Windows
Analysis Report
1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe
Overview
General Information
Sample name: | 1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe |
Analysis ID: | 1515271 |
MD5: | 3fb871e12cee36470aa80d019aa46c2a |
SHA1: | 3fff365af65a3d3312c222acfe0a4d7447d0e78d |
SHA256: | 2e432426a7a0a10a0068c035368f749c298e1ef1add61e31a8b25da74676fcaa |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe (PID: 6624 cmdline:
"C:\Users\ user\Deskt op\1726981 024afb0b52 61027cf8cb 56ba2e7428 8f35f8a8f0 3f714e141d a3004c24e1 b6d3c16555 .dat-decod ed.exe" MD5: 3FB871E12CEE36470AA80D019AA46C2A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"Server": "dcmxz.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "BMaxyTI6PFcknz46fW6SoamkbMkpDOBY", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "HHE5jOeVJOhAghvpojlJdIrDbFOsUbqwsp+EMG8VXpAUEeevWIZdvf0JXY09IqtRyF0X8OflaZjfz5GSeKAlhnZylZ4ewd/rQNkxEX2jmNQvqQm2VUSZ4DaZ1LNcyuuDLoLokVBSqAQ26qID63vTRTGCG+S4ivbzXv2B1m+Pq9M=", "BDOS": "null", "External_config_on_Pastebin": "false"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_DcRat_2 | Yara detected DcRat | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-22T06:59:12.248571+0200 | 2034847 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 35650 | 192.168.2.5 | 49705 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-22T06:59:12.248571+0200 | 2842478 | 1 | Malware Command and Control Activity Detected | 45.135.232.38 | 35650 | 192.168.2.5 | 49705 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-22T06:59:12.248571+0200 | 2848048 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 35650 | 192.168.2.5 | 49705 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF848E7C56F | |
Source: | Code function: | 0_2_00007FF848E78346 | |
Source: | Code function: | 0_2_00007FF848E790F2 | |
Source: | Code function: | 0_2_00007FF848E730E2 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF848E700C1 |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 Scheduled Task/Job | 1 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 31 Virtualization/Sandbox Evasion | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Native API | Logon Script (Windows) | 1 DLL Side-Loading | 1 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Obfuscated Files or Information | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 21 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
68% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1307404 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
dcmxz.duckdns.org | 45.135.232.38 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.135.232.38 | dcmxz.duckdns.org | Russian Federation | 49392 | ASBAXETNRU | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1515271 |
Start date and time: | 2024-09-22 06:58:07 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 12s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/2@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 93.184.221.240
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
00:59:12 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.135.232.38 | Get hash | malicious | Remcos | Browse | ||
Get hash | malicious | Remcos | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ASBAXETNRU | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | AsyncRAT, DcRat | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | SmokeLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
|
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.150184159866505 |
Encrypted: | false |
SSDEEP: | 6:kKX99UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:MDnLNkPlE99SNxAhUe/3 |
MD5: | BF43F9B760C15FC357C34C91B9E2B9BD |
SHA1: | 9C7EE1578BDF55DD1BD4E27FA9A2A24F39332F50 |
SHA-256: | A2D22849CF7D50DD79A61510DE1057BFBA69617B75BFC1F12AF35BFA62108524 |
SHA-512: | FB19AA6A8B76BFF35094E76D99E91A3F9433F57B531821856245E4ED8CDD9687B21814D88EFBAF1DD70F7E21867E00BD93D59CF754B04DEFBC5D1F8E85045222 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.617428788763553 |
TrID: |
|
File name: | 1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe |
File size: | 48'640 bytes |
MD5: | 3fb871e12cee36470aa80d019aa46c2a |
SHA1: | 3fff365af65a3d3312c222acfe0a4d7447d0e78d |
SHA256: | 2e432426a7a0a10a0068c035368f749c298e1ef1add61e31a8b25da74676fcaa |
SHA512: | 736208f58515d91cf27ea55c6a76634ec600c2eace2610b5fdac13ec13a37bb20153b2591cf339107d648ab75a9c2320519b2df77c66dd686879accc06f4f985 |
SSDEEP: | 768:gq+s3pUtDILNCCa+DiyiVioP8YbdgemEidkQJ+68vEgK/JHZVc6KN:gq+AGtQO/rzbK7ndkQJd8nkJHZVclN |
TLSH: | 3D236C003798C536E2FD4BB5ADF3A2418675D2672D03CB596CC825AA2B13FC596036FE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40cbbe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60930A0B [Wed May 5 21:11:39 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcb6c | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0xdf7 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xabc4 | 0xac00 | 4c9ccb09763d805c53b00c1b7e42f7f7 | False | 0.5025890261627907 | data | 5.642588220419804 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0xdf7 | 0xe00 | 2083376922615c09cdda9acfd9305376 | False | 0.4017857142857143 | data | 5.110607648061562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 82148d01c3935cf90ef81a3dd1fad607 | False | 0.044921875 | data | 0.07763316234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2d4 | data | 0.4350828729281768 | ||
RT_MANIFEST | 0xe374 | 0xa83 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.40245261984392416 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-22T06:59:12.248571+0200 | 2842478 | ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) | 1 | 45.135.232.38 | 35650 | 192.168.2.5 | 49705 | TCP |
2024-09-22T06:59:12.248571+0200 | 2034847 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 35650 | 192.168.2.5 | 49705 | TCP |
2024-09-22T06:59:12.248571+0200 | 2848048 | ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 35650 | 192.168.2.5 | 49705 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 22, 2024 06:59:11.515448093 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:11.520370007 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:11.520462036 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:11.541577101 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:11.546406984 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:12.234983921 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:12.241367102 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:12.248570919 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:12.461658001 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:12.516201019 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:13.676969051 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:13.681929111 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:13.682007074 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:13.686877012 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:24.518363953 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:24.523436069 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:24.523520947 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:24.528328896 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:24.908799887 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:24.953687906 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:25.084223032 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:25.105072021 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:25.109894991 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:25.109956980 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:25.114702940 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:35.361603975 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:35.366694927 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:35.366872072 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:35.371844053 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:35.755686045 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:35.797687054 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:35.928809881 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:35.931471109 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:35.936394930 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:35.936491966 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:35.941457987 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:42.124428034 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:42.172425032 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:42.303666115 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:42.344410896 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:46.204425097 