Windows
Analysis Report
5112024976.exe
Overview
General Information
Detection
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 5112024976.exe (PID: 7320 cmdline:
"C:\Users\ user\Deskt op\5112024 976.exe" MD5: 35826E4E9E0DB5CE7A5E95D34C34E2DA) - 5112024976.exe (PID: 7904 cmdline:
"C:\Users\ user\Deskt op\5112024 976.exe" MD5: 35826E4E9E0DB5CE7A5E95D34C34E2DA)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Formbook, Formbo | FormBook contains a unique crypter RunPE that has unique behavioral patterns subject to detection. It was initially called "Babushka Crypter" by Insidemalware. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T13:54:50.594813+0100 | 2022930 | 1 | A Network Trojan was detected | 20.12.23.50 | 443 | 192.168.2.4 | 49730 | TCP |
2024-11-06T13:55:29.444769+0100 | 2022930 | 1 | A Network Trojan was detected | 20.12.23.50 | 443 | 192.168.2.4 | 49742 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T13:56:01.164190+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49907 | 188.40.95.144 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
E-Banking Fraud |
---|
Source: | File source: |
Source: | Process Stats: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 11 Masquerading | OS Credential Dumping | 21 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Process Injection | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 21 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
33% | ReversingLabs | |||
100% | Avira | HEUR/AGEN.1361137 |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
familytherapycenter.rs | 188.40.95.144 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.40.95.144 | familytherapycenter.rs | Germany | 24940 | HETZNER-ASDE | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1550109 |
Start date and time: | 2024-11-06 13:53:37 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 5112024976.exe |
Detection: | MAL |
Classification: | mal84.troj.evad.winEXE@3/10@5/1 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: 5112024976.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.40.95.144 | Get hash | malicious | FormBook, GuLoader | Browse | ||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
familytherapycenter.rs | Get hash | malicious | FormBook, GuLoader | Browse |
| |
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HETZNER-ASDE | Get hash | malicious | FormBook, GuLoader | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsbE9F2.tmp\System.dll | Get hash | malicious | FormBook, GuLoader | Browse | ||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | GuLoader, Snake Keylogger | Browse | |||
Get hash | malicious | AgentTesla, GuLoader | Browse |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11264 |
Entropy (8bit): | 5.7711167426271945 |
Encrypted: | false |
SSDEEP: | 192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn |
MD5: | 3F176D1EE13B0D7D6BD92E1C7A0B9BAE |
SHA1: | FE582246792774C2C9DD15639FFA0ACA90D6FD0B |
SHA-256: | FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E |
SHA-512: | 0A69124819B7568D0DEA4E9E85CE8FE61C7BA697C934E3A95E2DCFB9F252B1D9DA7FAF8774B6E8EFD614885507ACC94987733EBA09A2F5E7098B774DFC8524B6 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 448073 |
Entropy (8bit): | 1.2554221597008608 |
Encrypted: | false |
SSDEEP: | 1536:i9EUBeeNEu//hQg77ea6OP/B1p7to4APRUYZAkxe:qFZO5u/B1pBo510 |
MD5: | 3AD8D5763CA124C7392D1F4F53D24F0E |
SHA1: | 17D48EF1AB8D52A31821A069C225D45201535899 |
SHA-256: | 3965D74DBD296AA8E7524C773FE81FE63A78355145502153CB577E9CB136DDA0 |
SHA-512: | EE8BDE196A33297BFD4E51ED01E7D0178CF457497E822771D2BE3C58A97681AC52CD19A2BBBB71220F06F6D936A6AA67966295DF3C676104B9643F07CBE37EC8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 362911 |
Entropy (8bit): | 1.2562704713226092 |
Encrypted: | false |
SSDEEP: | 768:uFKWW9YiDlIMhmjVacve6tEvHBLNB3tQsrTpPH8mZLAUFwsahGF48hDpWRcKthwz:u5W9yMJLNbJ1CbFV3Gd6Ie48dPs |
MD5: | 8AB9852274FA64E09B5711A2E7D94AAB |
SHA1: | 2C39272B969040B4C185EE4A69A5F04FD1F7C0DB |
SHA-256: | FCD149788A3530E5E2CF5E17A09B1DE51EB67B51F3E8941E7091F88B610373F1 |
SHA-512: | 6761208A22E8D93D70465E6DD9CF1B53826AA6BF0418DCCB0A6E5816A183790A61AD67EDCF52D21366975014701107563CE47A0465CEE801300493AEB566CC69 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 497 |
Entropy (8bit): | 4.296439217688297 |
Encrypted: | false |
SSDEEP: | 12:kdESMQrs7ZnIyxrqlLIRF0+UAkN0lCGsMqejQlJ8:QjMfpIuqPAEsOi |
MD5: | 1560371431CEB91914AF5B9D0D307EE1 |
SHA1: | 182B8979D4D0F9F26366653638A9C92FDAFF0D56 |
SHA-256: | 72A2010CDB6ED407FCA17CDB181D5F01801F16040C2C9443BD7CB5032CDAAEF7 |
SHA-512: | 865EF0F7636149A47043183583635C2A4306BF49565166760672B88F0F9DA89A529FE4166DFF496327304E56A8A460B8113E5F3D58601C0B8A3EFAABD792AF3D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 354845 |
Entropy (8bit): | 1.2446363869824946 |
Encrypted: | false |
SSDEEP: | 768:E2oz5FNvncy2DZRau7W0sxOvPfSfpg5rWuWAAUIdde/FwPPMk/FOuyQv9biuPia6:opho02mYrKiKLFyJ1AIu2 |
MD5: | DF7A44909B03AB5BC45910B405D9977A |
SHA1: | 3D0583A7DFB39E559827189E02123F2C983A21D5 |
SHA-256: | 5A3B61A0BC8E81E756374D2A9FF5087FA4496543A635738ACA8911E95D6340D9 |
SHA-512: | C2B4E951A185FC3FB75109B5CAA554431C1517588D04B8F2BA865F75BE448A0448364BCB84253C9B44579078787DDA616F33666C0C1BF902EC644EBC9A6FE621 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 298017 |
Entropy (8bit): | 1.245520550165085 |
Encrypted: | false |
SSDEEP: | 768:nLoDoRi0SWvTrmnVqvh6dzfCaci65UhXqjMctTGA3QBgdRWqrw3q3LFPRvx7H155:DStBsLk6gsifeQIGA0iYRwvy8n |
MD5: | B4C9FC75BAB8C9F006A7D9DDBC249F79 |
SHA1: | 70D4047E7E3BB10CF237B82775C89A1D92700162 |
SHA-256: | 1D84F9462C244A4500C213DF8DD79971B286392CA02BC536F5F6C3EEBC94E7E3 |
SHA-512: | 2E2279CB3755AC5708ABB30E8342235B7F0A24223E3D6F4B2B21B62E59012A5126ADC1BD73D7B64E72634728DECCE7A049D3E6F5055F8D74E959BEE54EDBEA4C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 261232 |
Entropy (8bit): | 7.810968945420994 |
Encrypted: | false |
SSDEEP: | 6144:vDkhdnD7WYytSgCASI9NIf5YNlu+NR7kEevILCPuBszWh:4hdD7WzFIfCldNRlewmPu+Wh |
MD5: | 4C5BCB1BCA0173E364739A5A6462787A |
SHA1: | F60950A57F95159F4A88F029C1220B49F4B3CC1A |
SHA-256: | 3986B2BBB587E74E980664D721C60643E43BA328D48CD97D95BBF53C5B89F8B0 |
SHA-512: | D8C1361F014E9341A5BDFEDF55E07FE6749B059E2BDFED9A3415D70DE0A01FD08AC60755A10F9C31BCA93CA200CCBE176409162B924915047BD50297678E49C0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 497497 |
Entropy (8bit): | 1.2525295412969446 |
Encrypted: | false |
SSDEEP: | 1536:rbNZ/Rg8JCCgxT2eIgde/lBWTTBwGceukAdTYz91n6n:9NRg836IVLWHeGxKYQ |
MD5: | F3F6C6E37EAB51D3B9B9C059C1EB874C |
SHA1: | 401E5740CCFBC1DA83BD9B426C11020C812986F2 |
SHA-256: | B5A607F50C65E41B2BFF7F852F27373177D326D9DFA1040E1C2B3AF62F757BAB |
SHA-512: | 060B328595ADAF9E85B390AA2AACEEFE4C6197294B7C45594798755C5E04BE1E2110F617B51E38D7DF423CD807FA81B30702CE2548563980B9CA195ECF2C11A7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 476422 |
Entropy (8bit): | 1.2552031449987011 |
Encrypted: | false |
SSDEEP: | 1536:zGmPxn4XjZOVebnJjvYbTUBhGKcjnO/EeMHPm:Sm6zYVb849nH6 |
MD5: | F236A74F28F6F32F81F1347D9F129268 |
SHA1: | D5BE521661EE4BF3C186C3EAA0411DD5DF6F3EBA |
SHA-256: | BEED12F00B12156FF9FA63595DE11A5C01493CF5F85488CB2E159CF1A8236778 |
SHA-512: | D6AD37DDF7B6B38B90F09186AC81C6A76F16F9A4613D6113F10D7B2A4F68129E570EFFC77A19B04F276277B7A569EBD5FD4A48D2E2E72CEA8CEE5A8F67CC5EF4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5112024976.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58979 |
Entropy (8bit): | 4.614558556395747 |
Encrypted: | false |
SSDEEP: | 768:L0NiORRuLZR6FX7cBR+8yf+GEpMu6pTwnhMPg8dK8Fml+72IvBgB:L0PqZsFrcBlytu6AUg8IjlPoy |
MD5: | F94A1753D228E2F20927FD899344C13D |
SHA1: | 96A8A54D722CB98298CF690F4ACB6DA926989C32 |
SHA-256: | 2D13F5835B398F13D5649811E771DB6FE06A9F0E5520A404C2A0F7E16F22FF73 |
SHA-512: | 7E60C71842CB2917E6D2A99D7A7B2E96C08A6841B918E14BDDAC6BA36DC52D7E36F26EA1B25F709E60726FC5E07B420568F1A510F88CC3E9D8AB9C909C9FE766 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.57034143564734 |
TrID: |
|
File name: | 5112024976.exe |
File size: | 1'224'768 bytes |
MD5: | 35826e4e9e0db5ce7a5e95d34c34e2da |
SHA1: | f2aea3002a1529f56ea66478789037440702dfbd |
SHA256: | 5a23c2b6db6ec6993f56e635a2958ed21bbf94c6920f2329fdcd9a8641ff9b6a |
SHA512: | 2ccfbcc70d12c89e6ee8d7bd50bd39cb5497f8a261ad6d80014f3bb89856b4cbef714de1a3ef9aef3e2cf885ab2efea42d84dc3075e31bdcf49b82d8cf0dc02a |
SSDEEP: | 24576:pCAoDyk/vnt3h1CzLuTIvVFALOOOPgMAO7w6/tJeuHdB4bU4VD4dmo:pCAfqvtx1UuTId0/YgMNf2uHHSU4VDU |
TLSH: | 9645124377660EA5D85D80F7D666CD316F63BC6B008106EB3648BB1A9FBA3E0412B53D |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...<.MX.................b...|..... |
Icon Hash: | 076d76bb4c713307 |
Entrypoint: | 0x4031a3 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x584DCA3C [Sun Dec 11 21:50:52 2016 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | b78ecf47c0a3e24a6f4af114e2d1f5de |
Signature Valid: | false |
Signature Issuer: | CN=Thematically, O=Thematically, L=Alvord, C=US |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 8E893E2C0D3E7EBBCE325F8CF2021265 |
Thumbprint SHA-1: | 957C315F54630C0B32951BBBBA2D2A5D5A2370D4 |
Thumbprint SHA-256: | 5B3F3E752B6C7E17B3684AA981E05D5F2505146C254F30FF48D48E70E3B7D7B3 |
Serial: | 72FF3823130DEA295E2FABF3FD0B92EC3C0BF6AC |
Instruction |
---|
sub esp, 00000184h |
push ebx |
push esi |
push edi |
xor ebx, ebx |
push 00008001h |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 0040A198h |
mov dword ptr [esp+20h], ebx |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [004080A8h] |
call dword ptr [004080A4h] |
cmp ax, 00000006h |
je 00007F9DA8E68C33h |
push ebx |
call 00007F9DA8E6BBA1h |
cmp eax, ebx |
je 00007F9DA8E68C29h |
push 00000C00h |
call eax |
mov esi, 00408298h |
push esi |
call 00007F9DA8E6BB1Dh |
push esi |
call dword ptr [004080A0h] |
lea esi, dword ptr [esi+eax+01h] |
cmp byte ptr [esi], bl |
jne 00007F9DA8E68C0Dh |
push ebp |
push 00000009h |
call 00007F9DA8E6BB74h |
push 00000007h |
call 00007F9DA8E6BB6Dh |
mov dword ptr [0042F404h], eax |
call dword ptr [00408044h] |
push ebx |
call dword ptr [00408288h] |
mov dword ptr [0042F4B8h], eax |
push ebx |
lea eax, dword ptr [esp+38h] |
push 00000160h |
push eax |
push ebx |
push 00429828h |
call dword ptr [00408174h] |
push 0040A188h |
push 0042EC00h |
call 00007F9DA8E6B797h |
call dword ptr [0040809Ch] |
mov ebp, 00435000h |
push eax |
push ebp |
call 00007F9DA8E6B785h |
push ebx |
call dword ptr [00408154h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8534 | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4b000 | 0x64f00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x128d70 | 0x22d0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x298 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6071 | 0x6200 | 86ec2a2da0012903b23e33f511180572 | False | 0.6687659438775511 | data | 6.434342820031866 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x1352 | 0x1400 | cd090b7c5bd9ae3da2a43d4f02ef98b7 | False | 0.4599609375 | data | 5.237297010093776 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x254f8 | 0x600 | e98382d1559cdefaafaf45200fe1faf0 | False | 0.4544270833333333 | data | 4.037252180314336 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x30000 | 0x1b000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x4b000 | 0x64f00 | 0x65000 | 4b35ddad0638afdc14d8651f31f9f72e | False | 0.5893022896039604 | data | 6.144636705094013 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_BITMAP | 0x4b400 | 0x368 | Device independent bitmap graphic, 96 x 16 x 4, image size 768 | English | United States | 0.23623853211009174 |
RT_ICON | 0x4b768 | 0x4180c | Device independent bitmap graphic, 255 x 510 x 32, image size 260100 | English | United States | 0.5566530003727171 |
RT_ICON | 0x8cf78 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536 | English | United States | 0.6340796167041287 |
RT_ICON | 0x9d7a0 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 36864 | English | United States | 0.6664652091654404 |
RT_ICON | 0xa6c48 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | English | United States | 0.6956188001889466 |
RT_ICON | 0xaae70 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | English | United States | 0.6902489626556016 |
RT_ICON | 0xad418 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | English | United States | 0.724437148217636 |
RT_ICON | 0xae4c0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | English | United States | 0.7479508196721312 |
RT_ICON | 0xaee48 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | English | United States | 0.799645390070922 |
RT_DIALOG | 0xaf2b0 | 0x144 | data | English | United States | 0.5216049382716049 |
RT_DIALOG | 0xaf3f8 | 0x13c | data | English | United States | 0.5506329113924051 |
RT_DIALOG | 0xaf538 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0xaf638 | 0x11c | data | English | United States | 0.6091549295774648 |
RT_DIALOG | 0xaf758 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0xaf820 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0xaf880 | 0x76 | data | English | United States | 0.7457627118644068 |
RT_VERSION | 0xaf8f8 | 0x2c8 | data | English | United States | 0.5084269662921348 |
RT_MANIFEST | 0xafbc0 | 0x33e | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators | English | United States | 0.5542168674698795 |
DLL | Import |
---|---|
KERNEL32.dll | SetEnvironmentVariableA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, GetFileAttributesA, SetFileAttributesA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, GetFullPathNameA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, GlobalUnlock, GetDiskFreeSpaceA, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc |
USER32.dll | ScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA |
GDI32.dll | SelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA |
ADVAPI32.dll | RegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T13:54:50.594813+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.12.23.50 | 443 | 192.168.2.4 | 49730 | TCP |
2024-11-06T13:55:29.444769+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.12.23.50 | 443 | 192.168.2.4 | 49742 | TCP |
2024-11-06T13:56:01.164190+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49907 | 188.40.95.144 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 6, 2024 13:55:59.943448067 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:55:59.943494081 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:55:59.943574905 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:55:59.954689026 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:55:59.954731941 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:00.841948032 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:00.842061043 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:00.893691063 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:00.893714905 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:00.894120932 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:00.894185066 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:00.899198055 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:00.943329096 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.164191008 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.164212942 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.164257050 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.164284945 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.164299965 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.164323092 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.236706018 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.236838102 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.303998947 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.304075956 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.305085897 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.305145979 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.327712059 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.327766895 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.376677990 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.376766920 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.444098949 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.444185972 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.444330931 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.444374084 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.445185900 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.445239067 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.446229935 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.446280003 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.447012901 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.447068930 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.447173119 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.447222948 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.516323090 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.516379118 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.516845942 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.516889095 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.517256021 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.517302036 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.583578110 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.583657980 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.583859921 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.583908081 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.584441900 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.584491968 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.585186958 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.585232019 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.585412979 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.585457087 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.586235046 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.586278915 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.586816072 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.586858988 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.587078094 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.587131023 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.588414907 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.588484049 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.588680983 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.588781118 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.589221001 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.589263916 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.655848026 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.655929089 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.656398058 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.656456947 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.656889915 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.656949043 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.657156944 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.657212019 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.657598019 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.657649040 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:01.658252954 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:01.658305883 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.741055012 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741069078 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741111994 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741158009 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.741197109 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741214037 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.741230965 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.741467953 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741532087 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.741699934 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741765976 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.741771936 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741789103 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.741810083 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.741837978 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.750005007 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.750020981 CET | 443 | 49907 | 188.40.95.144 | 192.168.2.4 |
Nov 6, 2024 13:56:02.750044107 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Nov 6, 2024 13:56:02.750065088 CET | 49907 | 443 | 192.168.2.4 | 188.40.95.144 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 6, 2024 13:55:45.655469894 CET | 58498 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 6, 2024 13:55:46.660967112 CET | 58498 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 6, 2024 13:55:47.660917044 CET | 58498 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 6, 2024 13:55:49.660993099 CET | 58498 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 6, 2024 13:55:49.821856022 CET | 53 | 58498 | 1.1.1.1 | 192.168.2.4 |
Nov 6, 2024 13:55:49.821883917 CET | 53 | 58498 | 1.1.1.1 | 192.168.2.4 |
Nov 6, 2024 13:55:49.821898937 CET | 53 | 58498 | 1.1.1.1 | 192.168.2.4 |
Nov 6, 2024 13:55:49.822046995 CET | 53 | 58498 | 1.1.1.1 | 192.168.2.4 |
Nov 6, 2024 13:55:59.834985971 CET | 58502 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 6, 2024 13:55:59.938257933 CET | 53 | 58502 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 6, 2024 13:55:45.655469894 CET | 192.168.2.4 | 1.1.1.1 | 0x7fa | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:46.660967112 CET | 192.168.2.4 | 1.1.1.1 | 0x7fa | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:47.660917044 CET | 192.168.2.4 | 1.1.1.1 | 0x7fa | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:49.660993099 CET | 192.168.2.4 | 1.1.1.1 | 0x7fa | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:59.834985971 CET | 192.168.2.4 | 1.1.1.1 | 0x6290 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 6, 2024 13:55:49.821856022 CET | 1.1.1.1 | 192.168.2.4 | 0x7fa | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:49.821883917 CET | 1.1.1.1 | 192.168.2.4 | 0x7fa | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:49.821898937 CET | 1.1.1.1 | 192.168.2.4 | 0x7fa | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:49.822046995 CET | 1.1.1.1 | 192.168.2.4 | 0x7fa | Server failure (2) | none | none | A (IP address) | IN (0x0001) | false | |
Nov 6, 2024 13:55:59.938257933 CET | 1.1.1.1 | 192.168.2.4 | 0x6290 | No error (0) | 188.40.95.144 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49907 | 188.40.95.144 | 443 | 7904 | C:\Users\user\Desktop\5112024976.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-06 12:56:00 UTC | 187 | OUT | |
2024-11-06 12:56:01 UTC | 320 | IN | |
2024-11-06 12:56:01 UTC | 7872 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN | |
2024-11-06 12:56:01 UTC | 8000 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 07:54:28 |
Start date: | 06/11/2024 |
Path: | C:\Users\user\Desktop\5112024976.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'224'768 bytes |
MD5 hash: | 35826E4E9E0DB5CE7A5E95D34C34E2DA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 07:55:36 |
Start date: | 06/11/2024 |
Path: | C:\Users\user\Desktop\5112024976.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'224'768 bytes |
MD5 hash: | 35826E4E9E0DB5CE7A5E95D34C34E2DA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |