Windows
Analysis Report
17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
Overview
General Information
Sample name: | 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe |
Analysis ID: | 1546879 |
MD5: | ea189587eda182b5edcb3b4977dbe529 |
SHA1: | 35ecab87e17c8bac42598118745c92f1bff46a43 |
SHA256: | bd0e792d8bccec62065711552deb0a997ff4132e4050f03e9a4adb4811e611cf |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe (PID: 6320 cmdline:
"C:\Users\ user\Deskt op\1730477 2280366bf2 e2bb7f849b 5bf7951063 7548fa7c7d 19dd73a2fc 7893bc18cc 1bbe09f276 .dat-decod ed.exe" MD5: EA189587EDA182B5EDCB3B4977DBE529)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"Server": "sostener2024.duckdns.org", "Ports": "2020", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "Y87JSKg9gyY3j2G4q5kD4EQDhAzJbMPX", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "gCqxGN2XFz6m+Z9HeZmzkjMv3rqhTklv/R54m+q9IzJOC1WTeGYnTBHgEHP7RHOPDvHLdwCV0GVcEsyIPaFaTupUdTnKkBRj+0aQMfGKtySDBV7dakDsnQtcDzDhokI1I3dazs2Mc/vloCurAZcnNwgO0XThq+f26gcPFC/czS8=", "BDOS": "null", "External_config_on_Pastebin": "false"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T17:09:33.793529+0100 | 2022930 | 1 | A Network Trojan was detected | 172.202.163.200 | 443 | 192.168.2.4 | 49731 | TCP |
2024-11-01T17:10:12.096403+0100 | 2022930 | 1 | A Network Trojan was detected | 172.202.163.200 | 443 | 192.168.2.4 | 49781 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: |
Source: | DNS query: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FFD9B9030E5 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFD9B9000C1 |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 2 Virtualization/Sandbox Evasion | OS Credential Dumping | 111 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 13 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 21 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
82% | ReversingLabs | ByteCode-MSIL.Backdoor.AsyncRAT | ||
100% | Avira | HEUR/AGEN.1307404 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sostener2024.duckdns.org | 192.169.69.26 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.169.69.26 | sostener2024.duckdns.org | United States | 23033 | WOWUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546879 |
Start date and time: | 2024-11-01 17:08:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/0@21/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
192.169.69.26 | Get hash | malicious | VjW0rm, AsyncRAT, RATDispenser | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sostener2024.duckdns.org | Get hash | malicious | AsyncRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
WOWUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Nanocore | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
|
File type: | |
Entropy (8bit): | 5.616310833983759 |
TrID: |
|
File name: | 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe |
File size: | 48'640 bytes |
MD5: | ea189587eda182b5edcb3b4977dbe529 |
SHA1: | 35ecab87e17c8bac42598118745c92f1bff46a43 |
SHA256: | bd0e792d8bccec62065711552deb0a997ff4132e4050f03e9a4adb4811e611cf |
SHA512: | 79f96f975d5926fe1f7c56f989d82e0ed1d7b77435d8335cc6bd1fb38ab0643b7e8656336a61b5d82bc90d561768e00d170f516e900d478e548b126102086518 |
SSDEEP: | 768:4q+s3pUtDILNCCa+DiptelDSN+iV08Ybyge9uFGq3xKvEgK/JvZVc6KN:4q+AGtQOptKDs4zb1fKnkJvZVclN |
TLSH: | 36235C4037E88136E2BD4BB8ACF3E2458275D6676903DA5D6CC814EA1F13BC596036FE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40cbbe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60930A0B [Wed May 5 21:11:39 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcb64 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0xdf7 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xabc4 | 0xac00 | f679f2191adcfb0045d464b044618a5f | False | 0.501953125 | data | 5.641277698381036 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0xdf7 | 0xe00 | 2083376922615c09cdda9acfd9305376 | False | 0.4017857142857143 | data | 5.110607648061562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 82148d01c3935cf90ef81a3dd1fad607 | False | 0.044921875 | data | 0.07763316234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2d4 | data | 0.4350828729281768 | ||
RT_MANIFEST | 0xe374 | 0xa83 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.40245261984392416 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T17:09:33.793529+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 172.202.163.200 | 443 | 192.168.2.4 | 49731 | TCP |
2024-11-01T17:10:12.096403+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 172.202.163.200 | 443 | 192.168.2.4 | 49781 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 1, 2024 17:09:29.055077076 CET | 49730 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:29.060847044 CET | 2020 | 49730 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:29.060961008 CET | 49730 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:29.630889893 CET | 49730 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:29.821495056 CET | 2020 | 49730 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:30.055504084 CET | 2020 | 49730 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:30.055572987 CET | 49730 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:35.075131893 CET | 49730 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:35.076411009 CET | 49735 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:35.080492020 CET | 2020 | 49730 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:35.081357002 CET | 2020 | 49735 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:35.081424952 CET | 49735 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:35.081799030 CET | 49735 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:35.086998940 CET | 2020 | 49735 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:35.864638090 CET | 2020 | 49735 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:35.864775896 CET | 49735 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:40.869112015 CET | 49735 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:40.874017954 CET | 2020 | 49735 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:40.895376921 CET | 49738 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:40.900245905 CET | 2020 | 49738 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:40.900312901 CET | 49738 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:40.907749891 CET | 49738 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:40.912729979 CET | 2020 | 49738 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:41.741308928 CET | 2020 | 49738 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:41.741379023 CET | 49738 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:46.742119074 CET | 49738 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:46.743019104 CET | 49739 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:46.747975111 CET | 2020 | 49738 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:46.748502970 CET | 2020 | 49739 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:46.749145031 CET | 49739 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:46.749428034 CET | 49739 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:46.755039930 CET | 2020 | 49739 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:47.570250034 CET | 2020 | 49739 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:47.570426941 CET | 49739 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:52.585900068 CET | 49739 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:52.586627960 CET | 49740 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:52.590724945 CET | 2020 | 49739 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:52.591523886 CET | 2020 | 49740 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:52.591613054 CET | 49740 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:52.591835022 CET | 49740 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:52.600878954 CET | 2020 | 49740 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:53.466475964 CET | 2020 | 49740 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:53.466558933 CET | 49740 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:58.476691961 CET | 49740 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:58.477987051 CET | 49741 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:58.481637001 CET | 2020 | 49740 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:58.482891083 CET | 2020 | 49741 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:58.482959986 CET | 49741 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:58.483258963 CET | 49741 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:09:58.488256931 CET | 2020 | 49741 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:59.314747095 CET | 2020 | 49741 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:09:59.314884901 CET | 49741 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:04.321381092 CET | 49741 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:04.323596954 CET | 49743 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:04.327085018 CET | 2020 | 49741 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:04.328877926 CET | 2020 | 49743 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:04.328954935 CET | 49743 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:04.329271078 CET | 49743 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:04.335832119 CET | 2020 | 49743 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:05.201051950 CET | 2020 | 49743 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:05.201134920 CET | 49743 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:10.211146116 CET | 49743 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:10.212081909 CET | 49776 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:10.216051102 CET | 2020 | 49743 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:10.217255116 CET | 2020 | 49776 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:10.217333078 CET | 49776 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:10.217571020 CET | 49776 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:10.223187923 CET | 2020 | 49776 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:11.048015118 CET | 2020 | 49776 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:11.048098087 CET | 49776 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:16.054873943 CET | 49776 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:16.055908918 CET | 49801 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:16.059916019 CET | 2020 | 49776 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:16.061064005 CET | 2020 | 49801 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:16.061144114 CET | 49801 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:16.061446905 CET | 49801 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:16.066271067 CET | 2020 | 49801 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:16.950469971 CET | 2020 | 49801 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:16.950603962 CET | 49801 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:21.961172104 CET | 49801 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:21.962138891 CET | 49830 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:21.977442980 CET | 2020 | 49801 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:21.977734089 CET | 2020 | 49830 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:21.977816105 CET | 49830 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:21.978125095 CET | 49830 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:21.994379997 CET | 2020 | 49830 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:22.870498896 CET | 2020 | 49830 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:22.870569944 CET | 49830 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:27.883018017 CET | 49830 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:27.884139061 CET | 49861 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:27.887943983 CET | 2020 | 49830 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:27.889189959 CET | 2020 | 49861 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:27.889262915 CET | 49861 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:27.889635086 CET | 49861 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:27.894479036 CET | 2020 | 49861 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:28.680012941 CET | 2020 | 49861 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:10:28.680108070 CET | 49861 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:33.695601940 CET | 49861 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:10:33.701133966 CET | 2020 | 49861 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:11.680943966 CET | 50013 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:11.688524008 CET | 2020 | 50013 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:11.688601971 CET | 50013 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:11.688941002 CET | 50013 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:11.695766926 CET | 2020 | 50013 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:12.608922958 CET | 2020 | 50013 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:12.608987093 CET | 50013 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:17.887624025 CET | 50013 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:17.888349056 CET | 50014 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:17.892625093 CET | 2020 | 50013 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:17.893274069 CET | 2020 | 50014 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:17.893345118 CET | 50014 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:17.893683910 CET | 50014 | 2020 | 192.168.2.4 | 192.169.69.26 |
Nov 1, 2024 17:11:17.898705006 CET | 2020 | 50014 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:18.754641056 CET | 2020 | 50014 | 192.169.69.26 | 192.168.2.4 |
Nov 1, 2024 17:11:18.754720926 CET | 50014 | 2020 | 192.168.2.4 | 192.169.69.26 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 1, 2024 17:09:18.123394966 CET | 49496 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:09:19.117243052 CET | 49496 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:09:20.132859945 CET | 49496 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:09:22.132827997 CET | 49496 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:09:23.839931011 CET | 53 | 49496 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:09:23.839982986 CET | 53 | 49496 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:09:23.839993954 CET | 53 | 49496 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:09:23.840029955 CET | 53 | 49496 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:09:28.880295992 CET | 64240 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:09:29.012103081 CET | 53 | 64240 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:33.696456909 CET | 63189 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:34.711292982 CET | 63189 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:35.728046894 CET | 63189 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:37.707153082 CET | 53 | 63189 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:37.707171917 CET | 53 | 63189 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:37.707592010 CET | 53 | 63189 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:42.722829103 CET | 50391 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:43.711448908 CET | 50391 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:44.726794004 CET | 50391 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:46.742384911 CET | 50391 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:46.946970940 CET | 53 | 50391 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:46.946991920 CET | 53 | 50391 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:46.947005033 CET | 53 | 50391 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:47.322351933 CET | 53 | 50391 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:51.962037086 CET | 57309 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:52.961390018 CET | 57309 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:53.976757050 CET | 57309 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:55.992539883 CET | 57309 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:10:56.023420095 CET | 53 | 57309 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:56.023442030 CET | 53 | 57309 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:56.023452997 CET | 53 | 57309 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:10:56.032180071 CET | 53 | 57309 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:11:01.040117979 CET | 64961 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:11:02.056124926 CET | 64961 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:11:03.055114985 CET | 64961 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:11:05.050100088 CET | 53 | 64961 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:11:05.050116062 CET | 53 | 64961 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:11:05.050127983 CET | 53 | 64961 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:11:10.056658983 CET | 55906 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:11:11.070651054 CET | 55906 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 1, 2024 17:11:11.680125952 CET | 53 | 55906 | 1.1.1.1 | 192.168.2.4 |
Nov 1, 2024 17:11:11.682195902 CET | 53 | 55906 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 1, 2024 17:09:18.123394966 CET | 192.168.2.4 | 1.1.1.1 | 0xc66f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:19.117243052 CET | 192.168.2.4 | 1.1.1.1 | 0xc66f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:20.132859945 CET | 192.168.2.4 | 1.1.1.1 | 0xc66f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:22.132827997 CET | 192.168.2.4 | 1.1.1.1 | 0xc66f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:28.880295992 CET | 192.168.2.4 | 1.1.1.1 | 0xaf16 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:33.696456909 CET | 192.168.2.4 | 1.1.1.1 | 0x6fc8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:34.711292982 CET | 192.168.2.4 | 1.1.1.1 | 0x6fc8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:35.728046894 CET | 192.168.2.4 | 1.1.1.1 | 0x6fc8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:42.722829103 CET | 192.168.2.4 | 1.1.1.1 | 0xb543 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:43.711448908 CET | 192.168.2.4 | 1.1.1.1 | 0xb543 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:44.726794004 CET | 192.168.2.4 | 1.1.1.1 | 0xb543 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:46.742384911 CET | 192.168.2.4 | 1.1.1.1 | 0xb543 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:51.962037086 CET | 192.168.2.4 | 1.1.1.1 | 0x2be2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:52.961390018 CET | 192.168.2.4 | 1.1.1.1 | 0x2be2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:53.976757050 CET | 192.168.2.4 | 1.1.1.1 | 0x2be2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:55.992539883 CET | 192.168.2.4 | 1.1.1.1 | 0x2be2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:01.040117979 CET | 192.168.2.4 | 1.1.1.1 | 0x4ab7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:02.056124926 CET | 192.168.2.4 | 1.1.1.1 | 0x4ab7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:03.055114985 CET | 192.168.2.4 | 1.1.1.1 | 0x4ab7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:10.056658983 CET | 192.168.2.4 | 1.1.1.1 | 0x47b8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:11.070651054 CET | 192.168.2.4 | 1.1.1.1 | 0x47b8 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 1, 2024 17:09:23.839931011 CET | 1.1.1.1 | 192.168.2.4 | 0xc66f | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:23.839982986 CET | 1.1.1.1 | 192.168.2.4 | 0xc66f | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:23.839993954 CET | 1.1.1.1 | 192.168.2.4 | 0xc66f | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:23.840029955 CET | 1.1.1.1 | 192.168.2.4 | 0xc66f | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:09:29.012103081 CET | 1.1.1.1 | 192.168.2.4 | 0xaf16 | No error (0) | 192.169.69.26 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 17:10:37.707153082 CET | 1.1.1.1 | 192.168.2.4 | 0x6fc8 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:37.707171917 CET | 1.1.1.1 | 192.168.2.4 | 0x6fc8 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:37.707592010 CET | 1.1.1.1 | 192.168.2.4 | 0x6fc8 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:46.946970940 CET | 1.1.1.1 | 192.168.2.4 | 0xb543 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:46.946991920 CET | 1.1.1.1 | 192.168.2.4 | 0xb543 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:46.947005033 CET | 1.1.1.1 | 192.168.2.4 | 0xb543 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:47.322351933 CET | 1.1.1.1 | 192.168.2.4 | 0xb543 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:56.023420095 CET | 1.1.1.1 | 192.168.2.4 | 0x2be2 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:56.023442030 CET | 1.1.1.1 | 192.168.2.4 | 0x2be2 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:56.023452997 CET | 1.1.1.1 | 192.168.2.4 | 0x2be2 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:10:56.032180071 CET | 1.1.1.1 | 192.168.2.4 | 0x2be2 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:05.050100088 CET | 1.1.1.1 | 192.168.2.4 | 0x4ab7 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:05.050116062 CET | 1.1.1.1 | 192.168.2.4 | 0x4ab7 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:05.050127983 CET | 1.1.1.1 | 192.168.2.4 | 0x4ab7 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 17:11:11.680125952 CET | 1.1.1.1 | 192.168.2.4 | 0x47b8 | No error (0) | 192.169.69.26 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 17:11:11.682195902 CET | 1.1.1.1 | 192.168.2.4 | 0x47b8 | No error (0) | 192.169.69.26 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 12:09:13 |
Start date: | 01/11/2024 |
Path: | C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x870000 |
File size: | 48'640 bytes |
MD5 hash: | EA189587EDA182B5EDCB3B4977DBE529 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 32.9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|