Windows
Analysis Report
Purchase Order #2024-030-AC2021,pdf.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
Purchase Order #2024-030-AC2021,pdf.exe (PID: 5712 cmdline:
C:\Users\u ser\Deskto p\Purchase Order #20 24-030-AC2 021,pdf.ex e MD5: F3EB861633087183E550ABE76551801F) CasPol.exe (PID: 5788 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\CasP ol.exe MD5: 914F728C04D3EDDD5FBA59420E74E56B) AddInProcess32.exe (PID: 5444 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\AddI nProcess32 .exe MD5: 9827FF3CDF4B83F9C86354606736CA9C)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{
"Exfil Mode": "SMTP",
"Port": "587",
"Host": "smtp.ionos.com",
"Username": "salesfire@emisafe.ae",
"Password": "nM33@e$pe%gg786o"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 37 entries |
System Summary |
---|
Source: | Author: frack113: |
- • AV Detection
- • Exploits
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Exploits |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Networking |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Task registration methods: | ||
Source: | Task registration methods: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | Window detected: |
Source: | File opened: |
Source: | Key opened: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Code function: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTP traffic detected: |
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: |
Source: | Code function: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: |
Anti Debugging |
---|
Source: | Code function: |
Source: | Process queried: |
Source: | Code function: |
Source: | Process token adjusted: | ||
Source: | Process token adjusted: |
Source: | Memory allocated: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Key value queried: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 231 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 1 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 Scheduled Task/Job | 111 Process Injection | 1 Deobfuscate/Decode Files or Information | 1 Input Capture | 34 System Information Discovery | Remote Desktop Protocol | 1 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Scheduled Task/Job | Logon Script (Windows) | 1 Scheduled Task/Job | 1 Obfuscated Files or Information | 1 Credentials in Registry | 541 Security Software Discovery | SMB/Windows Admin Shares | 1 Email Collection | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Software Packing | NTDS | 1 Process Discovery | Distributed Component Object Model | 1 Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Timestomp | LSA Secrets | 261 Virtualization/Sandbox Evasion | SSH | Keylogging | 13 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Masquerading | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 261 Virtualization/Sandbox Evasion | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 111 Process Injection | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Win32.Trojan.Tnega | ||
68% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
12% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
1% | Virustotal | Browse | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
5% | Virustotal | Browse | ||
14% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
smtp.ionos.com | 74.208.5.2 | true | true |
| unknown |
ip-api.com | 208.95.112.1 | true | false | high | |
heygirlisheeverythingyouwantedinaman.com | 172.67.190.93 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
172.67.190.93 | heygirlisheeverythingyouwantedinaman.com | United States | 13335 | CLOUDFLARENETUS | false | |
74.208.5.2 | smtp.ionos.com | United States | 8560 | ONEANDONE-ASBrauerstrasse48DE | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1394337 |
Start date and time: | 2024-02-19 09:53:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 23s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Purchase Order #2024-030-AC2021,pdf.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.expl.evad.winEXE@5/1@3/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, SIHClient.exe, svch ost.exe - TCP Packets have been reduced
to 100 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, ocsp.digicert.com, slscr.u pdate.microsoft.com, ctldl.win dowsupdate.com, fe3cr.delivery .mp.microsoft.com - HTTPS proxy raw data packets h
ave been limited to 10 per ses sion. Please view the PCAPs fo r the complete data. - Report size getting too big, t
oo many NtDeviceIoControlFile calls found. - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtReadVirtualMemory ca lls found.
Time | Type | Description |
---|---|---|
09:53:54 | API Interceptor | |
09:53:57 | API Interceptor |
Process: | C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1513 |
Entropy (8bit): | 5.350429166386848 |
Encrypted: | false |
SSDEEP: | 24:ML9Xyr4wE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4q4E4Tyu84j:MpicwHK5HKH1qHiYHKh3oPtHo6hAHKzH |
MD5: | 465EFCC6D66470A531259A6D9417A6CB |
SHA1: | 7CEB25C7612B289039BDE035469641A0B10D1C68 |
SHA-256: | B48406D6C730A07C17712C21F925C30E16CE2715C52612AAC308CCE29351F440 |
SHA-512: | B47E0979A658758A0F1B643EE3F85B92046B94B73AE0143341F985B7832D86E18158EE108BF5C6CBE9840EF50C0E9E33557685D9D0B165EE4A6576E41D6A8BA2 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.440296696297883 |
TrID: |
|
File name: | Purchase Order #2024-030-AC2021,pdf.exe |
File size: | 26'112 bytes |
MD5: | f3eb861633087183e550abe76551801f |
SHA1: | 4b97d4a0ce597cb4dd223b13f1551b5db7a02d26 |
SHA256: | 4e9356141c7e446794e4d4cfcde9187b2232d6c55a512f06be31c0fbab9ab80c |
SHA512: | 2f9ee7321d45fe4d2af10e23789e0258008e2e6eaca6445855a28bfc4fa3557f8c94e3e58754a9999a76f3763b225bf87f016a2c3e3a1769db3742ea9547f5a8 |
SSDEEP: | 384:WnI2V8g892qoKLgiUda3SOj+66uXx9xf8zMA9kSjIPJmuklPTVxQ7J:WxV8g892XKNx3ptXnJmuaPTQ |
TLSH: | 2CC22C0AA3D8833BC99F0FB7D9A6191027B9D656EF83E75D86CCB8721B333D141112A5 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....]i..........."...0.<Z..........6z... ........@.. ....................................`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x407a36 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xBE695D8E [Thu Mar 26 06:17:50 2071 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x7960 | 0x4a | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x5b6 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xa000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x79aa | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x5a3c | 0x5c00 | 75379ab70858e6b5cc9e2217893cff85 | False | 0.48178498641304346 | data | 5.601267915521747 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x5b6 | 0x600 | 3b6c35e12e4be6e6fd4f3ceadef6aa66 | False | 0.41796875 | data | 4.121194235215341 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xa000 | 0xc | 0x200 | 561a7af5fe929713baecb880e7a4c206 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x80a0 | 0x32c | data | 0.4236453201970443 | ||
RT_MANIFEST | 0x83cc | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
- Total Packets: 42
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 19, 2024 09:53:55.786500931 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:55.786555052 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:55.786634922 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:55.811161995 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:55.811197996 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.014812946 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.015022993 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.018618107 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.018630028 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.019089937 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.073853970 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.125669003 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.165908098 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449342012 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449400902 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449429035 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449448109 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.449460030 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449472904 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449498892 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.449523926 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449557066 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.449572086 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449609995 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.449645996 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.449652910 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.450335979 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.450356007 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.450387955 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.450393915 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.450432062 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.524158955 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.524210930 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.524250031 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.524272919 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.524271011 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.524297953 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.524327040 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.524333000 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.524379969 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.524384975 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.525031090 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.525070906 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.525079966 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.525088072 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.525114059 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.525125980 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.525131941 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.525172949 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.525177956 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526022911 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526045084 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526062965 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.526071072 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526093960 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526115894 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526118994 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.526125908 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526173115 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.526770115 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526808023 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526817083 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.526822090 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.526896000 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.600133896 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.600178957 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.600203037 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.600224018 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.600236893 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.600250959 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.600285053 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.600682974 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.600728035 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.600739002 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.600776911 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.601588011 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.601619005 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.601639032 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.601644993 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.601691961 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.602289915 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.602334023 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.602396011 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.602442980 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.611901045 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.611958981 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.611985922 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.612029076 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.612819910 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.612865925 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.613121986 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.613168001 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.613784075 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.613830090 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.613873005 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.613917112 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.614554882 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.614600897 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Feb 19, 2024 09:53:56.614607096 CET | 49706 | 443 | 192.168.2.5 | 172.67.190.93 |
Feb 19, 2024 09:53:56.614615917 CET | 443 | 49706 | 172.67.190.93 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 19, 2024 09:53:55.630465031 CET | 54707 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 19, 2024 09:53:55.773751020 CET | 53 | 54707 | 1.1.1.1 | 192.168.2.5 |
Feb 19, 2024 09:53:57.837727070 CET | 59701 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 19, 2024 09:53:57.925973892 CET | 53 | 59701 | 1.1.1.1 | 192.168.2.5 |
Feb 19, 2024 09:53:58.969491959 CET | 53583 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 19, 2024 09:53:59.058597088 CET | 53 | 53583 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 19, 2024 09:53:55.630465031 CET | 192.168.2.5 | 1.1.1.1 | 0x6508 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 19, 2024 09:53:57.837727070 CET | 192.168.2.5 | 1.1.1.1 | 0x5e0c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 19, 2024 09:53:58.969491959 CET | 192.168.2.5 | 1.1.1.1 | 0x11f0 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 19, 2024 09:53:55.773751020 CET | 1.1.1.1 | 192.168.2.5 | 0x6508 | No error (0) | 172.67.190.93 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2024 09:53:55.773751020 CET | 1.1.1.1 | 192.168.2.5 | 0x6508 | No error (0) | 104.21.57.121 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2024 09:53:57.925973892 CET | 1.1.1.1 | 192.168.2.5 | 0x5e0c | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2024 09:53:59.058597088 CET | 1.1.1.1 | 192.168.2.5 | 0x11f0 | No error (0) | 74.208.5.2 | A (IP address) | IN (0x0001) | false |
|
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Feb 19, 2024 09:53:59.315932035 CET | 587 | 49709 | 74.208.5.2 | 192.168.2.5 | 220 perfora.net (mreueus002) Nemesis ESMTP Service ready |
Feb 19, 2024 09:53:59.316338062 CET | 49709 | 587 | 192.168.2.5 | 74.208.5.2 | EHLO 114127 |
Feb 19, 2024 09:53:59.446036100 CET | 587 | 49709 | 74.208.5.2 | 192.168.2.5 | 250-perfora.net Hello 114127 [191.96.227.222] 250-8BITMIME 250-SIZE 140000000 250 STARTTLS |
Feb 19, 2024 09:53:59.446304083 CET | 49709 | 587 | 192.168.2.5 | 74.208.5.2 | STARTTLS |
Feb 19, 2024 09:53:59.573797941 CET | 587 | 49709 | 74.208.5.2 | 192.168.2.5 | 220 OK |
Click to jump to process
Target ID: | 0 |
Start time: | 09:53:53 |
Start date: | 19/02/2024 |
Path: | C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc50000 |
File size: | 26'112 bytes |
MD5 hash: | F3EB861633087183E550ABE76551801F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 09:53:55 |
Start date: | 19/02/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x2a0000 |
File size: | 108'664 bytes |
MD5 hash: | 914F728C04D3EDDD5FBA59420E74E56B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 09:53:55 |
Start date: | 19/02/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x740000 |
File size: | 43'008 bytes |
MD5 hash: | 9827FF3CDF4B83F9C86354606736CA9C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |