Windows
Analysis Report
1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe
Overview
General Information
Sample name: | 1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe |
Analysis ID: | 1549924 |
MD5: | e37ccbcd075c4ec7d14499980edb88ab |
SHA1: | 8cf12f19bcbe18c21ba0069fec023fc43c107e97 |
SHA256: | 66663cf3596b0e6fd2721d81f91cda058ca61feb46f9943ef1a91fec7a68590d |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe (PID: 1488 cmdline:
"C:\Users\ user\Deskt op\1730879 944d691bb8 11f5e0f33d 6d0d5afc86 cdfb09b3d0 562ee86d22 76a3358127 f125d3c941 .dat-decod ed.exe" MD5: E37CCBCD075C4EC7D14499980EDB88AB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"Server": "dcfas.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "tO9oLnyeTNi4YdVBqZKpnnz0bcclHTDq", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "GIHEiWfKfuooc8H6t/nBNveyrvGg+yyc05zOTRONM1x3ZUOAMetE3INwtqWKHwLxN71/W2hn50k/Gi9jG3UOrLfOMunmQYJmq/IamWD5vvmYS0Vsc04xvGGEdm8OMG1e/XQlGduqqhioTDY9Dy5WLtuzqrvcuNlTWSVpzDFSdnQ=", "BDOS": "null", "External_config_on_Pastebin": "false"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_DcRat_2 | Yara detected DcRat | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T09:01:19.031231+0100 | 2022930 | 1 | A Network Trojan was detected | 52.149.20.212 | 443 | 192.168.2.5 | 49706 | TCP |
2024-11-06T09:02:00.401978+0100 | 2022930 | 1 | A Network Trojan was detected | 52.149.20.212 | 443 | 192.168.2.5 | 51671 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T09:01:14.623902+0100 | 2034847 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 35650 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T09:01:14.623902+0100 | 2842478 | 1 | Malware Command and Control Activity Detected | 45.135.232.38 | 35650 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T09:01:14.623902+0100 | 2848048 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 35650 | 192.168.2.5 | 49704 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF848F19132 | |
Source: | Code function: | 0_2_00007FF848F130E5 | |
Source: | Code function: | 0_2_00007FF848F18386 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF848F100C1 |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 Scheduled Task/Job | 1 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 31 Virtualization/Sandbox Evasion | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Native API | Logon Script (Windows) | 1 DLL Side-Loading | 1 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Obfuscated Files or Information | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 21 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
82% | ReversingLabs | ByteCode-MSIL.Backdoor.AsyncRAT | ||
100% | Avira | HEUR/AGEN.1307404 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
dcfas.duckdns.org | 45.135.232.38 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.135.232.38 | dcfas.duckdns.org | Russian Federation | 49392 | ASBAXETNRU | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1549924 |
Start date and time: | 2024-11-06 09:00:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 4s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/2@5/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 2.19.126.137, 2.19.126.163
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: 1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe
Time | Type | Description |
---|---|---|
03:01:15 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.135.232.38 | Get hash | malicious | AsyncRAT, DcRat | Browse | ||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ASBAXETNRU | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.1333860653411176 |
Encrypted: | false |
SSDEEP: | 6:kK8l99UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:VDnLNkPlE99SNxAhUe/3 |
MD5: | 52914AA4DE725A029A4852D2CD6D0AFD |
SHA1: | 321AEF598B85E987049819BB0D36C7094257AC1F |
SHA-256: | 9F05F6F41FB0C992888E527F9744409512626E7F236CABD3B2338BD7BE95C886 |
SHA-512: | 5201ACFA532C5528006B0ECE338590ED9261E7C63698F70309A7896063728D45C154E38C8E201AD3AD730E14064591D8DB9AAFBCCEAEE50D802ABE80F46C3FC3 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.619014410241646 |
TrID: |
|
File name: | 1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe |
File size: | 48'640 bytes |
MD5: | e37ccbcd075c4ec7d14499980edb88ab |
SHA1: | 8cf12f19bcbe18c21ba0069fec023fc43c107e97 |
SHA256: | 66663cf3596b0e6fd2721d81f91cda058ca61feb46f9943ef1a91fec7a68590d |
SHA512: | bf65695638c4fbeac8d44698bef9e3d1955ba6dc99a7d23c5de68ee108be22b4bbf6f47474f6f3916f314c9e4640f3878f3bf72fe8fcbd641326cc1bd9c8e5da |
SSDEEP: | 768:xGq+s3pUtDILNCCa+DiC0jxYsLqRl8Aonia8YbXgepGQPPWLvEgK/JLZVc6KN:8q+AGtQOCCzLAozbw3QPonkJLZVclN |
TLSH: | 4D236D0037D8C136E6FD4BB4A9F2A1458279D66B6903CB5D6CC811AA2F13BC597036FE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40cbbe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60930A0B [Wed May 5 21:11:39 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcb68 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0xdf7 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xabc4 | 0xac00 | 297e35fb1b2ba7ce0fb8ab72bbb386a8 | False | 0.502452761627907 | data | 5.644861345556527 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0xdf7 | 0xe00 | 2083376922615c09cdda9acfd9305376 | False | 0.4017857142857143 | data | 5.110607648061562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 82148d01c3935cf90ef81a3dd1fad607 | False | 0.044921875 | data | 0.07763316234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2d4 | data | 0.4350828729281768 | ||
RT_MANIFEST | 0xe374 | 0xa83 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.40245261984392416 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T09:01:14.623902+0100 | 2842478 | ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) | 1 | 45.135.232.38 | 35650 | 192.168.2.5 | 49704 | TCP |
2024-11-06T09:01:14.623902+0100 | 2034847 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 35650 | 192.168.2.5 | 49704 | TCP |
2024-11-06T09:01:14.623902+0100 | 2848048 | ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 35650 | 192.168.2.5 | 49704 | TCP |
2024-11-06T09:01:19.031231+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 52.149.20.212 | 443 | 192.168.2.5 | 49706 | TCP |
2024-11-06T09:02:00.401978+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 52.149.20.212 | 443 | 192.168.2.5 | 51671 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 6, 2024 09:01:13.739643097 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:13.744512081 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:13.744630098 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:13.896202087 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:13.901128054 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:14.609607935 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:14.619095087 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:14.623902082 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:14.881273985 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:14.925512075 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:16.391300917 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:16.396203995 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:16.396261930 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:16.401096106 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:26.271666050 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:26.316128969 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:26.412055016 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:26.456861019 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:26.661181927 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:26.661264896 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:27.474497080 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:27.479408979 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:27.479482889 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:27.484504938 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:27.741640091 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:27.784871101 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:27.882124901 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:27.891859055 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:27.896747112 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:27.896908998 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:27.901835918 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:38.567058086 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:38.572002888 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:38.572062016 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:38.577085018 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:38.834331989 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:38.878648043 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:38.974942923 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:38.976650000 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:38.982137918 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:38.982228041 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:38.987107038 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:49.660295010 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:49.665143967 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:49.665208101 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:49.669949055 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:49.927891970 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:49.972666979 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:50.067101002 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:50.068557978 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:50.073374033 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:50.073426008 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:50.078305006 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:56.269520044 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:56.316319942 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:01:56.410384893 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:01:56.456948042 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:00.754931927 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:00.759790897 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:00.760284901 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:00.765108109 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:01.021641970 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:01.066248894 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:01.162177086 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:01.163732052 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:01.168499947 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:01.168559074 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:01.173333883 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:11.848113060 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:11.852963924 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:11.853034019 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:11.857770920 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:12.114833117 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:12.159935951 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:12.255162001 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:12.256855965 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:12.261667013 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:12.261723042 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:12.266624928 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:22.941658974 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:22.946481943 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:22.946578026 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:22.951409101 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:23.208801985 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:23.253758907 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:23.349399090 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:23.351771116 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:23.356725931 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:23.356775999 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:23.361695051 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:26.292332888 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:26.331834078 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:26.432744026 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:26.488070011 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:34.035310984 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:34.040201902 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:34.040261030 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:34.045188904 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:34.301908970 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:34.347481966 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:34.442142963 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:34.443839073 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:34.448788881 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:34.448834896 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:34.453691959 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:45.129179001 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:45.134331942 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:45.134391069 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:45.139249086 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:45.406689882 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:45.456979036 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:45.536451101 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:45.538346052 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:45.543164015 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:45.543235064 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:45.548054934 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:56.273350954 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:56.276352882 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:56.281328917 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:56.281395912 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:56.286350965 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:56.415566921 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:56.467264891 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:56.554310083 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:56.562968016 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:56.567873955 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:02:56.567935944 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:02:56.572958946 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:03:06.129072905 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:03:06.133933067 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:03:06.134011030 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:03:06.138881922 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:03:06.396907091 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:03:06.441277981 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:03:06.537622929 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:03:06.538393021 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:03:06.543327093 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 6, 2024 09:03:06.543412924 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 6, 2024 09:03:06.548583984 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 6, 2024 09:01:03.062659025 CET | 64251 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 6, 2024 09:01:04.050671101 CET | 64251 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 6, 2024 09:01:05.066374063 CET | 64251 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 6, 2024 09:01:07.081918955 CET | 64251 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 6, 2024 09:01:08.671559095 CET | 53 | 64251 | 1.1.1.1 | 192.168.2.5 |
Nov 6, 2024 09:01:08.671578884 CET | 53 | 64251 | 1.1.1.1 | 192.168.2.5 |
Nov 6, 2024 09:01:08.671588898 CET | 53 | 64251 | 1.1.1.1 | 192.168.2.5 |
Nov 6, 2024 09:01:08.671602964 CET | 53 | 64251 | 1.1.1.1 | 192.168.2.5 |
Nov 6, 2024 09:01:13.696635962 CET | 58751 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 6, 2024 09:01:13.704188108 CET | 53 | 58751 | 1.1.1.1 | 192.168.2.5 |
Nov 6, 2024 09:01:22.120151997 CET | 53 | 62663 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 6, 2024 09:01:03.062659025 CET | 192.168.2.5 | 1.1.1.1 | 0xd210 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:04.050671101 CET | 192.168.2.5 | 1.1.1.1 | 0xd210 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:05.066374063 CET | 192.168.2.5 | 1.1.1.1 | 0xd210 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:07.081918955 CET | 192.168.2.5 | 1.1.1.1 | 0xd210 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:13.696635962 CET | 192.168.2.5 | 1.1.1.1 | 0xbe66 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 6, 2024 09:01:08.671559095 CET | 1.1.1.1 | 192.168.2.5 | 0xd210 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:08.671578884 CET | 1.1.1.1 | 192.168.2.5 | 0xd210 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:08.671588898 CET | 1.1.1.1 | 192.168.2.5 | 0xd210 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:08.671602964 CET | 1.1.1.1 | 192.168.2.5 | 0xd210 | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 09:01:13.704188108 CET | 1.1.1.1 | 192.168.2.5 | 0xbe66 | No error (0) | 45.135.232.38 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 03:00:59 |
Start date: | 06/11/2024 |
Path: | C:\Users\user\Desktop\1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb30000 |
File size: | 48'640 bytes |
MD5 hash: | E37CCBCD075C4EC7D14499980EDB88AB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 26.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F18386 Relevance: .5, Instructions: 476COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F19132 Relevance: .5, Instructions: 460COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|