Windows
Analysis Report
FT0uDS8neB.exe
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Writes to foreign memory regions
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Classification
- System is w10x64
FT0uDS8neB.exe (PID: 6640 cmdline:
C:\Users\u ser\Deskto p\FT0uDS8n eB.exe MD5: E6B8CFB15C6FCE9ABCEA7A716345D537) RegSvcs.exe (PID: 6672 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\RegS vcs.exe MD5: 19855C0DC5BEC9FDF925307C57F9F5FC) WerFault.exe (PID: 6760 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 672 -s 101 2 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_EXE_Packed_DotNetReactor | Detects executables packed with unregistered version of .NET Reactor | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_EXE_Packed_DotNetReactor | Detects executables packed with unregistered version of .NET Reactor | ditekSHen |
|
⊘No Sigma rule has matched
Timestamp: | 192.168.2.6188.114.97.749718802046637 08/18/23-00:12:35.724385 |
SID: | 2046637 |
Source Port: | 49718 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
- • AV Detection
- • Cryptography
- • Compliance
- • Spreading
- • Software Vulnerabilities
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Code function: | 1_2_0042C500 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_004493C8 | |
Source: | Code function: | 1_2_0044947C |
Source: | Code function: | 0_2_05B7D230 |
Networking |
---|
Source: | Snort IDS: |
Source: | ASN Name: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Code function: | 1_2_0042D2D9 |
Source: | HTTP traffic detected: |
Source: | Binary or memory string: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process created: |
Source: | Code function: | 0_2_031651F8 | |
Source: | Code function: | 0_2_03165703 | |
Source: | Code function: | 0_2_0316A970 | |
Source: | Code function: | 0_2_0316A980 | |
Source: | Code function: | 0_2_03168880 | |
Source: | Code function: | 0_2_05A375B8 | |
Source: | Code function: | 0_2_05B70006 | |
Source: | Code function: | 0_2_05B70040 | |
Source: | Code function: | 0_2_03160DE7 | |
Source: | Code function: | 1_2_00407AC0 | |
Source: | Code function: | 1_2_0042D2D9 | |
Source: | Code function: | 1_2_00404845 | |
Source: | Code function: | 1_2_0043804F | |
Source: | Code function: | 1_2_0040E850 | |
Source: | Code function: | 1_2_00426021 | |
Source: | Code function: | 1_2_00410822 | |
Source: | Code function: | 1_2_00411942 | |
Source: | Code function: | 1_2_00418173 | |
Source: | Code function: | 1_2_00432170 | |
Source: | Code function: | 1_2_00435934 | |
Source: | Code function: | 1_2_0042F9D1 | |
Source: | Code function: | 1_2_0040F1E1 | |
Source: | Code function: | 1_2_004131B2 | |
Source: | Code function: | 1_2_00414205 | |
Source: | Code function: | 1_2_0041FA10 | |
Source: | Code function: | 1_2_00440210 | |
Source: | Code function: | 1_2_0040F218 | |
Source: | Code function: | 1_2_00430A18 | |
Source: | Code function: | 1_2_0041722C | |
Source: | Code function: | 1_2_00408ACA | |
Source: | Code function: | 1_2_0041DAD0 | |
Source: | Code function: | 1_2_00403AFB | |
Source: | Code function: | 1_2_0040AAFD | |
Source: | Code function: | 1_2_00426ABC | |
Source: | Code function: | 1_2_00415361 | |
Source: | Code function: | 1_2_00440B6B | |
Source: | Code function: | 1_2_00414B7C | |
Source: | Code function: | 1_2_0040C31C | |
Source: | Code function: | 1_2_00416463 | |
Source: | Code function: | 1_2_0041D464 | |
Source: | Code function: | 1_2_00438C13 | |
Source: | Code function: | 1_2_004294BC | |
Source: | Code function: | 1_2_0042C500 | |
Source: | Code function: | 1_2_0041C5CA | |
Source: | Code function: | 1_2_004545EA | |
Source: | Code function: | 1_2_0041A5F7 | |
Source: | Code function: | 1_2_004365F4 | |
Source: | Code function: | 1_2_0040CD87 | |
Source: | Code function: | 1_2_0041E6DB | |
Source: | Code function: | 1_2_00410E8E | |
Source: | Code function: | 1_2_0042EF43 | |
Source: | Code function: | 1_2_00446704 | |
Source: | Code function: | 1_2_00409F24 | |
Source: | Code function: | 1_2_00427FC3 | |
Source: | Code function: | 1_2_0044EFC0 | |
Source: | Code function: | 1_2_004287EC | |
Source: | Code function: | 1_2_0041379F |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior |
Source: | Mutant created: |
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_05A3179A | |
Source: | Code function: | 0_2_05B7577C | |
Source: | Code function: | 0_2_05B74B84 | |
Source: | Code function: | 1_2_00458946 | |
Source: | Code function: | 1_2_004019CC | |
Source: | Code function: | 1_2_00449C3B |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | API coverage: |
Source: | Code function: | 1_2_0041DAD0 |
Source: | Code function: | 1_2_004493C8 | |
Source: | Code function: | 1_2_0044947C |
Source: | Thread delayed: | Jump to behavior |
Source: | API call chain: | graph_1-30916 | ||
Source: | API call chain: | graph_1-30925 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 1_2_00431855 |
Source: | Code function: | 1_2_00427ACE |
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 1_2_004303CD | |
Source: | Code function: | 1_2_0043B51A | |
Source: | Code function: | 1_2_00446FD5 |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 1_2_0042D2D9 |
Source: | Memory allocated: | Jump to behavior |
Source: | Code function: | 1_2_00431849 | |
Source: | Code function: | 1_2_00431855 | |
Source: | Code function: | 1_2_00431D60 | |
Source: | Code function: | 1_2_004457FB |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 1_2_00431A78 |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 1_2_0043DCD1 |
Source: | Code function: | 1_2_0044B042 |
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 311 Process Injection | 1 Masquerading | 1 Input Capture | 2 System Time Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 41 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | Exfiltration Over Bluetooth | 2 Ingress Tool Transfer | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 31 Virtualization/Sandbox Evasion | Security Account Manager | 31 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 3 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 311 Process Injection | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 3 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 4 Obfuscated Files or Information | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | 2 Software Packing | DCSync | 23 System Information Discovery | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | 1 Timestomp | Proc Filesystem | Network Service Scanning | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue | |
Exploit Public-Facing Application | PowerShell | At (Linux) | At (Linux) | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | System Network Connections Discovery | Software Deployment Tools | Data Staged | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | Web Protocols | Rogue Cellular Base Station | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | ReversingLabs | Win32.Trojan.Generic | ||
42% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
24% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
gstatic-node.io | 188.114.96.7 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.7 | unknown | European Union | 13335 | CLOUDFLARENETUS | true | |
188.114.96.7 | gstatic-node.io | European Union | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1293164 |
Start date and time: | 2023-08-18 00:11:33 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 11m 12s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | FT0uDS8neB.exe |
Original Sample Name: | e6b8cfb15c6fce9abcea7a716345d537.exe |
Detection: | MAL |
Classification: | mal96.evad.winEXE@4/7@2/2 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): BackgroundTrans ferHost.exe, WerFault.exe, bac kgroundTaskHost.exe - Excluded IPs from analysis (wh
itelisted): 20.189.173.21, 52. 184.217.56, 2.20.210.223 - Excluded domains from analysis
(whitelisted): kv601.prod.do. dsp.mp.microsoft.com, kv601.pr od.do.dsp.mp.microsoft.com.edg ekey.net, fs.microsoft.com, ge o.prod.do.dsp.trafficmanager.n et, geo.prod.do.dsp.mp.microso ft.com, e12358.d.akamaiedge.ne t, login.live.com, blobcollect or.events.data.trafficmanager. net, onedsblobprdwus16.westus. cloudapp.azure.com, watson.tel emetry.microsoft.com, array509 .prod.do.dsp.mp.microsoft.com, arc.msn.com - Report creation exceeded maxim
um time and may have missing d isassembly code information. - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
00:12:32 | API Interceptor | |
00:12:35 | API Interceptor | |
00:12:37 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.7 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook, NSISDropper | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook, NSISDropper | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | FormBook, NSISDropper | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, NSISDropper | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | MinerDownloader, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DarkTortilla, LummaC Stealer, XWorm | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
gstatic-node.io | Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | MinerDownloader, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | DarkTortilla, LummaC Stealer, XWorm | Browse |
| ||
Get hash | malicious | CryptOne, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, RedLine | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, RedLine | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
⊘No context
⊘No context
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9394152947703281 |
Encrypted: | false |
SSDEEP: | 192:P2lHPVUKGGtF5HBUZMXwjMjP/u7sQS274Itl:SPHxBUZMXwjA/u7sQX4Itl |
MD5: | C96E8242751BB99C65DDCCA934072554 |
SHA1: | 0375DCBBFB613C6436C12006F3B21D8C4E9C042B |
SHA-256: | 227E2986842A1A91E913742A6CFA27C7C34FA8129DFED39C91835E258EE9E938 |
SHA-512: | 67A55B9A87346E1EA52FAB1DC182755D5C99FF737358661CF7337E278EF9B821C830947B62E828E2386F4216DF2B0EFCEC3F67D1C0D7321335B591E992046BC6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 93012 |
Entropy (8bit): | 2.07672226096538 |
Encrypted: | false |
SSDEEP: | 384:WbE2+fIZyCmPAVXTsTijfjt6ZvkMKyJxCfsV7lDJ84J1rVVZNAXn6:WzZyCmGgrZvkMKyJTfH2X6 |
MD5: | 9406AA672E5A30988425C94A9CEF2B4E |
SHA1: | 02D4F3E7566C3483CC7B7DF18BBB8B49FD838DDF |
SHA-256: | 8BFA1810D321EDFC960B4DB09BC8B8DC7EE9AD74AC9EDA141336622AFA2C4780 |
SHA-512: | 9CCAA19C8D6A709D8302869D9C3AA06CF6F598CF3771D0B1886C5A61845842B8C63BE5201A7D568FC5E22285290CD3EE784D425DC132A8BCB3ACA934BBE08FBC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8286 |
Entropy (8bit): | 3.6951652053871458 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNipJ6BB6YU9o6Bm2gmfGd5SVCpra89bpncsfkH9Dm:RrlsNin6n6Yx6HgmfQS+pnvfEE |
MD5: | 04CE4197DA8BDF1531E97D56169B682B |
SHA1: | C79AAE4B19425954F3CC75C9242BCB81EA60008E |
SHA-256: | BA75551B6E8DEA541F51786D3DEEAAECD3B1E984902DA94560A82E5D0CE5B097 |
SHA-512: | C7533068ADE9F5C60DE62C292501443AE2C215EA598799A38C7E4B9AC9988C77D6A76DABAEBDB75640B63416EC3D16468D2685AB6C2F7E9D75BA568328805E31 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4620 |
Entropy (8bit): | 4.445534686857734 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zshJgtWI993hWgc8sqYjq8fm8M4Jh8qFA+q8+HCBfFKrJd:uITfzuggrsqYDJWbjCBfMrJd |
MD5: | E8A752F91449C5C6946B9EED500C0E3E |
SHA1: | 75E4E06E55E711CA6DAFBC89C88490F0E27CA9F9 |
SHA-256: | D40F28E844FB05B770521DA8AA48DCE0AED6451E33CB88CD605D4FEC29A8244E |
SHA-512: | ECDDDC2568DFEBCA1974DDDD6EC403165FB45C0D6A059B3FF3874E3224743E8A4B51791C8CEE87C2B49577CF6A8988E437A1C80B8980DEEEB33B05CF8069CA1F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\FT0uDS8neB.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 522 |
Entropy (8bit): | 5.36138700684261 |
Encrypted: | false |
SSDEEP: | 12:Q3La/hz92n4M9tDLI4MWuPQfOKbbDLI4MWuPJK4EWPAqDcnTTJKhav:MLU84qpE4KI2KDE4KhKYIqDcfJKhk |
MD5: | C2C8B3AAEB77E2DF060A3E284CEA4D3F |
SHA1: | D3959A28A15B7FE8C5DBB86288D80FF723D0D2D9 |
SHA-256: | 63C9A133FCB15548FD22760BDA5FDE73BF5D943626A7D2480978BDE0FEBF4189 |
SHA-512: | B19994BB683286360C08F08C5CDC15E6A2AF9350829246F2B4FD69E6C139F1185D2C8D31D6E31012449BA694241E02F880AFB0C40FB1424A0FE265C3DCA33E80 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1572864 |
Entropy (8bit): | 4.351496061536473 |
Encrypted: | false |
SSDEEP: | 12288:/hUzoyoTwdcBdovor/W88n8bOv/iLkt8/ijJzSqUPspK/+BtRa5x8FT:pUzoyoTwdcjovoVqjz50 |
MD5: | 0B4BE1C62BC243095B2314523A1F2DC0 |
SHA1: | 5F9FF1FCD9D2A152998A75DF96F752E552326322 |
SHA-256: | 873C75321A54DF02E3A5760D7E101103834CCB379B8B25346C38800FC3C81BCA |
SHA-512: | B9EC97A9295BBA623D5A726C50DB13F5DB376A421B5E94383C8D0BA73E7A904E7B0C934E922D5D1CC9225CC37720AF11F339C206DDACBFEABCB0C43BD058A360 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24576 |
Entropy (8bit): | 3.864503611855815 |
Encrypted: | false |
SSDEEP: | 384:FG55vzX0mnUUfRMA7CpnXuM3g4z/vGSGunVDigfoEAH6Jphf1oJ1BmE/d:FsvzX3nUUfi6wXuM3g4z/vGnuVDigfoj |
MD5: | 5D8155E5B59F486EA6F93BAF8F860285 |
SHA1: | E2264411381A6399271A46B6BEDA4CB6ADA6F808 |
SHA-256: | 591636B8C71A4F78906584495895BFBDB58488D98575D7DEDBE8C757FE5304FB |
SHA-512: | 6343935F3322B97493203AC5BA7081211E58C347BD5D8B394A7B9993D170DDDA9EA8A691D0341492FA77CF089BEA5191945E8A05C2AE1FF9E9C7979B03810F87 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.900939534337635 |
TrID: |
|
File name: | FT0uDS8neB.exe |
File size: | 1'369'600 bytes |
MD5: | e6b8cfb15c6fce9abcea7a716345d537 |
SHA1: | c56b60c650439c124b403e31aced45c584ecdd7b |
SHA256: | 6d0fee7a64435cda0b8ac5652c5a19e9e284514bec8110ae7c02341dcc3e1277 |
SHA512: | e0163f07a996590e04340b61c3facbc2b5030936028f2ae6bb648b57fadaf2a74d2e8aea29a6eb1b6ff33058feb878f5003609b4bba018c7312c5762f1c84cc1 |
SSDEEP: | 24576:fk+bHOG7WsijczZPUIuAYfc48SCkbNY/:s+buG7B6cmHAYfgsY |
TLSH: | 17556BD53F9D5A60E529F67ACAC7608B13B5F1D72222E5272FCB02C94211B851FD2CAC |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...D/w...............P.................. ... ....@.. .......................@............@................................ |
Icon Hash: | 13fbfbfbfb30d032 |
Entrypoint: | 0x511fbe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xBB772F44 [Sat Aug 31 04:51:16 2069 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add al, 00h |
add eax, dword ptr [eax] |
add byte ptr [eax], al |
xor byte ptr [eax], al |
add byte ptr [eax+0000000Eh], al |
mov byte ptr [eax], al |
add byte ptr [eax+00000010h], al |
mov al, byte ptr [18800000h] |
add byte ptr [eax], al |
add byte ptr [eax+00800000h], bh |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], cl |
add byte ptr [ecx], al |
add byte ptr [eax], al |
add al, dl |
add byte ptr [eax], al |
add byte ptr [edx], 00000000h |
add byte ptr [eax], al |
call 00007F007C899C05h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add dword ptr [eax], eax |
add byte ptr [eax+eax], 00000000h |
add byte ptr [eax], bl |
add dword ptr [eax], eax |
add byte ptr [30000000h], 00000001h |
add byte ptr [eax+00000006h], al |
dec eax |
add dword ptr [eax], eax |
add byte ptr [edi], 00000000h |
add byte ptr [eax], al |
pushad |
add dword ptr [eax], eax |
or byte ptr [eax], 00000000h |
add byte ptr [eax], al |
js 00007F0079099C03h |
add byte ptr [eax+00000009h], al |
nop |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x111f70 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x112000 | 0x3e0f4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x152000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x111f22 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x10ffc4 | 0x110000 | False | 0.7006171731387868 | data | 6.967152206152922 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x112000 | 0x3e0f4 | 0x3e200 | False | 0.6891505281690141 | data | 6.4228390144268594 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x152000 | 0xc | 0x200 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1122b0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/m | 0.7960992907801419 | ||
RT_ICON | 0x112718 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/m | 0.6864754098360656 | ||
RT_ICON | 0x1130a0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/m | 0.6303939962476548 | ||
RT_ICON | 0x114148 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 11811 x 11811 px/m | 0.5840248962655602 | ||
RT_ICON | 0x1166f0 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 11811 x 11811 px/m | 0.5478271138403401 | ||
RT_ICON | 0x11a918 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 11811 x 11811 px/m | 0.5346580406654344 | ||
RT_ICON | 0x11fda0 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 11811 x 11811 px/m | 0.5186567164179104 | ||
RT_ICON | 0x129248 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 11811 x 11811 px/m | 0.48592215781379394 | ||
RT_ICON | 0x139a70 | 0x160b5 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 1.0003987020034775 | ||
RT_GROUP_ICON | 0x14fb28 | 0x84 | data | 0.7272727272727273 | ||
RT_VERSION | 0x14fbac | 0x35c | data | 0.40232558139534885 | ||
RT_MANIFEST | 0x14ff08 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Download Network PCAP: filtered – full
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
192.168.2.6188.114.97.749718802046637 08/18/23-00:12:35.724385 | TCP | 2046637 | ET TROJAN [ANY.RUN] Win32/Lumma Stealer Configuration Request Attempt | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
- Total Packets: 17
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 18, 2023 00:12:35.484853029 CEST | 49717 | 80 | 192.168.2.6 | 188.114.96.7 |
Aug 18, 2023 00:12:35.503599882 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.503730059 CEST | 49717 | 80 | 192.168.2.6 | 188.114.96.7 |
Aug 18, 2023 00:12:35.504090071 CEST | 49717 | 80 | 192.168.2.6 | 188.114.96.7 |
Aug 18, 2023 00:12:35.521923065 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.532723904 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.532757044 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.532777071 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.532799006 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.532818079 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.532828093 CEST | 80 | 49717 | 188.114.96.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.532830000 CEST | 49717 | 80 | 192.168.2.6 | 188.114.96.7 |
Aug 18, 2023 00:12:35.532887936 CEST | 49717 | 80 | 192.168.2.6 | 188.114.96.7 |
Aug 18, 2023 00:12:35.532928944 CEST | 49717 | 80 | 192.168.2.6 | 188.114.96.7 |
Aug 18, 2023 00:12:35.533107042 CEST | 49717 | 80 | 192.168.2.6 | 188.114.96.7 |
Aug 18, 2023 00:12:35.706820965 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Aug 18, 2023 00:12:35.723905087 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.724066973 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Aug 18, 2023 00:12:35.724385023 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Aug 18, 2023 00:12:35.742605925 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.750610113 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.750643969 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.750664949 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.750684977 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.750703096 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.750718117 CEST | 80 | 49718 | 188.114.97.7 | 192.168.2.6 |
Aug 18, 2023 00:12:35.750727892 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Aug 18, 2023 00:12:35.750727892 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Aug 18, 2023 00:12:35.750771046 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Aug 18, 2023 00:12:35.750771046 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Aug 18, 2023 00:12:38.846185923 CEST | 49718 | 80 | 192.168.2.6 | 188.114.97.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 18, 2023 00:12:35.418646097 CEST | 54502 | 53 | 192.168.2.6 | 8.8.8.8 |
Aug 18, 2023 00:12:35.474805117 CEST | 53 | 54502 | 8.8.8.8 | 192.168.2.6 |
Aug 18, 2023 00:12:35.668514013 CEST | 51084 | 53 | 192.168.2.6 | 8.8.8.8 |
Aug 18, 2023 00:12:35.705334902 CEST | 53 | 51084 | 8.8.8.8 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Aug 18, 2023 00:12:35.418646097 CEST | 192.168.2.6 | 8.8.8.8 | 0xf149 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 18, 2023 00:12:35.668514013 CEST | 192.168.2.6 | 8.8.8.8 | 0x75f2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Aug 18, 2023 00:12:35.474805117 CEST | 8.8.8.8 | 192.168.2.6 | 0xf149 | No error (0) | 188.114.96.7 | A (IP address) | IN (0x0001) | false | ||
Aug 18, 2023 00:12:35.474805117 CEST | 8.8.8.8 | 192.168.2.6 | 0xf149 | No error (0) | 188.114.97.7 | A (IP address) | IN (0x0001) | false | ||
Aug 18, 2023 00:12:35.705334902 CEST | 8.8.8.8 | 192.168.2.6 | 0x75f2 | No error (0) | 188.114.97.7 | A (IP address) | IN (0x0001) | false | ||
Aug 18, 2023 00:12:35.705334902 CEST | 8.8.8.8 | 192.168.2.6 | 0x75f2 | No error (0) | 188.114.96.7 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.6 | 49717 | 188.114.96.7 | 80 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 18, 2023 00:12:35.504090071 CEST | 92 | OUT | |
Aug 18, 2023 00:12:35.532723904 CEST | 94 | IN |