Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Launcher.exe

Overview

General Information

Sample Name:Launcher.exe
Analysis ID:753414
MD5:ac30d9ee77f4a6e23dea621727579dc5
SHA1:9dc851e691a4af49882138ee7c5bac1dc126becd
SHA256:d8f1870f30298302fce860d7c56257f6a11e4689642c3d5367d2392db5356bed
Tags:185-206-213-32CosmicWayexeFakeGaliXCityRedLineStealerUniverseCity
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Binary contains a suspicious time stamp
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Enables debug privileges

Classification

  • System is w10x64
  • Launcher.exe (PID: 5948 cmdline: C:\Users\user\Desktop\Launcher.exe MD5: AC30D9EE77F4A6E23DEA621727579DC5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Launcher.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49702 version: TLS 1.2
Source: Launcher.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Dima\Desktop\Ogooo\CosmicWay\obj\Release\UniverseCity.pdb source: Launcher.exe
Source: Binary string: C:\Users\Dima\Desktop\Ogooo\CosmicWay\obj\Release\UniverseCity.pdb+G source: Launcher.exe

Networking

barindex
Source: unknownDNS query: name: api.telegram.org
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: GET /bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage?chat_id=-1001729137879&text=5.0%20NEW%2020.11.2022%0A%E2%9C%85%D0%A3%D1%81%D0%BF%D0%B5%D1%88%D0%BD%D1%8B%D0%B9%20%D0%B7%D0%B0%D0%BF%D1%83%D1%81%D0%BA%20%D0%BB%D0%B0%D1%83%D0%BD%D1%87%D0%B5%D1%80%D0%B0:%20user%0A%D0%A1%D0%B0%D0%B9%D1%82:%20universecity%0A%D0%94%D0%B0%D1%82%D0%B0%2011/24/2022%207:35:59%20PM&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: Launcher.exe, 00000000.00000002.505090337.0000000002C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
Source: Launcher.exe, 00000000.00000002.508132544.0000000005AE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: Launcher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.506057740.0000000002E88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/UniverseCity;component/Fonts/dosis.ttf
Source: Launcher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/UniverseCity;component/Fonts/montserrat-variablefont_wght.ttf
Source: Launcher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/UniverseCity;component/Images/img_downloadWhite.png
Source: Launcher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/Fonts/dosis.ttf
Source: Launcher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/Fonts/montserrat-variablefont_wght.ttf
Source: Launcher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/Images/img_downloadWhite.png
Source: Launcher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/fonts/dosis.ttf
Source: Launcher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/fonts/montserrat-variablefont_wght.ttf
Source: Launcher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/images/img_downloadwhite.png
Source: Launcher.exe, 00000000.00000002.505046797.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.504730568.0000000002B26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Launcher.exe, 00000000.00000003.245277692.0000000005A0C000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.508004314.00000000059FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scripts.sil.org/OFL
Source: Launcher.exeString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLDosisExtraLightWeightLightMediumSemiBoldBoldExtr
Source: Launcher.exeString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLMontserratThinMontserratRomanWeightExtraLightLig
Source: Launcher.exe, 00000000.00000002.509592350.0000000009CA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.impallari.com
Source: Launcher.exeString found in binary or memory: http://www.impallari.comThis
Source: Launcher.exe, 00000000.00000002.509592350.0000000009CA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zkysky.com.ar/
Source: Launcher.exeString found in binary or memory: http://www.zkysky.com.ar/This
Source: Launcher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.505046797.0000000002C16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram
Source: Launcher.exe, 00000000.00000002.505046797.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.504730568.0000000002B26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
Source: Launcher.exeString found in binary or memory: https://api.telegram.org/bot
Source: Launcher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage
Source: Launcher.exe, 00000000.00000002.504730568.0000000002B26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage?chat_id=-1001
Source: Launcher.exe, 00000000.00000002.504547372.0000000002A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/invite/universecity
Source: Launcher.exeString found in binary or memory: https://discord.com/invite/universecityGhttps://twitter.com/UniverseCityP2E3https://universe-city.io
Source: Launcher.exe, 00000000.00000002.509592350.0000000009CA2000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000003.245316162.0000000005A3B000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000003.245301155.0000000005A3B000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000003.245327352.0000000005A3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/JulietaUla/Montserrat)
Source: Launcher.exeString found in binary or memory: https://github.com/JulietaUla/Montserrat)Montserrat
Source: Launcher.exe, 00000000.00000002.504547372.0000000002A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/UniverseCityP2E
Source: Launcher.exe, 00000000.00000002.504547372.0000000002A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://universe-city.io/
Source: Launcher.exeString found in binary or memory: https://universe-city.io/download/UniverseCity.zip
Source: unknownDNS traffic detected: queries for: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage?chat_id=-1001729137879&text=5.0%20NEW%2020.11.2022%0A%E2%9C%85%D0%A3%D1%81%D0%BF%D0%B5%D1%88%D0%BD%D1%8B%D0%B9%20%D0%B7%D0%B0%D0%BF%D1%83%D1%81%D0%BA%20%D0%BB%D0%B0%D1%83%D0%BD%D1%87%D0%B5%D1%80%D0%B0:%20user%0A%D0%A1%D0%B0%D0%B9%D1%82:%20universecity%0A%D0%94%D0%B0%D1%82%D0%B0%2011/24/2022%207:35:59%20PM&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49702 version: TLS 1.2
Source: Launcher.exe, 00000000.00000000.239074629.0000000000706000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUniverseCity.exe4 vs Launcher.exe
Source: Launcher.exeBinary or memory string: OriginalFilenameUniverseCity.exe4 vs Launcher.exe
Source: Launcher.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Launcher.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: Launcher.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\Launcher.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\Launcher.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5FDD51E2-A9D0-44CE-8C8D-162BA0C591A0}\InprocServer32
Source: classification engineClassification label: mal48.troj.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\Launcher.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Launcher.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: Launcher.exeStatic file information: File size 1126912 > 1048576
Source: Launcher.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Launcher.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Launcher.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Dima\Desktop\Ogooo\CosmicWay\obj\Release\UniverseCity.pdb source: Launcher.exe
Source: Binary string: C:\Users\Dima\Desktop\Ogooo\CosmicWay\obj\Release\UniverseCity.pdb+G source: Launcher.exe
Source: Launcher.exeStatic PE information: 0xAAC8B1A6 [Sun Oct 17 22:56:38 2060 UTC]
Source: initial sampleStatic PE information: section name: .text entropy: 7.109491085129885
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Launcher.exeWindow / User API: threadDelayed 1859
Source: Launcher.exe, 00000000.00000002.508111341.0000000005AD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Launcher.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\Launcher.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\Launcher.exeQueries volume information: C:\Users\user\Desktop\Launcher.exe VolumeInformation
Source: C:\Users\user\Desktop\Launcher.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformation
Source: C:\Users\user\Desktop\Launcher.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformation
Source: C:\Users\user\Desktop\Launcher.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Web Service
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Software Packing
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Timestomp
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer3
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size Limits1
Ingress Tool Transfer
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Launcher.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.zkysky.com.ar/This0%URL Reputationsafe
https://api.telegram0%URL Reputationsafe
http://foo/bar/images/img_downloadwhite.png0%Avira URL Cloudsafe
http://foo/Images/img_downloadWhite.png0%Avira URL Cloudsafe
http://foo/bar/fonts/dosis.ttf0%Avira URL Cloudsafe
https://universe-city.io/0%Avira URL Cloudsafe
http://defaultcontainer/UniverseCity;component/Images/img_downloadWhite.png0%Avira URL Cloudsafe
http://www.impallari.comThis0%Avira URL Cloudsafe
http://defaultcontainer/UniverseCity;component/Fonts/montserrat-variablefont_wght.ttf0%Avira URL Cloudsafe
http://foo/bar/fonts/montserrat-variablefont_wght.ttf0%Avira URL Cloudsafe
http://foo/Fonts/dosis.ttf0%Avira URL Cloudsafe
http://www.zkysky.com.ar/0%Avira URL Cloudsafe
http://defaultcontainer/UniverseCity;component/Fonts/dosis.ttf0%Avira URL Cloudsafe
https://discord.com/invite/universecity0%Avira URL Cloudsafe
http://foo/Fonts/montserrat-variablefont_wght.ttf0%Avira URL Cloudsafe
http://www.impallari.com0%Avira URL Cloudsafe
https://discord.com/invite/universecityGhttps://twitter.com/UniverseCityP2E3https://universe-city.io0%Avira URL Cloudsafe
https://universe-city.io/download/UniverseCity.zip0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.telegram.org
149.154.167.220
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage?chat_id=-1001729137879&text=5.0%20NEW%2020.11.2022%0A%E2%9C%85%D0%A3%D1%81%D0%BF%D0%B5%D1%88%D0%BD%D1%8B%D0%B9%20%D0%B7%D0%B0%D0%BF%D1%83%D1%81%D0%BA%20%D0%BB%D0%B0%D1%83%D0%BD%D1%87%D0%B5%D1%80%D0%B0:%20user%0A%D0%A1%D0%B0%D0%B9%D1%82:%20universecity%0A%D0%94%D0%B0%D1%82%D0%B0%2011/24/2022%207:35:59%20PM&parse_mode=Markdown&disable_web_page_preview=Truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.impallari.comThisLauncher.exefalse
      • Avira URL Cloud: safe
      unknown
      http://foo/bar/images/img_downloadwhite.pngLauncher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://foo/Images/img_downloadWhite.pngLauncher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      https://api.telegram.orgLauncher.exe, 00000000.00000002.505046797.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.504730568.0000000002B26000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessageLauncher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://api.telegram.org/botLauncher.exefalse
            high
            http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLMontserratThinMontserratRomanWeightExtraLightLigLauncher.exefalse
              high
              http://foo/bar/fonts/dosis.ttfLauncher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://universe-city.io/Launcher.exe, 00000000.00000002.504547372.0000000002A81000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://defaultcontainer/UniverseCity;component/Images/img_downloadWhite.pngLauncher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://defaultcontainer/UniverseCity;component/Fonts/montserrat-variablefont_wght.ttfLauncher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://foo/bar/fonts/montserrat-variablefont_wght.ttfLauncher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://twitter.com/UniverseCityP2ELauncher.exe, 00000000.00000002.504547372.0000000002A81000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage?chat_id=-1001Launcher.exe, 00000000.00000002.504730568.0000000002B26000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://foo/Fonts/dosis.ttfLauncher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.zkysky.com.ar/ThisLauncher.exefalse
                  • URL Reputation: safe
                  unknown
                  http://www.zkysky.com.ar/Launcher.exe, 00000000.00000002.509592350.0000000009CA2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://defaultcontainer/UniverseCity;component/Fonts/dosis.ttfLauncher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.506057740.0000000002E88000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  https://api.telegramLauncher.exe, 00000000.00000002.504845482.0000000002B94000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.505046797.0000000002C16000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://github.com/JulietaUla/Montserrat)Launcher.exe, 00000000.00000002.509592350.0000000009CA2000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000003.245316162.0000000005A3B000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000003.245301155.0000000005A3B000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000003.245327352.0000000005A3B000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLDosisExtraLightWeightLightMediumSemiBoldBoldExtrLauncher.exefalse
                      high
                      https://discord.com/invite/universecityLauncher.exe, 00000000.00000002.504547372.0000000002A81000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://foo/Fonts/montserrat-variablefont_wght.ttfLauncher.exe, 00000000.00000002.505158901.0000000002C45000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.impallari.comLauncher.exe, 00000000.00000002.509592350.0000000009CA2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://scripts.sil.org/OFLLauncher.exe, 00000000.00000003.245277692.0000000005A0C000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.508004314.00000000059FF000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://api.telegram.orgLauncher.exe, 00000000.00000002.505090337.0000000002C24000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLauncher.exe, 00000000.00000002.505046797.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000000.00000002.504730568.0000000002B26000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://discord.com/invite/universecityGhttps://twitter.com/UniverseCityP2E3https://universe-city.ioLauncher.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            https://universe-city.io/download/UniverseCity.zipLauncher.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/JulietaUla/Montserrat)MontserratLauncher.exefalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              149.154.167.220
                              api.telegram.orgUnited Kingdom
                              62041TELEGRAMRUfalse
                              Joe Sandbox Version:36.0.0 Rainbow Opal
                              Analysis ID:753414
                              Start date and time:2022-11-24 19:35:08 +01:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 5m 18s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Launcher.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal48.troj.winEXE@1/0@1/1
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                              • Execution Graph export aborted for target Launcher.exe, PID 5948 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              No simulations
                              No context
                              No context
                              No context
                              No context
                              No context
                              No created / dropped files found
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.188130461543658
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              • Win32 Executable (generic) a (10002005/4) 49.97%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:Launcher.exe
                              File size:1126912
                              MD5:ac30d9ee77f4a6e23dea621727579dc5
                              SHA1:9dc851e691a4af49882138ee7c5bac1dc126becd
                              SHA256:d8f1870f30298302fce860d7c56257f6a11e4689642c3d5367d2392db5356bed
                              SHA512:13d6e128462b4d604287333ba50eeeedba1fc0c09c548ad9d502d42b2c6a7c2ccbc8b71b960f1dd4fc98bde28fb74999f297de75ff98b6b9c5bb58c44f58f052
                              SSDEEP:24576:0Nv4W8QJdOLP1Sa/wTCZnxf7ujAfcRfNv4Wo:5eOLP1Sa/ICZnx6UfcRC
                              TLSH:9135CF07FB53BA5BC6210B3696F5CE955336AA302A7E63879C4B62389C833F54D132D4
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..(..........VG... ...`....@.. ....................................`................................
                              Icon Hash:d2ad9793938eacf2
                              Entrypoint:0x4f4756
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0xAAC8B1A6 [Sun Oct 17 22:56:38 2060 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Signature Valid:
                              Signature Issuer:
                              Signature Validation Error:
                              Error Number:
                              Not Before, Not After
                                Subject Chain
                                  Version:
                                  Thumbprint MD5:
                                  Thumbprint SHA-1:
                                  Thumbprint SHA-256:
                                  Serial:
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xf47030x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xf60000x2059c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x193156000x2448
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xf46700x38.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xf275c0xf2800False0.6635842864046392data7.109491085129885IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xf60000x2059c0x20600False0.8671196307915058data7.635069013125214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x1180000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountry
                                  RT_ICON0xf61a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                  RT_ICON0xf66180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                                  RT_ICON0xf6fb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                  RT_ICON0xf80680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                  RT_ICON0xfa6200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0
                                  RT_ICON0xfe8580x1683ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                  RT_GROUP_ICON0x1150a80x5adata
                                  RT_VERSION0x1151140x354data
                                  RT_MANIFEST0x1154780x111fXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 24, 2022 19:36:00.976207972 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:00.976288080 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:00.976560116 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:01.015506983 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:01.015575886 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:01.096575975 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:01.096771002 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:01.104090929 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:01.104135036 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:01.104583025 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:01.146436930 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:01.409517050 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:01.409578085 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:01.632040024 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:01.632178068 CET44349702149.154.167.220192.168.2.3
                                  Nov 24, 2022 19:36:01.632385969 CET49702443192.168.2.3149.154.167.220
                                  Nov 24, 2022 19:36:01.636691093 CET49702443192.168.2.3149.154.167.220
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 24, 2022 19:36:00.932370901 CET4997753192.168.2.38.8.8.8
                                  Nov 24, 2022 19:36:00.951380968 CET53499778.8.8.8192.168.2.3
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 24, 2022 19:36:00.932370901 CET192.168.2.38.8.8.80x1abfStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 24, 2022 19:36:00.951380968 CET8.8.8.8192.168.2.30x1abfNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                  • api.telegram.org
                                  No statistics
                                  Target ID:0
                                  Start time:19:35:58
                                  Start date:24/11/2022
                                  Path:C:\Users\user\Desktop\Launcher.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\Launcher.exe
                                  Imagebase:0x610000
                                  File size:1126912 bytes
                                  MD5 hash:AC30D9EE77F4A6E23DEA621727579DC5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:low

                                  No disassembly