Windows
Analysis Report
dMFmJxq6oK.exe
Overview
General Information
Sample name: | dMFmJxq6oK.exerenamed because original name is a hash value |
Original sample name: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d.exe |
Analysis ID: | 1565144 |
MD5: | b8437f2884c33e61fb50c622bb30b90a |
SHA1: | b2c2f68bbb403e8bb0d5528673526ae5ce16bbf7 |
SHA256: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d |
Tags: | exevirustotal-vm-blacklistuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- dMFmJxq6oK.exe (PID: 3308 cmdline:
"C:\Users\ user\Deskt op\dMFmJxq 6oK.exe" MD5: B8437F2884C33E61FB50C622BB30B90A) - conhost.exe (PID: 6796 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6836 cmdline:
C:\Windows \system32\ cmd.exe /c certutil -hashfile "C:\Users\ user\Deskt op\dMFmJxq 6oK.exe" M D5 | find /i /v "md5 " | find / i /v "cert util" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - certutil.exe (PID: 2196 cmdline:
certutil - hashfile " C:\Users\u ser\Deskto p\dMFmJxq6 oK.exe" MD 5 MD5: F17616EC0522FC5633151F7CAA278CAA) - find.exe (PID: 1180 cmdline:
find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - find.exe (PID: 1316 cmdline:
find /i /v "certutil " MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - cmd.exe (PID: 1588 cmdline:
C:\Windows \system32\ cmd.exe /c start cmd /C \"colo r b && tit le Error & & echo Tim eout was r eached && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1848 cmdline:
cmd /C \"c olor b && title Erro r && echo Timeout wa s reached && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3256 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WerFault.exe (PID: 3380 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 3 308 -s 203 2 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-29T10:57:23.709237+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.7 | 49707 | 142.44.215.161 | 443 | TCP |
2024-11-29T10:57:25.677962+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.7 | 49713 | 185.199.109.133 | 443 | TCP |
2024-11-29T10:57:27.554910+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.7 | 49719 | 185.199.109.133 | 443 | TCP |
2024-11-29T10:57:29.669953+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.7 | 49725 | 185.199.109.133 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Binary or memory string: | memstr_49745755-5 |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Special instruction interceptor: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior |
Source: | Handle closed: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtUnmapViewOfSection: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | 1 Credential API Hooking | 311 Security Software Discovery | Remote Services | 1 Credential API Hooking | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 12 Virtualization/Sandbox Evasion | LSASS Memory | 12 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 11 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Abuse Elevation Control Mechanism | NTDS | 1 System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 12 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Win64.Trojan.SpyLoader | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
keyauth.win | 104.26.1.5 | true | false | high | |
raw.githubusercontent.com | 185.199.109.133 | true | false | high | |
wtfismyip.com | 142.44.215.161 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.199.109.133 | raw.githubusercontent.com | Netherlands | 54113 | FASTLYUS | false | |
104.26.1.5 | keyauth.win | United States | 13335 | CLOUDFLARENETUS | false | |
142.44.215.161 | wtfismyip.com | Canada | 16276 | OVHFR | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1565144 |
Start date and time: | 2024-11-29 10:56:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 25 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | dMFmJxq6oK.exerenamed because original name is a hash value |
Original Sample Name: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d.exe |
Detection: | MAL |
Classification: | mal76.evad.winEXE@16/4@4/4 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: dMFmJxq6oK.exe
Time | Type | Description |
---|---|---|
06:56:22 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.199.109.133 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Metasploit | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
104.26.1.5 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
raw.githubusercontent.com | Get hash | malicious | Stealerium | Browse |
| |
Get hash | malicious | RDPWrap Tool, Ducktail | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, Xmrig, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
keyauth.win | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
wtfismyip.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Discord Token Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ades Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Discord Token Stealer | Browse |
| ||
Get hash | malicious | Discord Token Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Trickbot | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
OVHFR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
FASTLYUS | Get hash | malicious | Stealerium | Browse |
| |
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | GiftCardfraud | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | GiftCardfraud | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ce5f3254611a8c095a3d821d44539877 | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Remcos, GuLoader | Browse |
| |
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Nymaim, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
|
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2853 |
Entropy (8bit): | 3.3945039648831856 |
Encrypted: | false |
SSDEEP: | 48:2vt2vs73cVl4me/JKu9aZ7FFdN9zCFg5+6Dqq0Ya80LyRWdOLxLzafFpjn0gRnNv:xs73dnwFFdN9zCFg5+6Dqq0LLyRWYI5h |
MD5: | 72F58A060B3A9FCD37F2655B5A301A05 |
SHA1: | 56BD712358C08145603D50BE9D491F8B5A6B78EB |
SHA-256: | B6669E5822A7433EA0EEE9FC26A125F8CEA6379B0799D5EEA8C363E16DC7125B |
SHA-512: | 56A0ECA0F52D9781B8A778CA0A341679E988DB66921918623BC0DB46B0C980EFABE1F6D44ADC17ACA6325D2D71D0253BC3926F7B73E4051CD64A35DCB97D08D1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13 |
Entropy (8bit): | 2.8150724101159437 |
Encrypted: | false |
SSDEEP: | 3:fuMNn:2Sn |
MD5: | CD82C1BDF4F1EFF2514B0854C56FDC9F |
SHA1: | 8DBCF930D9A1A5F07FC911BD7321F7D8F1A1CA63 |
SHA-256: | FCB978959992DB1BEBFDE3B6DE3B7D48C5D4DBF1E127EB65BA59F4C60E8FB74A |
SHA-512: | 175D83C16526EBACD1BAB0FE0BEB1E9B74BB66D97CE12CB666B5B88B87C4F2ABADB24A7A1E7F49015B462A4B6B68E68253BBE0C20176474D7661DB38E0F1F06E |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\pc_username_list[1].txt
Download File
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1275 |
Entropy (8bit): | 5.686349299485424 |
Encrypted: | false |
SSDEEP: | 24:8YGEgnRyOQWvFyIDrVgaQ9d0zdRExKU8lN9iyqrVvX9OADV10OKMIVBtK8g0n:rGEgnRyxqZG/9d0zSEJiyqrRLloztPg0 |
MD5: | 1D67516CC29BB3DD51B882AD9E82CD2E |
SHA1: | 267E80B9E0AA1982838238B67765BD840F7C788B |
SHA-256: | F411221BF6E51E6DEB4E8D5CDC7E2E1BA4BBB3868DA5BB1BC0C29A3A3A02D0A7 |
SHA-512: | 25D6D92314F59C3EDE98E7D485AEDAAC09D0B2781D6DBAEF3B9D003FAA838BE47249A14163652BD46A18DAB951DC22A1BDC463BB4973B8F66359AB4CDE4AEE35 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\pc_name_list[1].txt
Download File
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3145 |
Entropy (8bit): | 4.991276116977138 |
Encrypted: | false |
SSDEEP: | 96:oiDjZkeTuUruqwyZdrRnSpG5lr8druckP:oiDjZkeT7qqwyZdrRn/5lKrkP |
MD5: | DD8E526AEA8FD5CBE26E02ABFB61104C |
SHA1: | B2EA96BB16DA297B34DF121A5A59FDB5D9905351 |
SHA-256: | C4FACF7ECA009951F63280521105C4EFE7359CA7D8036B714B6A9597EDF7402D |
SHA-512: | 5552BD4E05BE02E47A2B3FEFF6120BF57E598D11550FB674D4A2CBAFC7C97DB3B0D88AECA5C14FBA6889A5D5CBCB93511D86CB1592774AFAED11B01BF1E096EC |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.975522767060179 |
TrID: |
|
File name: | dMFmJxq6oK.exe |
File size: | 23'243'776 bytes |
MD5: | b8437f2884c33e61fb50c622bb30b90a |
SHA1: | b2c2f68bbb403e8bb0d5528673526ae5ce16bbf7 |
SHA256: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d |
SHA512: | 64993908ff7ba2c3ac4e4e34e6b69950270399356fe13bbe4e9aa894efc21b2949a9fe7d42c658f4ee5ab7b4af6f1dbeab97b846515f5bfcfbeed7c5dfd014cf |
SSDEEP: | 393216:wBiLN/Rdx34bymzUY7kIJA2YX3uShzl/o8RXDp8fJuOZL//rf6fJNdVs:SeX8pDYX31A60JuOZL/Df6f52 |
TLSH: | 743733B22AE611F4F3EBCF20D5C6B258E1A977C74AB8F44F29C409425A50DDACC05E67 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...,c.e.........."....&.......................@.............................P|...........`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x14119dd93 |
Entrypoint Section: | .beatwar |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6593632C [Tue Jan 2 01:13:16 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | bd983510c1a76cf49b3d859806b034d1 |
Instruction |
---|
push ebp |
pushfd |
dec eax |
mov ebp, A32AC11Ah |
mov dword ptr [ebx-1A3E386Dh], ecx |
retn ED2Bh |
call 00007F1EC1DC69C3h |
aaa |
push ecx |
mov ah, 70h |
sbb byte ptr [edx+40B0FF84h], 00000041h |
add byte ptr [edi+3E3AE004h], al |
pop edx |
je 00007F1EC0B2F47Eh |
fbstp [eax] |
sub al, 00h |
jle 00007F1EC0B2F484h |
sub dh, byte ptr [edi] |
inc ecx |
dec byte ptr [esi] |
adc al, F9h |
