabsWin32.Backdoor.Zapchast
T3AtsGGHEL.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
wfsdragon.ru6%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://212.193.30.45/proxies.txtOP-0%Avira URL Cloudsafe
http://wfsdragon.ru/api/setStats.php7%VirustotalBrowse
http://wfsdragon.ru/api/setStats.php0%Avira URL Cloudsafe
http://wfsdragon.ru/(0%Avira URL Cloudsafe
http://wfsdragon.ru/api/setStats.phpAX0%Avira URL Cloudsafe
http://wfsdragon.ru/api/setStats.php3t0%Avira URL Cloudsafe
http://212.193.30.45/proxies.txt0%Avira URL Cloudsafe
http://212.193.30.45/0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
wfsdragon.ru
172.67.133.215
truetrueunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://wfsdragon.ru/api/setStats.phptrue
  • 7%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://212.193.30.45/proxies.txttrue
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://212.193.30.45/proxies.txtOP-T3AtsGGHEL.exe, 00000001.00000002.275094413.000000000111A000.00000004.00000020.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://wfsdragon.ru/(T3AtsGGHEL.exe, 00000001.00000002.275117847.000000000114A000.00000004.00000020.sdmptrue
  • Avira URL Cloud: safe
unknown
http://wfsdragon.ru/api/setStats.phpAXT3AtsGGHEL.exe, 00000001.00000002.275140606.0000000001185000.00000004.00000020.sdmptrue
  • Avira URL Cloud: safe
unknown
http://wfsdragon.ru/api/setStats.php3tT3AtsGGHEL.exe, 00000001.00000002.275106056.0000000001138000.00000004.00000020.sdmptrue
  • Avira URL Cloud: safe
unknown
http://212.193.30.45/T3AtsGGHEL.exe, 00000001.00000002.275117847.000000000114A000.00000004.00000020.sdmpfalse
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
212.193.30.45
unknownRussian Federation
57844SPD-NETTRtrue
172.67.133.215
wfsdragon.ruUnited States
13335CLOUDFLARENETUStrue

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:534006
Start date:04.12.2021
Start time:23:47:36
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 27s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:T3AtsGGHEL.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:26
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal68.winEXE@2/0@1/2
EGA Information:Failed
HDC Information:
  • Successful, ratio: 0.1% (good quality ratio 0.1%)
  • Quality average: 100%
  • Quality standard deviation: 0%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 23.35.236.56
  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
Errors:
  • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Backup Database
  • Sigma runtime error: Invalid condition: all of selection* Rule: Stop Or Remove Antivirus Service
  • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Volume Shadow Listing
  • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With 7-ZIP
  • Sigma runtime error: Invalid condition: all of selection* Rule: Disable or Delete Windows Eventlog
  • Sigma runtime error: Invalid condition: all of selection* Rule: PowerShell SAM Copy
  • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With WINZIP

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
212.193.30.45fXlJhe5OGb.exeGet hashmaliciousBrowse
  • 212.193.30.45/proxies.txt
Whg8jgqeOs.exeGet hashmaliciousBrowse
  • 212.193.30.45/proxies.txt
ikeokicy4x.exeGet hashmaliciousBrowse
  • 212.193.30.45/proxies.txt
172.67.133.21533CBD9E39DD39A84D0426897605B17000046E0FB14399.exeGet hashmaliciousBrowse
  • wfsdragon.ru/api/setStats.php
FC2E04D392AB5E508FDF6C90CE456BFD0AF6DEF1F10A2.exeGet hashmaliciousBrowse
  • wfsdragon.ru/api/setStats.php
74BAFD56C1FB3CDEBF0A63DE4FFB6F16DC1D5CEE38E11.exeGet hashmaliciousBrowse
  • wfsdragon.ru/api/setStats.php
2B97860AFD98DFF5BED238E2A2CE25977B50BA5356333.exeGet hashmaliciousBrowse
  • wfsdragon.ru/api/setStats.php
D2864E311EFFCEF848301945DA620B92D1A982DBE2A70.exeGet hashmaliciousBrowse
  • wfsdragon.ru/api/setStats.php

Domains

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
wfsdragon.ru2A9E7BC07BD4EC39C2BEAA42FF35352BBE6400F899F70.exeGet hashmaliciousBrowse
  • 104.21.5.208
0A7D966E66CBD260C909DE1D79038C86A071F2F10A810.exeGet hashmaliciousBrowse
  • 172.67.133.215
B10274561191CEDB0B16D2A69FDCD4E5062EDFE262184.exeGet hashmaliciousBrowse
  • 104.21.5.208
3BADEBCEFB9E7153384CAE83BAAA119F6317C9381E850.exeGet hashmaliciousBrowse
  • 172.67.133.215
8F9CDF75C272FDA7DF367232756EA065600077804B165.exeGet hashmaliciousBrowse
  • 172.67.133.215
33CBD9E39DD39A84D0426897605B17000046E0FB14399.exeGet hashmaliciousBrowse
  • 172.67.133.215
0A223AA68AF0C2AF0BAABDA61D82748629078720A017E.exeGet hashmaliciousBrowse
  • 104.21.5.208
71A117DE440384FDC4B8FB690FC73674E9E2A9A75E689.exeGet hashmaliciousBrowse
  • 104.21.5.208
FC2E04D392AB5E508FDF6C90CE456BFD0AF6DEF1F10A2.exeGet hashmaliciousBrowse
  • 172.67.133.215
365F984ABE68DDD398D7B749FB0E69B0F29DAF86F0E3E.exeGet hashmaliciousBrowse
  • 104.21.5.208
4051EB7216E002CC6D827D781527D7556F4EB0F47BF09.exeGet hashmaliciousBrowse
  • 172.67.133.215
74BAFD56C1FB3CDEBF0A63DE4FFB6F16DC1D5CEE38E11.exeGet hashmaliciousBrowse
  • 172.67.133.215
BC2CCE5055F9411C04EDEEE699D7161C257574B4C5540.exeGet hashmaliciousBrowse
  • 104.21.5.208
F0627549D39AD1D85BCAAE5CF0B5A90B885658E348480.exeGet hashmaliciousBrowse
  • 172.67.133.215
D44D77232A9E6E684F1ECE4C9C05B3DCB63D4296CFD29.exeGet hashmaliciousBrowse
  • 104.21.5.208
2D100CC76F229AC10A7589E1AEA0BFB47B5692840D8F2.exeGet hashmaliciousBrowse
  • 104.21.5.208
4F1F6C55849D794E71B3F37EB1C700348E31A080EAA14.exeGet hashmaliciousBrowse
  • 104.21.5.208
AC8CF25A55659954E3C2BDF2A3B53115F139BE50F049A.exeGet hashmaliciousBrowse
  • 104.21.5.208
BAF599ABAB1D6969E1BA455F83375CBC9643BBE504918.exeGet hashmaliciousBrowse
  • 104.21.5.208
pDHqdUDL46.exeGet hashmaliciousBrowse
  • 104.21.5.208

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
CLOUDFLARENETUS912534A5380738D96E8DDB7873ECB004667D72D5DF783.exeGet hashmaliciousBrowse
  • 162.159.133.233
780426DE24AE46F300FDAF9CBF597C8F2164F7B6C525C.exeGet hashmaliciousBrowse
  • 104.21.19.200
W88QoyCyC7.exeGet hashmaliciousBrowse
  • 162.159.130.233
e8cvIYg1a3Get hashmaliciousBrowse
  • 1.4.15.184
24E7ED53A8DCE89A4D8F054712A5D77693049EC726F67.exeGet hashmaliciousBrowse
  • 104.23.98.190
SetUp(5).exeGet hashmaliciousBrowse
  • 162.159.137.232
C7304FF0966068D305DA031F9DA60C5B0EBE32AC43533.exeGet hashmaliciousBrowse
  • 104.21.49.105
I6l10z8wKV.exeGet hashmaliciousBrowse
  • 162.159.134.233
PurchaseOrder2xls.exeGet hashmaliciousBrowse
  • 162.159.134.233
qwEMaieh4k.exeGet hashmaliciousBrowse
  • 162.159.135.233
FKdsgnUjpn.exeGet hashmaliciousBrowse
  • 162.159.133.233
y8xn6l2hY0.exeGet hashmaliciousBrowse
  • 162.159.134.233
eufive_20211204-002445(1).exeGet hashmaliciousBrowse
  • 162.159.130.233
jA0D6OjNRa.exeGet hashmaliciousBrowse
  • 104.21.96.57
xajsmKqcFk.exeGet hashmaliciousBrowse
  • 162.159.130.233
4L2BCPJRuk.exeGet hashmaliciousBrowse
  • 162.159.130.233
XPCIJGAZa6.exeGet hashmaliciousBrowse
  • 172.67.173.151
MPEtLYdhdk.msiGet hashmaliciousBrowse
  • 104.21.22.210
cC6A9znVtH.exeGet hashmaliciousBrowse
  • 172.67.173.151
f2Y03RRaRe.exeGet hashmaliciousBrowse
  • 162.159.134.233
SPD-NETTR912534A5380738D96E8DDB7873ECB004667D72D5DF783.exeGet hashmaliciousBrowse
  • 212.193.30.29
780426DE24AE46F300FDAF9CBF597C8F2164F7B6C525C.exeGet hashmaliciousBrowse
  • 212.193.30.29
W88QoyCyC7.exeGet hashmaliciousBrowse
  • 195.133.47.114
C7304FF0966068D305DA031F9DA60C5B0EBE32AC43533.exeGet hashmaliciousBrowse
  • 212.193.30.29
I6l10z8wKV.exeGet hashmaliciousBrowse
  • 195.133.47.114
qwEMaieh4k.exeGet hashmaliciousBrowse
  • 195.133.47.114
xajsmKqcFk.exeGet hashmaliciousBrowse
  • 195.133.47.114
4L2BCPJRuk.exeGet hashmaliciousBrowse
  • 195.133.47.114
cC6A9znVtH.exeGet hashmaliciousBrowse
  • 212.193.30.45
21ABA879CA90E3D4B3B58F61316B6B42C97D31F62DEA2.exeGet hashmaliciousBrowse
  • 212.193.30.29
0D054D4B3068EA7F877963A9BE8A71581CB0396A309F6.exeGet hashmaliciousBrowse
  • 212.193.30.29
rfmEYZiTI4.exeGet hashmaliciousBrowse
  • 212.193.30.29
sk4e7kDlkb.exeGet hashmaliciousBrowse
  • 212.193.30.45
Nh3xqMPynb.exeGet hashmaliciousBrowse
  • 212.193.30.196
7AF33E5528AB8A8F45EE7B8C4DD24B4014FEAA6E1D310.exeGet hashmaliciousBrowse
  • 212.193.30.29
f7Kudio57m.exeGet hashmaliciousBrowse
  • 212.193.30.196
CYw9gmWr8C.exeGet hashmaliciousBrowse
  • 212.193.30.196
ajTlXKBm6k.exeGet hashmaliciousBrowse
  • 212.193.30.196
991D4DC612FF80AB2506510DBA31531DB995FE3F64318.exeGet hashmaliciousBrowse
  • 212.193.30.29
vjdcYcI4Y2.exeGet hashmaliciousBrowse
  • 212.193.30.196

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):7.162371325795308
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:T3AtsGGHEL.exe
File size:436224
MD5:89611c7a85fb5ccd4dd7edc076bc4ee8
SHA1:a29812244684e248d7fe4f9e65e180bb4cd3098a
SHA256:a5cf8668fc9624b386bbdad3a3dba28c029945048a7d15a0b0ee41dfe9e0a2df
SHA512:5bb8da1fc7efe568d7279c39c0c8cee8e55f858e2b101db5d48a933d95e4e87040f944428dd930a12a8766e7da37c5e332a0b16211955ef867172822d878eed3
SSDEEP:12288:1imaXG6cgudGbpR8W6szcwG67S+9Gf1NyKZ4:Mm7C8W3zLG6G+4f9Z
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.cG........................................................*...............Y...................................Rich...........

File Icon

Icon Hash:f89e67662636decc

Static PE Info

General

Entrypoint:0x4137fa
Entrypoint Section:.code
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x61A8861D [Thu Dec 2 08:38:53 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:503fd9eea05c6f717892aae512299b17

Entrypoint Preview

Instruction
call 00007FD98CD00443h
jmp 00007FD98CCFFC69h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push esi
mov eax, dword ptr [esp+14h]
or eax, eax
jne 00007FD98CCFFE1Ah
mov ecx, dword ptr [esp+10h]
mov eax, dword ptr [esp+0Ch]
xor edx, edx
div ecx
mov ebx, eax
mov eax, dword ptr [esp+08h]
div ecx
mov esi, eax
mov eax, ebx
mul dword ptr [esp+10h]
mov ecx, eax
mov eax, esi
mul dword ptr [esp+10h]
add edx, ecx
jmp 00007FD98CCFFE39h
mov ecx, eax
mov ebx, dword ptr [esp+10h]
mov edx, dword ptr [esp+0Ch]
mov eax, dword ptr [esp+08h]
shr ecx, 1
rcr ebx, 1
shr edx, 1
rcr eax, 1
or ecx, ecx
jne 00007FD98CCFFDE6h
div ebx
mov esi, eax
mul dword ptr [esp+14h]
mov ecx, eax
mov eax, dword ptr [esp+10h]
mul esi
add edx, ecx
jc 00007FD98CCFFE00h
cmp edx, dword ptr [esp+0Ch]
jnbe 00007FD98CCFFDFAh
jc 00007FD98CCFFE01h
cmp eax, dword ptr [esp+08h]
jbe 00007FD98CCFFDFBh
dec esi
sub eax, dword ptr [esp+10h]
sbb edx, dword ptr [esp+14h]
xor ebx, ebx
sub eax, dword ptr [esp+08h]
sbb edx, dword ptr [esp+0Ch]
neg edx
neg eax
sbb edx, 00000000h
mov ecx, edx
mov edx, ebx
mov ebx, ecx
mov ecx, eax
mov eax, esi
pop esi
retn 0010h
ret
push ebp
mov ebp, esp
push 00000000h
call dword ptr [00425068h]
push dword ptr [ebp+08h]
call dword ptr [00425064h]
push C0000409h
call dword ptr [0000006Ch]

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x251400x3c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x45c18.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000x1650.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x602c0x1c.code
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x60480x40.code
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x250000x13c.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.code0x10000x218a00x21a00False0.50054455158data6.46692412072IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x230000x15900xa00False0.178125DOS executable (block device driver @\273\)2.44015014816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.idata0x250000x83a0xa00False0.39140625COM executable for DOS4.75468144198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x260000x45c180x45e00False0.816409743962data7.34383108574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6c0000x16500x1800False0.733072916667data6.40608727267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x265780x1dccbPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_ICON0x442480x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 570425344, next used block 352321536
RT_ICON0x54a700x94a8data
RT_ICON0x5df180x5488data
RT_ICON0x633a00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0
RT_ICON0x675c80x25a8data
RT_ICON0x69b700x10a8data
RT_ICON0x6ac180x988data
RT_ICON0x6b5a00x468GLS_BINARY_LSB_FIRST
RT_GROUP_ICON0x6ba080x84data
RT_VERSION0x262b00x2c4data
RT_MANIFEST0x6ba900x188XML 1.0 document textEnglishUnited States

Imports

DLLImport
KERNEL32.dllReadFile, lstrcatA, GetModuleHandleA, CreateFileA, lstrcpyA, CloseHandle, CreateThread, GetProcAddress, GetFileSize, GetConsoleWindow, GetLastError, lstrlenA, lstrcpynA, WriteConsoleW, CreateFileW, HeapSize, QueryPerformanceCounter, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RtlUnwind, RaiseException, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapReAlloc, SetFilePointerEx, GetFileType, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, SetStdHandle, GetStringTypeW, GetConsoleMode, FlushFileBuffers, GetConsoleOutputCP, DecodePointer
USER32.dllShowWindow

Version Infos

DescriptionData
LegalCopyrightTokenizer
InternalNameUpdateToken.exe
FileVersion7272.5.13.1
CompanyNameFreshTokenizer
ProductNameToken Updater
ProductVersion2.1.4.1
FileDescriptionToken Updater
OriginalFilenameSetToken.exe
Translation0x041f 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Snort IDS Alerts

TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
12/04/21-23:48:26.150465TCP2010595ET MALWARE User-Agent (???)4974180192.168.2.3212.193.30.45
12/04/21-23:48:26.277728TCP2010595ET MALWARE User-Agent (???)4974280192.168.2.3172.67.133.215

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Dec 4, 2021 23:48:26.122400045 CET4974180192.168.2.3212.193.30.45
Dec 4, 2021 23:48:26.149882078 CET8049741212.193.30.45192.168.2.3
Dec 4, 2021 23:48:26.149980068 CET4974180192.168.2.3212.193.30.45
Dec 4, 2021 23:48:26.150465012 CET4974180192.168.2.3212.193.30.45
Dec 4, 2021 23:48:26.177802086 CET8049741212.193.30.45192.168.2.3
Dec 4, 2021 23:48:26.177956104 CET8049741212.193.30.45192.168.2.3
Dec 4, 2021 23:48:26.177988052 CET8049741212.193.30.45192.168.2.3
Dec 4, 2021 23:48:26.178047895 CET4974180192.168.2.3212.193.30.45
Dec 4, 2021 23:48:26.178165913 CET4974180192.168.2.3212.193.30.45
Dec 4, 2021 23:48:26.249811888 CET4974280192.168.2.3172.67.133.215
Dec 4, 2021 23:48:26.277226925 CET8049742172.67.133.215192.168.2.3
Dec 4, 2021 23:48:26.277327061 CET4974280192.168.2.3172.67.133.215
Dec 4, 2021 23:48:26.277728081 CET4974280192.168.2.3172.67.133.215
Dec 4, 2021 23:48:26.305057049 CET8049742172.67.133.215192.168.2.3
Dec 4, 2021 23:48:26.396331072 CET8049742172.67.133.215192.168.2.3
Dec 4, 2021 23:48:26.396368980 CET8049742172.67.133.215192.168.2.3
Dec 4, 2021 23:48:26.396445990 CET4974280192.168.2.3172.67.133.215
Dec 4, 2021 23:48:26.483290911 CET4974180192.168.2.3212.193.30.45
Dec 4, 2021 23:48:26.510665894 CET8049741212.193.30.45192.168.2.3
Dec 4, 2021 23:48:26.759848118 CET4974280192.168.2.3172.67.133.215

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Dec 4, 2021 23:48:26.221666098 CET5745953192.168.2.38.8.8.8
Dec 4, 2021 23:48:26.244530916 CET53574598.8.8.8192.168.2.3

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Dec 4, 2021 23:48:26.221666098 CET192.168.2.38.8.8.80xa3a3Standard query (0)wfsdragon.ruA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
Dec 4, 2021 23:48:26.244530916 CET8.8.8.8192.168.2.30xa3a3No error (0)wfsdragon.ru172.67.133.215A (IP address)IN (0x0001)
Dec 4, 2021 23:48:26.244530916 CET8.8.8.8192.168.2.30xa3a3No error (0)wfsdragon.ru104.21.5.208A (IP address)IN (0x0001)

HTTP Request Dependency Graph

  • 212.193.30.45
  • wfsdragon.ru

HTTP Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.349741212.193.30.4580C:\Users\user\Desktop\T3AtsGGHEL.exe
TimestampkBytes transferredDirectionData
Dec 4, 2021 23:48:26.150465012 CET1094OUTGET /proxies.txt HTTP/1.1
Connection: Keep-Alive
User-Agent: ????
Host: 212.193.30.45
Dec 4, 2021 23:48:26.177956104 CET1095INHTTP/1.1 400 Bad Request
Date: Sat, 04 Dec 2021 22:48:26 GMT
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 301
Connection: close
Content-Type: text/html; charset=iso-8859-1
Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 72 20 62 72 6f 77 73 65 72 20 73 65 6e 74 20 61 20 72 65 71 75 65 73 74 20 74 68 61 74 20 74 68 69 73 20 73 65 72 76 65 72 20 63 6f 75 6c 64 20 6e 6f 74 20 75 6e 64 65 72 73 74 61 6e 64 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 31 32 37 2e 30 2e 30 2e 31 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>400 Bad Request</title></head><body><h1>Bad Request</h1><p>Your browser sent a request that this server could not understand.<br /></p><hr><address>Apache/2.4.41 (Ubuntu) Server at 127.0.0.1 Port 80</address></body></html>


Session IDSource IPSource PortDestination IPDestination PortProcess
1192.168.2.349742172.67.133.21580C:\Users\user\Desktop\T3AtsGGHEL.exe
TimestampkBytes transferredDirectionData
Dec 4, 2021 23:48:26.277728081 CET1096OUTGET /api/setStats.php HTTP/1.1
Connection: Keep-Alive
User-Agent: ????ll
Host: wfsdragon.ru
Dec 4, 2021 23:48:26.396331072 CET1096INHTTP/1.1 200 OK
Date: Sat, 04 Dec 2021 22:48:26 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=kvZt4oAmzp5KHLuJ9wjcV9P2UE0ZZknV7%2Fe0lsgFYZ1XJlNEm%2FNyqZqm6chv8PtPe0FqKT4HybdXJfglt%2BjNFn6Cp5NxYIhbZutSL17VvgRXAanLFqoNvcwsJLIK3hY%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 6b88950c5d7a0676-LHR
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
Data Raw: 66 0d 0a 25 22 3e 39 57 5f 43 58 5b 43 58 54 43 59 5f 0d 0a
Data Ascii: f%">9W_CX[CXTCY_


Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:23:48:23
Start date:04/12/2021
Path:C:\Users\user\Desktop\T3AtsGGHEL.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\T3AtsGGHEL.exe"
Imagebase:0xeb0000
File size:436224 bytes
MD5 hash:89611C7A85FB5CCD4DD7EDC076BC4EE8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:23:48:24
Start date:04/12/2021
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >