Windows
Analysis Report
123.scr.exe
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 123.scr.exe (PID: 1396 cmdline:
C:\Users\u ser\Deskto p\123.scr. exe MD5: 2CD8134F58CDBDA71373F5EA79D5A422)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 121 Windows Management Instrumentation | Path Interception | Path Interception | 1 Masquerading | 1 OS Credential Dumping | 121 Security Software Discovery | Remote Services | 2 Data from Local System | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 3 Ingress Tool Transfer | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 141 Virtualization/Sandbox Evasion | Security Account Manager | 141 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 3 Non-Application Layer Protocol | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 33 System Information Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | 4 Application Layer Protocol | Data Destruction | Virtual Private Server | Employee Names | ||
Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 2 Software Packing | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Scheduled Transfer | Fallback Channels | Data Encrypted for Impact | Server | Gather Victim Network Information |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
62% | ReversingLabs | Win32.Trojan.Generic | ||
51% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1314436 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
1% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ipbase.com | 104.21.85.189 | true | false |
| unknown |
freegeoip.app | 104.21.73.97 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.85.189 | ipbase.com | United States | 13335 | CLOUDFLARENETUS | false | |
104.21.73.97 | freegeoip.app | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1361824 |
Start date and time: | 2023-12-14 01:43:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 14s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 123.scr.exe |
Detection: | MAL |
Classification: | mal72.spyw.evad.winEXE@1/14@2/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.85.189 | Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse | ||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
104.21.73.97 | Get hash | malicious | Snake Keylogger | Browse | ||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | Ades Stealer, NitroStealer | Browse | |||
Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse | |||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ipbase.com | Get hash | malicious | Rags Stealer | Browse |
| |
Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, zgRAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Ades Stealer, NitroStealer | Browse |
| ||
Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse |
| ||
Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, Matiex, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
freegeoip.app | Get hash | malicious | Rags Stealer | Browse |
| |
Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, zgRAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Ades Stealer, NitroStealer | Browse |
| ||
Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse |
| ||
Get hash | malicious | 44Caliber Stealer, Rags Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, Matiex, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Rags Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Rags Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Rags Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
|
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 620 |
Entropy (8bit): | 4.0822298618700446 |
Encrypted: | false |
SSDEEP: | 6:pYcCFWl4BjJRAMVIKNJAU4wSTeldwLLZu0GhU+0Y7VgEA67X:pYzdRTXxtSTeDyV2U+17VrA6r |
MD5: | 0AAE77ABCEA44270CBD9B3E2663F7C8F |
SHA1: | F0FC5B2A49637E191A9540EDFD74D02DC8A506D8 |
SHA-256: | 4FE68384D213EC562ED77FFEFB1A414EDC38B18734AE106F8A183C31BB82561E |
SHA-512: | 34BAA8AE685F21304AA46C6D6462EA625348FBBDC8E61297B44D634C26268625F5C2CF174523BA805FB151F442E1FE1B9B1B40A5A0F2CAC1F403903AA0120AA5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4385 |
Entropy (8bit): | 4.806386342006856 |
Encrypted: | false |
SSDEEP: | 48:s8kXE//QzkQQE4Q/QQQQQQQpSq6uODQQQdu///QQXsXsNMTMTu3W8kZKF/QQQQQI:5G572Yexw0ZJt/3 |
MD5: | 419F391EA92B4BEBA23A3F55CC18B5DF |
SHA1: | 62C51A205ADCF381226E77E3F01971D33B7ED507 |
SHA-256: | F3C5DD1668870C284E42F13D9037DD150FACF5B03C1F0688D5B3585FEC88ECBB |
SHA-512: | 114F77FA1DF81F8E77335563DFCF10112E8610A187EDE7FBCD218D683427A539C61488BD7B93092B61C4C2521CD65D80AA2AA8324D5FB2011CF41550B8797ABC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 691304 |
Entropy (8bit): | 7.926770062305592 |
Encrypted: | false |
SSDEEP: | 12288:fmdao6o0nRBx3Ip1lQaEzLw+tOhfXJKme61hexsLpHJLRpe3qUPELo67:f0aorGd3/zLsKc0sLJpe3qU4o+ |
MD5: | E637C2EB2DBA91D4E02091946D2E58E6 |
SHA1: | 4A67F1773799BF62C501E1E35F400EA7BCD01A81 |
SHA-256: | 9B4E45DEE72B70862898DC646EAE3D6279FFF1E1EB7F094A8BD79A0129A6BF33 |
SHA-512: | 5DAF06D185EE39C72459FFD6D0F539B1C59D1E229F7E083E8057F1B29C4E4F1D150E445330C68348CC284631AE23E94D395E8F8CF1D94A6505DDA1B246A9B712 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 229376 |
Entropy (8bit): | 0.643383182059925 |
Encrypted: | false |
SSDEEP: | 384:A1zkVmvQhyn+Zoz67kMMTNlH333JqN8j/LKXu5Uu/:AlM0sCyW |
MD5: | F23F48363C7BAA0709698208A7E833A0 |
SHA1: | 07D2AEE271A0F2BA14608FE5A9A677E2594D22CC |
SHA-256: | 51DFB72705CBEB6AF5A14F2BE20FC39172E86263E25704F50BEB292F776B7713 |
SHA-512: | F8F16198A96F047E320EF82026160EBD5A0836B48FC3496C427F90965CF3BF5FAB5EBE0FB9016E3BDE56657EB42627D7286AED3167A422D69F865524892C3DFA |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 294912 |
Entropy (8bit): | 0.08438200565341271 |
Encrypted: | false |
SSDEEP: | 192:5va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23v4U:51zkVmvQhyn+Zoz67NU |
MD5: | F7EEE7B0D281E250D1D8E36486F5A2C3 |
SHA1: | 309736A27E794672BD1BDFBAC69B2C6734FC25CE |
SHA-256: | 378DD46FE8A8AAC2C430AE8A7C5C1DC3C2A343534A64A263EC9A4F1CE801985E |
SHA-512: | CE102A41CA4E2A27CCB27F415D2D69A75A0058BA0F600C23F63B89F30FFC982BA48336140714C522B46CC6D13EDACCE3DF0D6685D02844B8DB0AD3378DB9CABB |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1498 |
Entropy (8bit): | 5.364175471524945 |
Encrypted: | false |
SSDEEP: | 24:ML9E4KQEAE4KKUNKKDE4KGKZI6KhPKIE4TKBGKoC1qE4GIs0E4K6sXE4Npv:MxHKQEAHKKkKYHKGSI6oPtHTHK1qHGI8 |
MD5: | 1B713A2FD810C1C9A8F6F6BE36F406B1 |
SHA1: | 0828576CB8B83C21F36AD29E327D845AB3574EBB |
SHA-256: | E51E809582894F4D484939BE3990DFC914E43F4AF72AE55A00B01FCFE348763B |
SHA-512: | D32200B7FA9D0DFEF4011D98D40260838A522E63C874FBCCE00D331D663169DBE1C613AD0E81C76F69A8CE6C7265605175CA75BA2C8BDA7748290B34579E148B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5242880 |
Entropy (8bit): | 0.03859996294213402 |
Encrypted: | false |
SSDEEP: | 192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y |
MD5: | D2A38A463B7925FE3ABE31ECCCE66ACA |
SHA1: | A1824888F9E086439B287DEA497F660F3AA4B397 |
SHA-256: | 474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0 |
SHA-512: | 62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 0.08235737944063153 |
Encrypted: | false |
SSDEEP: | 12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO |
MD5: | 369B6DD66F1CAD49D0952C40FEB9AD41 |
SHA1: | D05B2DE29433FB113EC4C558FF33087ED7481DD4 |
SHA-256: | 14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D |
SHA-512: | 771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\123.scr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.985739733331055 |
TrID: |
|
File name: | 123.scr.exe |
File size: | 562'176 bytes |
MD5: | 2cd8134f58cdbda71373f5ea79d5a422 |
SHA1: | f30cc8c8056e6943a4114e557615552f16cb8e2f |
SHA256: | 7e00639b962e167ab8463fa871f8fe12f6e38166a497d7ed8cf3a2370053d1f0 |
SHA512: | a6042ab229429830a0e98b17873b68b4799ccde6637e55ff7bbf94eaa6af0d4f89e019fea67a04a04550889be89a3db701372978584569cdd350e86a6a2f65a0 |
SSDEEP: | 12288:nYhJzH0hGN8nVY5cdFWOh+0H0uc1k7EIKxih+sgPrv6KfNcyFEOYw76:YfwM+nVMcPVY0U7qHKxugjdeyFm |
TLSH: | B7C423DE7654328ECC0BD039CD480EB83790697FAB8F4667552354E7860DAE28F252B7 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ye.........."......j...(........... ........@.. ....................................`................................ |
Icon Hash: | 20f02b23333b0022 |
Entrypoint: | 0x48892e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6579C99E [Wed Dec 13 15:11:26 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x888d4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8a000 | 0x2488 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x8e000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x86934 | 0x86a00 | False | 0.981515131731662 | data | 7.989676579902905 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8a000 | 0x2488 | 0x2600 | False | 0.9064555921052632 | data | 7.7074177570634514 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x8e000 | 0xc | 0x200 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x8a0a8 | 0x23c7 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.9523965498416858 | ||
RT_GROUP_ICON | 0x8c470 | 0x14 | data | 1.05 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 14, 2023 01:44:06.283051014 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.283122063 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.283209085 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.312927961 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.312962055 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.579565048 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.579688072 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.589175940 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.589189053 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.589509964 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.636068106 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.670085907 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.712740898 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.870414019 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.870481014 CET | 443 | 49704 | 104.21.73.97 | 192.168.2.5 |
Dec 14, 2023 01:44:06.870560884 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:06.874358892 CET | 49704 | 443 | 192.168.2.5 | 104.21.73.97 |
Dec 14, 2023 01:44:07.007097960 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.007116079 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.007188082 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.007627964 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.007642031 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.272891045 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.273113966 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.275790930 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.275803089 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.276032925 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.277173042 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.324738026 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.627938032 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.627989054 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.628020048 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.628110886 CET | 443 | 49705 | 104.21.85.189 | 192.168.2.5 |
Dec 14, 2023 01:44:07.628123999 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.628160954 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Dec 14, 2023 01:44:07.637212992 CET | 49705 | 443 | 192.168.2.5 | 104.21.85.189 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 14, 2023 01:44:06.145927906 CET | 54434 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 14, 2023 01:44:06.272604942 CET | 53 | 54434 | 1.1.1.1 | 192.168.2.5 |
Dec 14, 2023 01:44:06.878026009 CET | 59361 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 14, 2023 01:44:07.006154060 CET | 53 | 59361 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 14, 2023 01:44:06.145927906 CET | 192.168.2.5 | 1.1.1.1 | 0xaffb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 14, 2023 01:44:06.878026009 CET | 192.168.2.5 | 1.1.1.1 | 0x9fc8 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 14, 2023 01:44:06.272604942 CET | 1.1.1.1 | 192.168.2.5 | 0xaffb | No error (0) | 104.21.73.97 | A (IP address) | IN (0x0001) | false | ||
Dec 14, 2023 01:44:06.272604942 CET | 1.1.1.1 | 192.168.2.5 | 0xaffb | No error (0) | 172.67.160.84 | A (IP address) | IN (0x0001) | false | ||
Dec 14, 2023 01:44:07.006154060 CET | 1.1.1.1 | 192.168.2.5 | 0x9fc8 | No error (0) | 104.21.85.189 | A (IP address) | IN (0x0001) | false | ||
Dec 14, 2023 01:44:07.006154060 CET | 1.1.1.1 | 192.168.2.5 | 0x9fc8 | No error (0) | 172.67.209.71 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.21.73.97 | 443 | 1396 | C:\Users\user\Desktop\123.scr.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2023-12-14 00:44:06 UTC | 67 | OUT | |
2023-12-14 00:44:06 UTC | 637 | IN | |
2023-12-14 00:44:06 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 104.21.85.189 | 443 | 1396 | C:\Users\user\Desktop\123.scr.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2023-12-14 00:44:07 UTC | 64 | OUT | |
2023-12-14 00:44:07 UTC | 735 | IN | |
2023-12-14 00:44:07 UTC | 634 | IN | |
2023-12-14 00:44:07 UTC | 1369 | IN | |
2023-12-14 00:44:07 UTC | 1086 | IN | |
2023-12-14 00:44:07 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 01:44:04 |
Start date: | 14/12/2023 |
Path: | C:\Users\user\Desktop\123.scr.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x1d831910000 |
File size: | 562'176 bytes |
MD5 hash: | 2CD8134F58CDBDA71373F5EA79D5A422 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Has exited: | false |