or ebx, dword ptr [ebx-5FFC60AEh] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2471d40 | 0x244 | .beatwar |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x27c4000 | 0x1e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x27ba300 | 0x8c04 | .beatwar |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x27c3000 | 0x11c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x1234f28 | 0x28 | .beatwar |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x27ba1c0 | 0x140 | .beatwar |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1198000 | 0x1e8 | .beatwar |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xb8c5c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xba000 | 0x234a8 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xde000 | 0x40270 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x11f000 | 0x6114 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.beatwar | 0x126000 | 0x1071f8d | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.beatwar | 0x1198000 | 0x13e8 | 0x1400 | adc00d38c138b97eca8f8987cc88824c | False | 0.0404296875 | data | 0.3130265279645761 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.beatwar | 0x119a000 | 0x1628f04 | 0x1629000 | 3efec529b202a077840601f198de1b9e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x27c3000 | 0x11c | 0x200 | 007215ccc256724f5e4b0ac4591aef39 | False | 0.40625 | data | 2.691173783288699 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x27c4000 | 0x1e0 | 0x200 | 843f83318fe1e44e5e03a74a86f08715 | False | 0.537109375 | data | 4.787901013849104 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x27c4058 | 0x188 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5892857142857143 |
DLL | Import |
---|---|
KERNEL32.dll | GetFileSize |
USER32.dll | GetDesktopWindow |
ADVAPI32.dll | CryptEncrypt |
MSVCP140.dll | ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ |
ntdll.dll | VerSetConditionMask |
WININET.dll | InternetReadFile |
PSAPI.DLL | GetModuleInformation |
Normaliz.dll | IdnToAscii |
WLDAP32.dll | |
CRYPT32.dll | CertEnumCertificatesInStore |
WS2_32.dll | WSAIoctl |
RPCRT4.dll | UuidToStringA |
USERENV.dll | UnloadUserProfile |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
VCRUNTIME140.dll | strstr |
api-ms-win-crt-stdio-l1-1-0.dll | fgetpos |
api-ms-win-crt-heap-l1-1-0.dll | _set_new_mode |
api-ms-win-crt-runtime-l1-1-0.dll | _initterm_e |
api-ms-win-crt-time-l1-1-0.dll | _difftime64 |
api-ms-win-crt-string-l1-1-0.dll | strncpy |
api-ms-win-crt-utility-l1-1-0.dll | rand |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-convert-l1-1-0.dll | strtod |
api-ms-win-crt-filesystem-l1-1-0.dll | _unlock_file |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
KERNEL32.dll | GetSystemTimeAsFileTime |
KERNEL32.dll | HeapAlloc, HeapFree, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-29T10:57:23.709237+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.7 | 49707 | 142.44.215.161 | 443 | TCP |
2024-11-29T10:57:25.677962+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.7 | 49713 | 185.199.109.133 | 443 | TCP |
2024-11-29T10:57:27.554910+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.7 | 49719 | 185.199.109.133 | 443 | TCP |
2024-11-29T10:57:29.669953+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.7 | 49725 | 185.199.109.133 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 29, 2024 10:57:21.888253927 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:21.888304949 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:21.888385057 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:21.916450024 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:21.916479111 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.210931063 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.211052895 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.354993105 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.355016947 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.355384111 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.355438948 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.377640963 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.423336983 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.709389925 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.709470987 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.709480047 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.709512949 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.709544897 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.709575891 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.793276072 CET | 49707 | 443 | 192.168.2.7 | 142.44.215.161 |
Nov 29, 2024 10:57:23.793313980 CET | 443 | 49707 | 142.44.215.161 | 192.168.2.7 |
Nov 29, 2024 10:57:23.965926886 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:23.965970993 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:23.966109037 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:23.978791952 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:23.978810072 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.240448952 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.240526915 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.243866920 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.243877888 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.244121075 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.244180918 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.244550943 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.287337065 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.678003073 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.678105116 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.678658009 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.678735971 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.681930065 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.681988955 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.681999922 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.682035923 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.682049036 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.682121992 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.682307005 CET | 49713 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.682322979 CET | 443 | 49713 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.687798977 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.687830925 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:25.687916994 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.688219070 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:25.688232899 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.112072945 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.112128973 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.112611055 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.112622976 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.112806082 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.112812042 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.554924965 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.555105925 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.556360006 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.556413889 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.556423903 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.556436062 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.556473970 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.572642088 CET | 49719 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.572647095 CET | 443 | 49719 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.967556000 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.967627048 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:27.967704058 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.967989922 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:27.968013048 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.226355076 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.226448059 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.227076054 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.227082014 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.227289915 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.227293968 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.669969082 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.670027971 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.670691967 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.670737982 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.673908949 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.673963070 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.673974037 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.674011946 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:29.674019098 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.674056053 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.674235106 CET | 49725 | 443 | 192.168.2.7 | 185.199.109.133 |
Nov 29, 2024 10:57:29.674248934 CET | 443 | 49725 | 185.199.109.133 | 192.168.2.7 |
Nov 29, 2024 10:57:36.575247049 CET | 49752 | 443 | 192.168.2.7 | 104.26.1.5 |
Nov 29, 2024 10:57:36.575304031 CET | 443 | 49752 | 104.26.1.5 | 192.168.2.7 |
Nov 29, 2024 10:57:36.575381041 CET | 49752 | 443 | 192.168.2.7 | 104.26.1.5 |
Nov 29, 2024 10:57:36.575974941 CET | 49752 | 443 | 192.168.2.7 | 104.26.1.5 |
Nov 29, 2024 10:57:36.576001883 CET | 443 | 49752 | 104.26.1.5 | 192.168.2.7 |
Nov 29, 2024 10:57:37.802462101 CET | 443 | 49752 | 104.26.1.5 | 192.168.2.7 |
Nov 29, 2024 10:57:37.802582026 CET | 49752 | 443 | 192.168.2.7 | 104.26.1.5 |
Nov 29, 2024 10:57:37.837021112 CET | 49752 | 443 | 192.168.2.7 | 104.26.1.5 |
Nov 29, 2024 10:57:37.837045908 CET | 443 | 49752 | 104.26.1.5 | 192.168.2.7 |
Nov 29, 2024 10:57:37.837116957 CET | 49752 | 443 | 192.168.2.7 | 104.26.1.5 |
Nov 29, 2024 10:57:37.837176085 CET | 443 | 49752 | 104.26.1.5 | 192.168.2.7 |
Nov 29, 2024 10:57:37.837224960 CET | 49752 | 443 | 192.168.2.7 | 104.26.1.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 29, 2024 10:57:21.626163960 CET | 56560 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 29, 2024 10:57:21.871767044 CET | 53 | 56560 | 1.1.1.1 | 192.168.2.7 |
Nov 29, 2024 10:57:23.805819035 CET | 60018 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 29, 2024 10:57:23.945179939 CET | 53 | 60018 | 1.1.1.1 | 192.168.2.7 |
Nov 29, 2024 10:57:36.424032927 CET | 60235 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 29, 2024 10:57:36.566339016 CET | 53 | 60235 | 1.1.1.1 | 192.168.2.7 |
Nov 29, 2024 10:57:53.575822115 CET | 53728 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 29, 2024 10:57:53.717130899 CET | 53 | 53728 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 29, 2024 10:57:21.626163960 CET | 192.168.2.7 | 1.1.1.1 | 0xa5a3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 29, 2024 10:57:23.805819035 CET | 192.168.2.7 | 1.1.1.1 | 0x339f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 29, 2024 10:57:36.424032927 CET | 192.168.2.7 | 1.1.1.1 | 0x3980 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 29, 2024 10:57:53.575822115 CET | 192.168.2.7 | 1.1.1.1 | 0xfff2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 29, 2024 10:57:21.871767044 CET | 1.1.1.1 | 192.168.2.7 | 0xa5a3 | No error (0) | 142.44.215.161 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:23.945179939 CET | 1.1.1.1 | 192.168.2.7 | 0x339f | No error (0) | 185.199.109.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:23.945179939 CET | 1.1.1.1 | 192.168.2.7 | 0x339f | No error (0) | 185.199.111.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:23.945179939 CET | 1.1.1.1 | 192.168.2.7 | 0x339f | No error (0) | 185.199.108.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:23.945179939 CET | 1.1.1.1 | 192.168.2.7 | 0x339f | No error (0) | 185.199.110.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:36.566339016 CET | 1.1.1.1 | 192.168.2.7 | 0x3980 | No error (0) | 104.26.1.5 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:36.566339016 CET | 1.1.1.1 | 192.168.2.7 | 0x3980 | No error (0) | 104.26.0.5 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:36.566339016 CET | 1.1.1.1 | 192.168.2.7 | 0x3980 | No error (0) | 172.67.72.57 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:53.717130899 CET | 1.1.1.1 | 192.168.2.7 | 0xfff2 | No error (0) | 104.26.1.5 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:53.717130899 CET | 1.1.1.1 | 192.168.2.7 | 0xfff2 | No error (0) | 172.67.72.57 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 10:57:53.717130899 CET | 1.1.1.1 | 192.168.2.7 | 0xfff2 | No error (0) | 104.26.0.5 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49707 | 142.44.215.161 | 443 | 3308 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 09:57:23 UTC | 68 | OUT | |
2024-11-29 09:57:23 UTC | 188 | IN | |
2024-11-29 09:57:23 UTC | 13 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.7 | 49713 | 185.199.109.133 | 443 | 3308 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 09:57:25 UTC | 125 | OUT | |
2024-11-29 09:57:25 UTC | 897 | IN | |
2024-11-29 09:57:25 UTC | 1378 | IN | |
2024-11-29 09:57:25 UTC | 1378 | IN | |
2024-11-29 09:57:25 UTC | 389 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.7 | 49719 | 185.199.109.133 | 443 | 3308 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 09:57:27 UTC | 129 | OUT | |
2024-11-29 09:57:27 UTC | 897 | IN | |
2024-11-29 09:57:27 UTC | 1275 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.7 | 49725 | 185.199.109.133 | 443 | 3308 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 09:57:29 UTC | 120 | OUT | |
2024-11-29 09:57:29 UTC | 897 | IN | |
2024-11-29 09:57:29 UTC | 1378 | IN | |
2024-11-29 09:57:29 UTC | 1378 | IN | |
2024-11-29 09:57:29 UTC | 97 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:57:11 |
Start date: | 29/11/2024 |
Path: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff661e50000 |
File size: | 23'243'776 bytes |
MD5 hash: | B8437F2884C33E61FB50C622BB30B90A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 04:57:11 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 06:56:22 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff615480000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 06:56:22 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\certutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff780f00000 |
File size: | 1'651'712 bytes |
MD5 hash: | F17616EC0522FC5633151F7CAA278CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 14 |
Start time: | 06:56:22 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\find.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c8670000 |
File size: | 17'920 bytes |
MD5 hash: | 4BF76A28D31FC73AA9FC970B22D056AF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 15 |
Start time: | 06:56:22 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\find.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c8670000 |
File size: | 17'920 bytes |
MD5 hash: | 4BF76A28D31FC73AA9FC970B22D056AF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 16 |
Start time: | 06:56:24 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff615480000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 17 |
Start time: | 06:56:24 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff615480000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 18 |
Start time: | 06:56:24 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 21 |
Start time: | 06:56:24 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff61c9d0000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |