Windows
Analysis Report
17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe
Overview
General Information
Sample name: | 17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe |
Analysis ID: | 1555518 |
MD5: | a5ecad34cb793dbb9c03a601093e1c96 |
SHA1: | 6cebe7561b40cc11e15629ef7a3df55f3f411cbb |
SHA256: | cdbd60dbcef6cb4aab7fc1094547a3f16500c0c70032b30faacd6df5a5b0199b |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe (PID: 4932 cmdline:
"C:\Users\ user\Deskt op\1731545 7645970cbc 5e5c3aae0a 844eb233aa d28ea87b3b 8a58910e22 5655f6d041 f399ede930 .dat-decod ed.exe" MD5: A5ECAD34CB793DBB9C03A601093E1C96)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"Server": "dckazts.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "KqHyAloIVZbvGi3MrMWH21oQwLkhebmF", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "hmePP5ubexg0uqiG87LncCQ0+hwnlruI8+t984Vgf53QHnvJIyMKJiIoghHP8eh4f17f8idwGvwY1RLvvRih3wW6hK/AG+tBrAIi0eHlsyGEuXt3Bwz3mcuSTh18LdyKI99KndUqHikd8saf6IFsnFfSI5FnpjD9EEqN0DVe24M=", "BDOS": "null", "External_config_on_Pastebin": "false"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-14T01:58:38.554711+0100 | 2022930 | 1 | A Network Trojan was detected | 52.149.20.212 | 443 | 192.168.2.8 | 49708 | TCP |
2024-11-14T01:59:17.974684+0100 | 2022930 | 1 | A Network Trojan was detected | 52.149.20.212 | 443 | 192.168.2.8 | 49716 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-14T01:58:23.010827+0100 | 2034847 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 35650 | 192.168.2.8 | 49706 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-14T01:58:23.010827+0100 | 2842478 | 1 | Malware Command and Control Activity Detected | 45.135.232.38 | 35650 | 192.168.2.8 | 49706 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-14T01:58:23.010827+0100 | 2848048 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 35650 | 192.168.2.8 | 49706 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FFB4AD38346 | |
Source: | Code function: | 0_2_00007FFB4AD330E2 | |
Source: | Code function: | 0_2_00007FFB4AD390F2 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFB4AD300C1 | |
Source: | Code function: | 0_2_00007FFB4AD306DB |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 Scheduled Task/Job | 1 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 31 Virtualization/Sandbox Evasion | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Native API | Logon Script (Windows) | 1 DLL Side-Loading | 1 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Obfuscated Files or Information | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 21 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
82% | ReversingLabs | ByteCode-MSIL.Backdoor.AsyncRAT | ||
74% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1307404 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false | high | |
dckazts.duckdns.org | 45.135.232.38 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.135.232.38 | dckazts.duckdns.org | Russian Federation | 49392 | ASBAXETNRU | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1555518 |
Start date and time: | 2024-11-14 01:57:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 21s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/2@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 199.232.210.172, 93.184.221.240
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
19:58:23 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.135.232.38 | Get hash | malicious | AsyncRAT, DcRat | Browse | ||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bg.microsoft.map.fastly.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ASBAXETNRU | Get hash | malicious | AsyncRAT, DcRat | Browse |
| |
Get hash | malicious | AsyncRAT, DcRat | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Phisher | Browse |
|
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.245596380966818 |
Encrypted: | false |
SSDEEP: | 6:kKTUTLD9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:7UTLaDImsLNkPlE99SNxAhUe/3 |
MD5: | FBCAE3E590EC2F7C7437778927E38162 |
SHA1: | 4F1CEF1A63F37C22010A0C3FF59F59E578F6CB14 |
SHA-256: | 3ECE7355CA7D028FCBAF82495637A4BDDDE1161CDD4A148B81DE6F3DB9867F22 |
SHA-512: | C5A4714475E3AC334F92DD2B1D24E117E03975D4CDA53893579AD73A861D3617FE90656E94E50BAFB78E6A2DDB0750B486D27D447F33B01CFBC44B3E9B8FC6DA |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.618163997317169 |
TrID: |
|
File name: | 17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe |
File size: | 48'640 bytes |
MD5: | a5ecad34cb793dbb9c03a601093e1c96 |
SHA1: | 6cebe7561b40cc11e15629ef7a3df55f3f411cbb |
SHA256: | cdbd60dbcef6cb4aab7fc1094547a3f16500c0c70032b30faacd6df5a5b0199b |
SHA512: | 612278e99c4bf570756f3511d60ecd8c46654aededc07419779786814cc09d1fc5bb7d51c0c3210d7ac7be84bf47b1a3e0931a2075afb64348f193c063ae62fb |
SSDEEP: | 768:xGq+s3pUtDILNCCa+Di+0j1rgLqRp8Aofiw8Yblge5s69OhtvEgK/JLZVc6KN:8q+AGtQO+OOPAmzbiws69ynkJLZVclN |
TLSH: | 3D236D0037D8C136E2FD4BB9A9F292458279D6676903CB596CC811EA2F13BC597036FE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40cbbe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60930A0B [Wed May 5 21:11:39 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcb68 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0xdf7 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xabc4 | 0xac00 | 0ff92624136e3603add37af1e05fc811 | False | 0.5025890261627907 | data | 5.643961753928753 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0xdf7 | 0xe00 | 2083376922615c09cdda9acfd9305376 | False | 0.4017857142857143 | data | 5.110607648061562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 82148d01c3935cf90ef81a3dd1fad607 | False | 0.044921875 | data | 0.07763316234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2d4 | data | 0.4350828729281768 | ||
RT_MANIFEST | 0xe374 | 0xa83 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.40245261984392416 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-14T01:58:23.010827+0100 | 2842478 | ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) | 1 | 45.135.232.38 | 35650 | 192.168.2.8 | 49706 | TCP |
2024-11-14T01:58:23.010827+0100 | 2034847 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 35650 | 192.168.2.8 | 49706 | TCP |
2024-11-14T01:58:23.010827+0100 | 2848048 | ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 35650 | 192.168.2.8 | 49706 | TCP |
2024-11-14T01:58:38.554711+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 52.149.20.212 | 443 | 192.168.2.8 | 49708 | TCP |
2024-11-14T01:59:17.974684+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 52.149.20.212 | 443 | 192.168.2.8 | 49716 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 14, 2024 01:58:22.109482050 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:22.114408016 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:22.114520073 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:22.137522936 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:22.142338037 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:22.998707056 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:23.005525112 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:23.010827065 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:23.274501085 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:23.321074963 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:24.634566069 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:24.639758110 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:24.639851093 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:24.644730091 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:27.398791075 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:27.446099043 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:27.543556929 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:27.586760044 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:35.871068001 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:35.876089096 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:35.876307964 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:35.881294012 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:36.147866011 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:36.196089983 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:36.293102026 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:36.332859039 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:36.338104010 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:36.338176966 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:36.342951059 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:47.103358030 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:47.108311892 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:47.108526945 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:47.113537073 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:47.376233101 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:47.430694103 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:47.520626068 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:47.571378946 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:47.657733917 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:47.662668943 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:47.662766933 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:47.667746067 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:57.403031111 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:57.446450949 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:57.548969984 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:57.602588892 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:58.337302923 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:58.342139006 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:58.342221022 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:58.346975088 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:58.621479034 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:58.664889097 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:58.761151075 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:58.763535976 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:58.768402100 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:58:58.768496990 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:58:58.773324966 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:09.575364113 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:09.580545902 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:09.580638885 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:09.585629940 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:09.851752043 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:09.899240017 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:09.993119001 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:09.994851112 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:09.999748945 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:09.999809980 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:10.004761934 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:20.806180000 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:20.811042070 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:20.811095953 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:20.815911055 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:21.079090118 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:21.133738995 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:21.223676920 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:21.225944042 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:21.231069088 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:21.231149912 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:21.236160994 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:27.399724007 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:27.446160078 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:27.544281960 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:27.586998940 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:32.040544987 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:32.045736074 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:32.046045065 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:32.051578999 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:32.316452980 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:32.368249893 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:32.462274075 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:32.464287996 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:32.473001957 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:32.473068953 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:32.479362011 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:43.275213003 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:43.280410051 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:43.280697107 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:43.285609961 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:43.548559904 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:43.602554083 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:43.692629099 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:43.694900036 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:43.699784994 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:43.699878931 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:43.704710007 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:54.509409904 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:54.514569998 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:54.514647007 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:54.519723892 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:54.783533096 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:54.837152958 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:54.927177906 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:54.929560900 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:54.934756994 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:54.934835911 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:54.943578959 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:57.395560980 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:57.446206093 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 01:59:57.539973974 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 01:59:57.586935043 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:05.743794918 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:05.748872995 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:05.749119043 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:05.753956079 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:06.016518116 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:06.071332932 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:06.160734892 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:06.162518024 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:06.167484045 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:06.167589903 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:06.172426939 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:16.978064060 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:16.983032942 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:16.983140945 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:16.988027096 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:17.250555992 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:17.290127993 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:17.395025015 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:17.396863937 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:17.401758909 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:17.401860952 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:17.406840086 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:25.525170088 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:25.530113935 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:25.530247927 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:25.535043955 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:25.797873020 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:25.852699041 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:25.943429947 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:25.944574118 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:25.949482918 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:25.949615955 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:25.954474926 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:27.397286892 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:27.446398973 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Nov 14, 2024 02:00:27.541841984 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.8 |
Nov 14, 2024 02:00:27.587035894 CET | 49706 | 35650 | 192.168.2.8 | 45.135.232.38 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 14, 2024 01:58:21.974050999 CET | 50815 | 53 | 192.168.2.8 | 1.1.1.1 |
Nov 14, 2024 01:58:22.104664087 CET | 53 | 50815 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 14, 2024 01:58:21.974050999 CET | 192.168.2.8 | 1.1.1.1 | 0x2855 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 14, 2024 01:58:22.104664087 CET | 1.1.1.1 | 192.168.2.8 | 0x2855 | No error (0) | 45.135.232.38 | A (IP address) | IN (0x0001) | false | ||
Nov 14, 2024 01:58:23.411525011 CET | 1.1.1.1 | 192.168.2.8 | 0x7ad6 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Nov 14, 2024 01:58:23.411525011 CET | 1.1.1.1 | 192.168.2.8 | 0x7ad6 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 19:58:18 |
Start date: | 13/11/2024 |
Path: | C:\Users\user\Desktop\17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xbd0000 |
File size: | 48'640 bytes |
MD5 hash: | A5ECAD34CB793DBB9C03A601093E1C96 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 19.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 9 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFB4AD38346 Relevance: .5, Instructions: 474COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFB4AD390F2 Relevance: .5, Instructions: 460COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|