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:46.209372044 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:46.209496021 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:46.214387894 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:46.600730896 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:46.641134977 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:46.772447109 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:46.774801970 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:46.779664993 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:46.779751062 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:46.784519911 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:57.092345953 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:57.097635031 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:57.097932100 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:57.103168011 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:57.485558987 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:57.531872988 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:57.663083076 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:57.703604937 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:57.778363943 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:57.795211077 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 06:59:57.795300007 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 06:59:57.808229923 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:07.945163012 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:07.957982063 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:07.958153963 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:07.966360092 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:08.350858927 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:08.406703949 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:08.524863958 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:08.527280092 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:08.532380104 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:08.532454967 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:08.537512064 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:12.143631935 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:12.188221931 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:12.319482088 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:12.360091925 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:18.782731056 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:18.788146019 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:18.788346052 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:18.793486118 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:19.178674936 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:19.219192982 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:19.351347923 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:19.353650093 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:19.358555079 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:19.358650923 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:19.363547087 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:29.626274109 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:29.631370068 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:29.631455898 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:29.636324883 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:30.705784082 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:30.705852985 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:30.705883980 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:30.705926895 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:30.705970049 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:30.705971003 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:30.705971003 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:30.708093882 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:30.712944031 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:30.713015079 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:30.717791080 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:40.470854044 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:40.475888014 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:40.475989103 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:40.480787992 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:40.858432055 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:40.906935930 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:41.023581028 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:41.025362015 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:41.030251980 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:41.030339956 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:41.035192013 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:42.147532940 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:42.188179970 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:42.320358038 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:42.363955021 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:51.392632961 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:51.397862911 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:51.397948980 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:51.402815104 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:51.780258894 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:51.828619957 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:51.949431896 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:51.952950954 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:51.958298922 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:00:51.958404064 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:00:51.964328051 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:02.157071114 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:02.165152073 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:02.165321112 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:02.174077988 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:02.555749893 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:02.609725952 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:02.711293936 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:02.719039917 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:02.724070072 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:02.724198103 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:02.729090929 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:12.145168066 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:12.188112974 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:12.327846050 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:12.375752926 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:13.250893116 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:13.264053106 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:13.264203072 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:13.272614002 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:13.686317921 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:13.734806061 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:13.841197968 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:13.842295885 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:13.847435951 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Sep 22, 2024 07:01:13.847527981 CEST | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Sep 22, 2024 07:01:13.852876902 CEST | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 22, 2024 06:59:11.381375074 CEST | 50883 | 53 | 192.168.2.5 | 1.1.1.1 |
Sep 22, 2024 06:59:11.499355078 CEST | 53 | 50883 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 22, 2024 06:59:11.381375074 CEST | 192.168.2.5 | 1.1.1.1 | 0x3bc3 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 22, 2024 06:59:11.499355078 CEST | 1.1.1.1 | 192.168.2.5 | 0x3bc3 | No error (0) | 45.135.232.38 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 00:59:07 |
Start date: | 22/09/2024 |
Path: | C:\Users\user\Desktop\1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x780000 |
File size: | 48'640 bytes |
MD5 hash: | 3FB871E12CEE36470AA80D019AA46C2A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 22.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E78346 Relevance: .5, Instructions: 468COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E790F2 Relevance: .5, Instructions: 454COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|