Windows
Analysis Report
192-34-56-49-32.exe
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
192-34-56-49-32.exe (PID: 5276 cmdline:
"C:\Users\ user\Deskt op\192-34- 56-49-32.e xe" MD5: 0ED35085BC066AD51240FE4BF40A53AB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Sliver | According to VK9 Seecurity, Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
| |
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
|
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0016B8D0 | |
Source: | Code function: | 0_2_0016A630 |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Binary or memory string: | memstr_e7dd985b-4 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_001A4BB0 |
Source: | Code function: | 0_2_0016D020 | |
Source: | Code function: | 0_2_0015A060 | |
Source: | Code function: | 0_2_0014B930 | |
Source: | Code function: | 0_2_00148140 | |
Source: | Code function: | 0_2_0016A960 | |
Source: | Code function: | 0_2_0016C1E0 | |
Source: | Code function: | 0_2_00150A40 | |
Source: | Code function: | 0_2_0016E330 | |
Source: | Code function: | 0_2_00151B4B | |
Source: | Code function: | 0_2_0015E360 | |
Source: | Code function: | 0_2_00190BC0 | |
Source: | Code function: | 0_2_0018EC20 | |
Source: | Code function: | 0_2_00153530 | |
Source: | Code function: | 0_2_00152590 | |
Source: | Code function: | 0_2_00178DE0 | |
Source: | Code function: | 0_2_00167E10 | |
Source: | Code function: | 0_2_0016D630 | |
Source: | Code function: | 0_2_0016DEA0 | |
Source: | Code function: | 0_2_00152700 | |
Source: | Code function: | 0_2_001637C0 |
Source: | Code function: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0015C077 | |
Source: | Code function: | 0_2_0015F941 | |
Source: | Code function: | 0_2_0015FAE6 | |
Source: | Code function: | 0_2_0015A800 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Queries volume information: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | 11 Input Capture | 1 Security Software Discovery | Remote Services | 11 Input Capture | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | 1 Archive Collected Data | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 3 Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | ReversingLabs | Win32.Trojan.SliverMarte | ||
100% | Avira | TR/Patched.Gen |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.34.56.49 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1486764 |
Start date and time: | 2024-08-02 14:55:06 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 30s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 192-34-56-49-32.exe |
Detection: | MAL |
Classification: | mal76.troj.winEXE@1/0@0/1 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, SIHClient.exe, svch ost.exe - Excluded domains from analysis
(whitelisted): client.wns.win dows.com, ocsp.digicert.com, s lscr.update.microsoft.com, ctl dl.windowsupdate.com, fe3cr.de livery.mp.microsoft.com - Execution Graph export aborted
for target 192-34-56-49-32.ex e, PID 5276 because there are no executed function - VT rate limit hit for: 192-34
-56-49-32.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
192.34.56.49 | Get hash | malicious | CobaltStrike, ReflectiveLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DIGITALOCEAN-ASNUS | Get hash | malicious | Sliver | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Sliver | Browse |
| ||
Get hash | malicious | Sliver | Browse |
| ||
Get hash | malicious | Sliver | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | MicroClip | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Moobot, Okiru | Browse |
|
File type: | |
Entropy (8bit): | 6.45617684594575 |
TrID: |
|
File name: | 192-34-56-49-32.exe |
File size: | 16'050'176 bytes |
MD5: | 0ed35085bc066ad51240fe4bf40a53ab |
SHA1: | c6fd220b6df65062714890d9d64313b98a109d2b |
SHA256: | d275507a8c1af840c4da37391d92e9e144ee5d970b84499eae7f8c2a5c11b98a |
SHA512: | bc11b3a22ecdb4521324aff5bf09528253836c561686fc8c0a1ba411c0a063f851d35d4e5daac33cc5bb82786e3f78e96b06bddd0888a48ecb3bd33d70bb6c99 |
SSDEEP: | 196608:fZx0bG4qXk9IJRJA5K5mIC0CpQSbrEPdll9g08krnO1Q5l:sqXfAM8bri3Ye |
TLSH: | 3CF63BD0FED78AB2DA039A30419361AF53343D894735E983E6443FC6E8BB3960977616 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........................x..........PI............@.......................................@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x464950 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x0 [Thu Jan 1 00:00:00 1970 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 1 |
File Version Major: | 6 |
File Version Minor: | 1 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 1 |
Import Hash: | 9cbefe68f395e67356e2a5d8d1b285c0 |
Instruction |
---|
jmp 00007FC4E8ACF620h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov ecx, dword ptr [esp+04h] |
sub esp, 28h |
mov dword ptr [esp+1Ch], ebx |
mov dword ptr [esp+10h], ebp |
mov dword ptr [esp+14h], esi |
mov dword ptr [esp+18h], edi |
mov esi, eax |
mov edx, dword ptr fs:[00000014h] |
cmp edx, 00000000h |
jne 00007FC4E8AD1979h |
mov eax, 00000000h |
jmp 00007FC4E8AD19D6h |
mov edx, dword ptr [edx+00000000h] |
cmp edx, 00000000h |
jne 00007FC4E8AD1977h |
call 00007FC4E8AD1A69h |
mov dword ptr [esp+20h], edx |
mov dword ptr [esp+24h], esp |
mov ebx, dword ptr [edx+18h] |
mov ebx, dword ptr [ebx] |
cmp edx, ebx |
je 00007FC4E8AD198Ah |
mov ebp, dword ptr fs:[00000014h] |
mov dword ptr [ebp+00000000h], ebx |
mov edi, dword ptr [ebx+1Ch] |
sub edi, 28h |
mov dword ptr [edi+24h], esp |
mov esp, edi |
mov ebx, dword ptr [ecx] |
mov ecx, dword ptr [ecx+04h] |
mov dword ptr [esp], ebx |
mov dword ptr [esp+04h], ecx |
mov dword ptr [esp+08h], edx |
call esi |
mov eax, dword ptr [esp+0Ch] |
mov esp, dword ptr [esp+24h] |
mov edx, dword ptr [esp+20h] |
mov ebp, dword ptr fs:[00000014h] |
mov dword ptr [ebp+00000000h], edx |
mov edi, dword ptr [esp+18h] |
mov esi, dword ptr [esp+14h] |
mov ebp, dword ptr [esp+10h] |
mov ebx, dword ptr [esp+1Ch] |
add esp, 28h |
retn 0004h |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov ecx, dword ptr [esp+04h] |
mov edx, dword ptr [ecx] |
mov eax, esp |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xf51000 | 0x3dc | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xf52000 | 0x39c10 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xed8040 | 0xa0 | .data |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x88769c | 0x887800 | a176e76ea09aa62e5568a63b4d7c3912 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x889000 | 0x64eef8 | 0x64f000 | e2aa22fc5395137628cff0e54e7c3748 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xed8000 | 0x7866c | 0x3d800 | 9cad8acfb723afc7b25d56e00e5a1fd6 | False | 0.44260114964430897 | DIY-Thermocam raw data (Lepton 2.x), scale 8192-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 0.000122 | 5.891556263575651 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xf51000 | 0x3dc | 0x400 | 2ff35e328606b7385daa1800e08c188a | False | 0.48828125 | data | 4.663264085783635 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0xf52000 | 0x39c10 | 0x39e00 | 6ff2dc4481993b7fe9eddaaf18a1ff59 | False | 0.6381656654967602 | data | 6.699159976046999 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.symtab | 0xf8c000 | 0x4 | 0x200 | 07b5472d347d42780469fb2654b7fc54 | False | 0.02734375 | data | 0.020393135236084953 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
kernel32.dll | WriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 2, 2024 14:55:58.618232012 CEST | 49710 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:55:58.624093056 CEST | 80 | 49710 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:55:58.624186039 CEST | 49710 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:55:58.625616074 CEST | 49710 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:55:58.630510092 CEST | 80 | 49710 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:55:59.089433908 CEST | 80 | 49710 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:55:59.089658976 CEST | 49710 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:55:59.090049028 CEST | 80 | 49710 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:55:59.090110064 CEST | 49710 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:56:59.094392061 CEST | 49720 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:56:59.099570036 CEST | 80 | 49720 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:56:59.099720001 CEST | 49720 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:56:59.100898981 CEST | 49720 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:56:59.105930090 CEST | 80 | 49720 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:56:59.584367990 CEST | 80 | 49720 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:56:59.584525108 CEST | 49720 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:56:59.584660053 CEST | 80 | 49720 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:56:59.584716082 CEST | 49720 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:57:59.590976954 CEST | 49724 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:57:59.595907927 CEST | 80 | 49724 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:57:59.596000910 CEST | 49724 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:57:59.597011089 CEST | 49724 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:57:59.601911068 CEST | 80 | 49724 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:58:00.062828064 CEST | 80 | 49724 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:58:00.062944889 CEST | 80 | 49724 | 192.34.56.49 | 192.168.2.6 |
Aug 2, 2024 14:58:00.063051939 CEST | 49724 | 80 | 192.168.2.6 | 192.34.56.49 |
Aug 2, 2024 14:58:00.063188076 CEST | 49724 | 80 | 192.168.2.6 | 192.34.56.49 |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49710 | 192.34.56.49 | 80 | 5276 | C:\Users\user\Desktop\192-34-56-49-32.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 2, 2024 14:55:58.625616074 CEST | 239 | OUT | |
Aug 2, 2024 14:55:59.089433908 CEST | 891 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49720 | 192.34.56.49 | 80 | 5276 | C:\Users\user\Desktop\192-34-56-49-32.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 2, 2024 14:56:59.100898981 CEST | 239 | OUT | |
Aug 2, 2024 14:56:59.584367990 CEST | 891 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49724 | 192.34.56.49 | 80 | 5276 | C:\Users\user\Desktop\192-34-56-49-32.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Aug 2, 2024 14:57:59.597011089 CEST | 239 | OUT | |
Aug 2, 2024 14:58:00.062828064 CEST | 891 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 08:55:57 |
Start date: | 02/08/2024 |
Path: | C:\Users\user\Desktop\192-34-56-49-32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x140000 |
File size: | 16'050'176 bytes |
MD5 hash: | 0ED35085BC066AD51240FE4BF40A53AB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|