Windows
Analysis Report
RasTls.dll
Overview
General Information
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll32.exe (PID: 6668 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\Ras Tls.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618) - conhost.exe (PID: 6616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5856 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\Ras Tls.dll",# 1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - rundll32.exe (PID: 1368 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\RasT ls.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 736 cmdline:
rundll32.e xe C:\User s\user\Des ktop\RasTl s.dll,GetO fficeDatat al MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 2416 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\RasT ls.dll",Ge tOfficeDat atal MD5: 889B99C52A60DD49227C5E485A016679)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | Network Connect: | Jump to behavior |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 111 Process Injection | 1 Rundll32 | 1 Credential API Hooking | 21 Security Software Discovery | Remote Services | 1 Credential API Hooking | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 111 Process Injection | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 21 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
68% | ReversingLabs | Win32.Backdoor.Healquick | ||
100% | Avira | TR/Redcap.mvaff | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
swiftandfast.net | 65.20.90.139 | true | true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
65.20.90.139 | swiftandfast.net | United States | 199592 | CP-ASDE | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561846 |
Start date and time: | 2024-11-24 13:36:16 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | RasTls.dll |
Detection: | MAL |
Classification: | mal88.evad.winDLL@10/0@1/1 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: RasTls.dll
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CP-ASDE | Get hash | malicious | Discord Token Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RMSRemoteAdmin | Browse |
| ||
Get hash | malicious | RMSRemoteAdmin | Browse |
| ||
Get hash | malicious | Remcos | Browse |
|
File type: | |
Entropy (8bit): | 7.965303809439106 |
TrID: |
|
File name: | RasTls.dll |
File size: | 6'302'208 bytes |
MD5: | f1c9f093d5479560e83a0759201210b7 |
SHA1: | 9553567e231a172c69f0ef8800a927193b9cbd49 |
SHA256: | 1906e7d5a745a364c91f5e230e16e1566721ace1183a57e8d25ff437664c7d02 |
SHA512: | be63e2da1a550053d599e4369fe2e4a96bfed5bf0dc52bd4cba2a6ab0f8995c9953d4b703547e3bed45ce640c0eee4ebe3aef15849f126fff39b1f0178951201 |
SSDEEP: | 196608:5y0OghWwkjhzqi5DOjUl2DGzNZZkuBm1W8xQVW:5JFEDj9qiloUl7Ux1W |
TLSH: | E3562363216A0006E5F9883DC61F7D9831F742769B43E87CB1B6ADD52B269B1F203B53 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ob...........!................0.=..............................................:`...@.............................N.. |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x103dc030 |
Entrypoint Section: | .WFm |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x624FFDD6 [Fri Apr 8 09:18:14 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 1a39c9a6ecf0ca64fc5770962bbdc4e5 |
Instruction |
---|
push BFD4F858h |
call 00007F8A00B455FCh |
dec edx |
not edx |
jmp 00007F8A00BE90E9h |
mov eax, dword ptr [ebp+00h] |
sub cx, 5642h |
shrd cx, dx, 00000081h |
mov cx, word ptr [ebp+04h] |
lea ebp, dword ptr [ebp+00000006h] |
jmp 00007F8A00B815E3h |
bt ecx, esi |
mov ecx, dword ptr [ebp+00h] |
jmp 00007F8A00D391E5h |
add edi, eax |
jmp 00007F8A00BA710Dh |
jne 00007F8A00B92BCEh |
mov eax, dword ptr [ebp+00h] |
jmp 00007F8A00B06AB0h |
add esi, 00000004h |
test di, ax |
xor ecx, ebx |
jmp 00007F8A00B3436Dh |
mov eax, dword ptr [esi] |
mov edx, esi |
bt edx, 1Ah |
btc edx, 14h |
mov edx, dword ptr [eax] |
cmc |
cmp sp, 55CAh |
mov dword ptr [esi], edx |
btc dx, di |
add edx, edx |
test ebp, 4118545Dh |
mov edx, dword ptr [ebp+00h] |
test cl, dh |
jmp 00007F8A00BECD4Eh |
inc ecx |
not ecx |
xor ebx, ecx |
jmp 00007F8A00B60936h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x9216d0 | 0x4e | .WFm |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x5c5ac4 | 0x118 | .WFm |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x96a000 | 0x1b2 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x969000 | 0x5fc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x968670 | 0x40 | .WFm |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x366000 | 0x90 | .BXf |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1a59b | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x1c000 | 0x462e | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x21000 | 0xa900 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.X:T | 0x2c000 | 0x339eac | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.BXf | 0x366000 | 0x5b0 | 0x600 | 7ef56d7580a2e67cae4f7f89e6eafb55 | False | 0.07877604166666667 | data | 0.5089280985485166 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.WFm | 0x367000 | 0x601800 | 0x601800 | 61ee4f262fb1277e667af5bfdf9afdab | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x969000 | 0x5fc | 0x600 | 28b0624b163f2fd9b5e789a185b2c2db | False | 0.52734375 | data | 4.347436157519483 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x96a000 | 0x1b2 | 0x200 | 6a1cfcb854d8d3c8d4a13f0819166e2e | False | 0.470703125 | data | 4.47450519324645 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x96a058 | 0x15a | ASCII text, with CRLF line terminators | English | United States | 0.5491329479768786 |
DLL | Import |
---|---|
KERNEL32.dll | GetVersionExW |
USER32.dll | wsprintfA |
ADVAPI32.dll | CredEnumerateA |
SHELL32.dll | ShellExecuteW |
WS2_32.dll | WSAIoctl |
SHLWAPI.dll | PathGetArgsW |
NETAPI32.dll | NetUserGetInfo |
IPHLPAPI.DLL | GetAdaptersInfo |
CRYPT32.dll | CryptUnprotectData |
OLEAUT32.dll | GetErrorInfo |
KERNEL32.dll | GetSystemTimeAsFileTime |
USER32.dll | CharUpperBuffW |
KERNEL32.dll | LocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress |
Name | Ordinal | Address |
---|---|---|
GetOfficeDatatal | 1 | 0x100098d0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 13:37:12.508543968 CET | 49730 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:12.508558035 CET | 49731 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:12.508575916 CET | 443 | 49730 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:12.508654118 CET | 49730 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:12.508656979 CET | 443 | 49731 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:12.508712053 CET | 49730 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:12.508717060 CET | 443 | 49730 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:12.508730888 CET | 49731 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:12.508800030 CET | 49731 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:12.508819103 CET | 443 | 49731 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:15.656908989 CET | 49732 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:15.656975985 CET | 443 | 49732 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:15.657051086 CET | 49732 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:15.657095909 CET | 49732 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:15.657104015 CET | 443 | 49732 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:56.659132004 CET | 443 | 49730 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:56.659212112 CET | 49730 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:56.659288883 CET | 49730 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:56.659305096 CET | 443 | 49730 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:56.750670910 CET | 443 | 49731 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:56.750802040 CET | 49731 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:56.750924110 CET | 49731 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:56.750946999 CET | 443 | 49731 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:59.667820930 CET | 49739 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.667879105 CET | 443 | 49739 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:59.667973995 CET | 49739 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.668024063 CET | 49739 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.668031931 CET | 443 | 49739 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:59.741568089 CET | 443 | 49732 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:59.741672039 CET | 49732 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.741758108 CET | 49732 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.741796017 CET | 443 | 49732 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:59.761442900 CET | 49740 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.761486053 CET | 443 | 49740 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:37:59.761567116 CET | 49740 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.761615038 CET | 49740 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:37:59.761622906 CET | 443 | 49740 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:02.746087074 CET | 49741 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:02.746192932 CET | 443 | 49741 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:02.746413946 CET | 49741 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:02.746490955 CET | 49741 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:02.746510029 CET | 443 | 49741 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:43.845158100 CET | 443 | 49739 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:43.845355034 CET | 49739 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:43.845355034 CET | 49739 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:43.892118931 CET | 443 | 49740 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:43.892313957 CET | 49740 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:43.892433882 CET | 49740 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:43.892443895 CET | 443 | 49740 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:44.151957989 CET | 49739 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:44.151983023 CET | 443 | 49739 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:46.855658054 CET | 49828 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.855686903 CET | 443 | 49828 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:46.855761051 CET | 49828 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.855844975 CET | 49828 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.855853081 CET | 443 | 49828 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:46.902158976 CET | 49830 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.902174950 CET | 443 | 49830 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:46.902379990 CET | 49830 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.902461052 CET | 49830 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.902468920 CET | 443 | 49830 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:46.927247047 CET | 443 | 49741 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:46.927400112 CET | 49741 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.927519083 CET | 49741 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:46.927541018 CET | 443 | 49741 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:49.933461905 CET | 49836 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:49.933516026 CET | 443 | 49836 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:38:49.933707952 CET | 49836 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:49.933800936 CET | 49836 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:38:49.933809996 CET | 443 | 49836 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:30.977833986 CET | 443 | 49828 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:30.977966070 CET | 49828 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:30.978156090 CET | 49828 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:30.978169918 CET | 443 | 49828 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:31.111716986 CET | 443 | 49830 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:31.111788034 CET | 49830 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:31.111844063 CET | 49830 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:31.111852884 CET | 443 | 49830 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:33.980344057 CET | 49932 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:33.980379105 CET | 443 | 49932 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:33.980463982 CET | 49932 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:33.980592012 CET | 49932 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:33.980600119 CET | 443 | 49932 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:34.096189022 CET | 443 | 49836 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:34.096278906 CET | 49836 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:34.096343040 CET | 49836 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:34.096379995 CET | 443 | 49836 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:34.120963097 CET | 49933 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:34.120997906 CET | 443 | 49933 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:34.121076107 CET | 49933 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:34.121157885 CET | 49933 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:34.121165991 CET | 443 | 49933 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:37.105736017 CET | 49942 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:37.105787039 CET | 443 | 49942 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:39:37.105866909 CET | 49942 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:37.105936050 CET | 49942 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:39:37.105945110 CET | 443 | 49942 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:40:18.097523928 CET | 443 | 49932 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:40:18.097615957 CET | 49932 | 443 | 192.168.2.4 | 65.20.90.139 |
Nov 24, 2024 13:40:18.488009930 CET | 443 | 49933 | 65.20.90.139 | 192.168.2.4 |
Nov 24, 2024 13:40:18.488070965 CET | 49933 | 443 | 192.168.2.4 | 65.20.90.139 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 13:37:12.252051115 CET | 60433 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 24, 2024 13:37:12.500844002 CET | 53 | 60433 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 24, 2024 13:37:12.252051115 CET | 192.168.2.4 | 1.1.1.1 | 0xa9bc | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 24, 2024 13:37:12.500844002 CET | 1.1.1.1 | 192.168.2.4 | 0xa9bc | No error (0) | 65.20.90.139 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 07:37:09 |
Start date: | 24/11/2024 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe80000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 07:37:09 |
Start date: | 24/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 07:37:10 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 07:37:10 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5a0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 4 |
Start time: | 07:37:10 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5a0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 5 |
Start time: | 07:37:13 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5a0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |