Windows
Analysis Report
wuauclt.exe
Overview
General Information
Detection
Score: | 22 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") |
- System is w10x64
wuauclt.exe (PID: 5256 cmdline:
C:\Users\u ser\Deskto p\wuauclt. exe MD5: 4D45FA5DD472E526CDF376D077EBD61B)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00007FF693DB43E0 | |
Source: | Code function: | 0_2_00007FF693DB81C0 | |
Source: | Code function: | 0_2_00007FF693DB46A0 | |
Source: | Code function: | 0_2_00007FF693DB5F40 |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF693DB1330 |
Source: | Thread sleep time: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Code function: | 0_2_00007FF693DB1330 | |
Source: | Code function: | 0_2_00007FF693DB1380 |
Source: | Code function: | 0_2_00007FF693DB1330 |
Source: | Code function: | 0_2_00007FF693EF4544 |
Source: | Key value queried: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 2 Command and Scripting Interpreter | Path Interception | Path Interception | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 11 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Software Packing | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 3 Non-Application Layer Protocol | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 4 Application Layer Protocol | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 3 System Information Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | 3 Ingress Tool Transfer | Data Destruction | Virtual Private Server | Employee Names |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
spst.no | 54.161.234.33 | true | false | unknown | |
www.spst.no | 18.213.222.111 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
54.161.234.33 | spst.no | United States | 14618 | AMAZON-AESUS | false | |
18.213.222.111 | www.spst.no | United States | 14618 | AMAZON-AESUS | false |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1358920 |
Start date and time: | 2023-12-11 21:29:44 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | wuauclt.exe |
Detection: | SUS |
Classification: | sus22.evad.winEXE@1/0@2/2 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, Ru ntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskH ost.exe - Excluded domains from analysis
(whitelisted): client.wns.win dows.com, ocsp.digicert.com, s lscr.update.microsoft.com, ctl dl.windowsupdate.com, fe3cr.de livery.mp.microsoft.com - Execution Graph export aborted
for target wuauclt.exe, PID 5 256 because there are no execu ted function - Report size getting too big, t
oo many NtQueryValueKey calls found. - VT rate limit hit for: wuaucl
t.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54.161.234.33 | Get hash | malicious | Unknown | Browse | ||
18.213.222.111 | Get hash | malicious | FormBook, NSISDropper | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-AESUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, NSISDropper | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
AMAZON-AESUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, NSISDropper | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRAT | Browse |
| |
Get hash | malicious | PrivateLoader, RisePro Stealer | Browse |
| ||
Get hash | malicious | PrivateLoader, RisePro Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PrivateLoader, RisePro Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Glupteba, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader | Browse |
| ||
Get hash | malicious | PrivateLoader, RisePro Stealer | Browse |
|
File type: | |
Entropy (8bit): | 6.840413953413756 |
TrID: |
|
File name: | wuauclt.exe |
File size: | 1'871'872 bytes |
MD5: | 4d45fa5dd472e526cdf376d077ebd61b |
SHA1: | 61e8cd1e92549c404c3ad2570e98d81b563bcffd |
SHA256: | 971e53c90306a7b13ac6ad1726360aab5dcab418839d4ed53735cbc1e2b40bcf |
SHA512: | a303326b80a3a778e6caa210c3baccab3619fa91fd3c5a89802a7072081a6ef093a18146e504321e14580b0b19635775b9648468961c1870ca084d137570849f |
SSDEEP: | 49152:WOIU6iMGtlqfVwASO9Jj7v4+AHAoJK4dZhqZwdPrg:w+yKHDdXqwlg |
TLSH: | 8B85AE66A2A401E4D976D23CC8569137E7F1B42D13B09BDF0AA5C9A90F13BE16F3E740 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H.W.H.W.H.W.0aW.H.W.7.V.H.W.7.V.H.W.7.V.H.W.7.V.H.W.0.V.H.W.H.W8H.W.H.W.H.W9=.V.I.W...V.H.W...W.H.W...V.H.WRich.H.W....... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x140143f28 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x654CDD01 [Thu Nov 9 13:22:09 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | e28e4e32012deb9923a5cada46a7cbd9 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F8C88D6BD68h |
dec eax |
add esp, 28h |
jmp 00007F8C88D6B5C7h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
nop word ptr [eax+eax+00000000h] |
dec eax |
sub esp, 10h |
dec esp |
mov dword ptr [esp], edx |
dec esp |
mov dword ptr [esp+08h], ebx |
dec ebp |
xor ebx, ebx |
dec esp |
lea edx, dword ptr [esp+18h] |
dec esp |
sub edx, eax |
dec ebp |
cmovb edx, ebx |
dec esp |
mov ebx, dword ptr [00000010h] |
dec ebp |
cmp edx, ebx |
jnc 00007F8C88D6B768h |
inc cx |
and edx, 8D4DF000h |
wait |
add al, dh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1b6134 | 0x190 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1ca000 | 0x1e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x1be000 | 0xbc94 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1cb000 | 0x4b18 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x1aa050 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x1aa100 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x1a9f10 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x145000 | 0x618 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x143ddc | 0x143e00 | False | 0.5158413438344268 | data | 6.960538009860704 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x145000 | 0x725f8 | 0x72600 | False | 0.43719689207650275 | data | 5.704278871182318 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x1b8000 | 0x5450 | 0x1c00 | False | 0.2699497767857143 | data | 3.106513262267233 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x1be000 | 0xbc94 | 0xbe00 | False | 0.47569901315789476 | data | 6.07921670477847 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x1ca000 | 0x1e0 | 0x200 | False | 0.533203125 | data | 4.7176788329467545 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x1cb000 | 0x4b18 | 0x4c00 | False | 0.28793174342105265 | data | 5.427328695251215 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x1ca060 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | WaitForMultipleObjects, CreateFileW, GetCurrentThreadId, Sleep, DeleteFileW, CloseHandle, LoadLibraryW, CreateThread, HeapAlloc, GetCurrentDirectoryW, Beep, GetProcAddress, GetCurrentProcessId, GetProcessHeap, IsDebuggerPresent, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleExW, GetCurrentProcess, GetStdHandle, GetEnvironmentVariableW, GetFileType, GetModuleHandleW, DeleteFiber, TerminateProcess, RtlVirtualUnwind, QueryPerformanceCounter, GetSystemTimeAsFileTime, ConvertFiberToThread, WideCharToMultiByte, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, FreeLibrary, LoadLibraryA, FindClose, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlLookupFunctionEntry, RtlCaptureContext, WriteFile, FindNextFileW, HeapFree, GetFileSizeEx, FindFirstFileW, MultiByteToWideChar, ReadFile |
USER32.dll | ExitWindowsEx, GetWindowLongPtrW, SetWindowPos, UnhookWinEvent, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, MessageBoxW, SetWinEventHook, MessageBoxA |
ADVAPI32.dll | AdjustTokenPrivileges, LookupPrivilegeValueW, DeregisterEventSource, RegisterEventSourceW, ReportEventW, OpenProcessToken |
WINHTTP.dll | WinHttpCloseHandle, WinHttpReadData, WinHttpSendRequest, WinHttpConnect, WinHttpQueryDataAvailable, WinHttpOpen, WinHttpReceiveResponse, WinHttpOpenRequest |
SHLWAPI.dll | StrCmpW, PathRemoveExtensionW, PathFindExtensionW |
WS2_32.dll | closesocket, WSASetLastError, send, recv, WSAGetLastError, WSACleanup |
bcrypt.dll | BCryptGenRandom |
VCRUNTIME140.dll | memcmp, memcpy, memmove, memset, strchr, memchr, strrchr, _CxxThrowException, __std_exception_destroy, __std_exception_copy, __current_exception_context, __current_exception, __C_specific_handler, strstr, wcsstr |
api-ms-win-crt-utility-l1-1-0.dll | qsort, rand, srand |
api-ms-win-crt-runtime-l1-1-0.dll | _initialize_onexit_table, _invalid_parameter_noinfo, _register_onexit_function, _c_exit, _cexit, __p___argv, __p___argc, _exit, exit, raise, _register_thread_local_exe_atexit_callback, _initterm_e, _initterm, terminate, _get_initial_narrow_environment, _initialize_narrow_environment, strerror_s, _configure_narrow_argv, _errno, _crt_atexit, signal, _seh_filter_exe, _set_app_type |
api-ms-win-crt-stdio-l1-1-0.dll | __acrt_iob_func, fclose, __stdio_common_vfprintf, __stdio_common_vsscanf, fputs, __stdio_common_vsprintf, _set_fmode, feof, ferror, fflush, fgets, fopen, _wfopen, _fileno, __p__commode, fread, fseek, _setmode, fwrite, __stdio_common_vswprintf, ftell |
api-ms-win-crt-heap-l1-1-0.dll | free, realloc, malloc, _set_new_mode, _callnewh |
api-ms-win-crt-string-l1-1-0.dll | strcspn, isspace, _stricmp, _strnicmp, strspn, strncpy, strncmp, strcmp |
api-ms-win-crt-convert-l1-1-0.dll | strtoul, strtol, atoi |
api-ms-win-crt-time-l1-1-0.dll | _time64, _gmtime64_s |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
api-ms-win-crt-filesystem-l1-1-0.dll | _stat64i32 |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Download Network PCAP: filtered – full
- Total Packets: 20
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 11, 2023 21:30:38.711590052 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:38.711621046 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:38.711716890 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:38.714252949 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:38.714267015 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.063301086 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.063445091 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:39.076747894 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:39.076787949 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.077152014 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.119666100 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:39.197904110 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:39.240746975 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.376461983 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.376523972 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.376586914 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:39.377806902 CET | 49708 | 443 | 192.168.2.6 | 18.213.222.111 |
Dec 11, 2023 21:30:39.377824068 CET | 443 | 49708 | 18.213.222.111 | 192.168.2.6 |
Dec 11, 2023 21:30:39.513242960 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:39.513277054 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:39.513354063 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:39.513936996 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:39.513946056 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:39.849845886 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:39.850148916 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:39.851576090 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:39.851588011 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:39.851938009 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:39.853787899 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:39.896750927 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:40.221400023 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:40.221486092 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:40.221512079 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:40.221724987 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:40.221740007 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Dec 11, 2023 21:30:40.221801996 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:40.222532988 CET | 49709 | 443 | 192.168.2.6 | 54.161.234.33 |
Dec 11, 2023 21:30:40.222549915 CET | 443 | 49709 | 54.161.234.33 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 11, 2023 21:30:38.420778990 CET | 59447 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 11, 2023 21:30:38.703227043 CET | 53 | 59447 | 1.1.1.1 | 192.168.2.6 |
Dec 11, 2023 21:30:39.379086971 CET | 65482 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 11, 2023 21:30:39.508213043 CET | 53 | 65482 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 11, 2023 21:30:38.420778990 CET | 192.168.2.6 | 1.1.1.1 | 0x285f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 11, 2023 21:30:39.379086971 CET | 192.168.2.6 | 1.1.1.1 | 0xad5a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 11, 2023 21:30:38.703227043 CET | 1.1.1.1 | 192.168.2.6 | 0x285f | No error (0) | 18.213.222.111 | A (IP address) | IN (0x0001) | false | ||
Dec 11, 2023 21:30:38.703227043 CET | 1.1.1.1 | 192.168.2.6 | 0x285f | No error (0) | 54.161.234.33 | A (IP address) | IN (0x0001) | false | ||
Dec 11, 2023 21:30:39.508213043 CET | 1.1.1.1 | 192.168.2.6 | 0xad5a | No error (0) | 54.161.234.33 | A (IP address) | IN (0x0001) | false | ||
Dec 11, 2023 21:30:39.508213043 CET | 1.1.1.1 | 192.168.2.6 | 0xad5a | No error (0) | 35.169.59.174 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49708 | 18.213.222.111 | 443 | 5256 | C:\Users\user\Desktop\wuauclt.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2023-12-11 20:30:39 UTC | 176 | OUT | |
2023-12-11 20:30:39 UTC | 338 | IN | |
2023-12-11 20:30:39 UTC | 83 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49709 | 54.161.234.33 | 443 | 5256 | C:\Users\user\Desktop\wuauclt.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2023-12-11 20:30:39 UTC | 172 | OUT | |
2023-12-11 20:30:40 UTC | 376 | IN | |
2023-12-11 20:30:40 UTC | 2372 | IN | |
2023-12-11 20:30:40 UTC | 717 | IN | |
2023-12-11 20:30:40 UTC | 5 | IN |
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 21:30:37 |
Start date: | 11/12/2023 |
Path: | C:\Users\user\Desktop\wuauclt.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff693db0000 |
File size: | 1'871'872 bytes |
MD5 hash: | 4D45FA5DD472E526CDF376D077EBD61B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |