Windows
Analysis Report
dMFmJxq6oK.exe
Overview
General Information
Sample name: | dMFmJxq6oK.exerenamed because original name is a hash value |
Original sample name: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d.exe |
Analysis ID: | 1565144 |
MD5: | b8437f2884c33e61fb50c622bb30b90a |
SHA1: | b2c2f68bbb403e8bb0d5528673526ae5ce16bbf7 |
SHA256: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d |
Tags: | exevirustotal-vm-blacklistuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- dMFmJxq6oK.exe (PID: 7444 cmdline:
"C:\Users\ user\Deskt op\dMFmJxq 6oK.exe" MD5: B8437F2884C33E61FB50C622BB30B90A) - conhost.exe (PID: 7452 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7736 cmdline:
C:\Windows \system32\ cmd.exe /c certutil -hashfile "C:\Users\ user\Deskt op\dMFmJxq 6oK.exe" M D5 | find /i /v "md5 " | find / i /v "cert util" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - certutil.exe (PID: 7752 cmdline:
certutil - hashfile " C:\Users\u ser\Deskto p\dMFmJxq6 oK.exe" MD 5 MD5: F17616EC0522FC5633151F7CAA278CAA) - find.exe (PID: 7760 cmdline:
find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - find.exe (PID: 7776 cmdline:
find /i /v "certutil " MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - cmd.exe (PID: 7840 cmdline:
C:\Windows \system32\ cmd.exe /c start cmd /C \"colo r b && tit le Error & & echo SSL connect e rror && ti meout /t 5 " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 7856 cmdline:
cmd /C \"c olor b && title Erro r && echo SSL connec t error && timeout / t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WerFault.exe (PID: 7964 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 7 444 -s 199 6 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-29T11:02:33.847091+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49730 | 142.44.215.161 | 443 | TCP |
2024-11-29T11:02:35.848968+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49731 | 185.199.109.133 | 443 | TCP |
2024-11-29T11:02:37.616823+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49732 | 185.199.109.133 | 443 | TCP |
2024-11-29T11:02:39.464399+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49733 | 185.199.109.133 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Binary or memory string: | memstr_4a887c95-0 |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Special instruction interceptor: |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior |
Source: | Handle closed: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | 1 Credential API Hooking | 311 Security Software Discovery | Remote Services | 1 Credential API Hooking | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 11 Virtualization/Sandbox Evasion | LSASS Memory | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 11 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Abuse Elevation Control Mechanism | NTDS | 1 System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 12 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Win64.Trojan.SpyLoader | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
keyauth.win | 104.26.0.5 | true | false | high | |
raw.githubusercontent.com | 185.199.109.133 | true | false | high | |
wtfismyip.com | 142.44.215.161 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.199.109.133 | raw.githubusercontent.com | Netherlands | 54113 | FASTLYUS | false | |
104.26.0.5 | keyauth.win | United States | 13335 | CLOUDFLARENETUS | false | |
142.44.215.161 | wtfismyip.com | Canada | 16276 | OVHFR | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1565144 |
Start date and time: | 2024-11-29 11:01:31 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | dMFmJxq6oK.exerenamed because original name is a hash value |
Original Sample Name: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d.exe |
Detection: | MAL |
Classification: | mal76.evad.winEXE@16/4@3/4 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: dMFmJxq6oK.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.199.109.133 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Metasploit | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
104.26.0.5 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
raw.githubusercontent.com | Get hash | malicious | AveMaria, KeyLogger, Stealerium | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Stealerium | Browse |
| ||
Get hash | malicious | RDPWrap Tool, Ducktail | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
keyauth.win | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
wtfismyip.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Discord Token Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ades Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Discord Token Stealer | Browse |
| ||
Get hash | malicious | Discord Token Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
OVHFR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
FASTLYUS | Get hash | malicious | AveMaria, KeyLogger, Stealerium | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Stealerium | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | GiftCardfraud | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | AveMaria, KeyLogger, Stealerium | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | GiftCardfraud | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ce5f3254611a8c095a3d821d44539877 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | AveMaria, KeyLogger, Stealerium | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Nymaim, Stealc, Vidar | Browse |
|
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13 |
Entropy (8bit): | 2.8150724101159437 |
Encrypted: | false |
SSDEEP: | 3:fuMNn:2Sn |
MD5: | CD82C1BDF4F1EFF2514B0854C56FDC9F |
SHA1: | 8DBCF930D9A1A5F07FC911BD7321F7D8F1A1CA63 |
SHA-256: | FCB978959992DB1BEBFDE3B6DE3B7D48C5D4DBF1E127EB65BA59F4C60E8FB74A |
SHA-512: | 175D83C16526EBACD1BAB0FE0BEB1E9B74BB66D97CE12CB666B5B88B87C4F2ABADB24A7A1E7F49015B462A4B6B68E68253BBE0C20176474D7661DB38E0F1F06E |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\pc_username_list[1].txt
Download File
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1275 |
Entropy (8bit): | 5.686349299485424 |
Encrypted: | false |
SSDEEP: | 24:8YGEgnRyOQWvFyIDrVgaQ9d0zdRExKU8lN9iyqrVvX9OADV10OKMIVBtK8g0n:rGEgnRyxqZG/9d0zSEJiyqrRLloztPg0 |
MD5: | 1D67516CC29BB3DD51B882AD9E82CD2E |
SHA1: | 267E80B9E0AA1982838238B67765BD840F7C788B |
SHA-256: | F411221BF6E51E6DEB4E8D5CDC7E2E1BA4BBB3868DA5BB1BC0C29A3A3A02D0A7 |
SHA-512: | 25D6D92314F59C3EDE98E7D485AEDAAC09D0B2781D6DBAEF3B9D003FAA838BE47249A14163652BD46A18DAB951DC22A1BDC463BB4973B8F66359AB4CDE4AEE35 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2853 |
Entropy (8bit): | 3.3945039648831856 |
Encrypted: | false |
SSDEEP: | 48:2vt2vs73cVl4me/JKu9aZ7FFdN9zCFg5+6Dqq0Ya80LyRWdOLxLzafFpjn0gRnNv:xs73dnwFFdN9zCFg5+6Dqq0LLyRWYI5h |
MD5: | 72F58A060B3A9FCD37F2655B5A301A05 |
SHA1: | 56BD712358C08145603D50BE9D491F8B5A6B78EB |
SHA-256: | B6669E5822A7433EA0EEE9FC26A125F8CEA6379B0799D5EEA8C363E16DC7125B |
SHA-512: | 56A0ECA0F52D9781B8A778CA0A341679E988DB66921918623BC0DB46B0C980EFABE1F6D44ADC17ACA6325D2D71D0253BC3926F7B73E4051CD64A35DCB97D08D1 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\pc_name_list[1].txt
Download File
Process: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3145 |
Entropy (8bit): | 4.991276116977138 |
Encrypted: | false |
SSDEEP: | 96:oiDjZkeTuUruqwyZdrRnSpG5lr8druckP:oiDjZkeT7qqwyZdrRn/5lKrkP |
MD5: | DD8E526AEA8FD5CBE26E02ABFB61104C |
SHA1: | B2EA96BB16DA297B34DF121A5A59FDB5D9905351 |
SHA-256: | C4FACF7ECA009951F63280521105C4EFE7359CA7D8036B714B6A9597EDF7402D |
SHA-512: | 5552BD4E05BE02E47A2B3FEFF6120BF57E598D11550FB674D4A2CBAFC7C97DB3B0D88AECA5C14FBA6889A5D5CBCB93511D86CB1592774AFAED11B01BF1E096EC |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.975522767060179 |
TrID: |
|
File name: | dMFmJxq6oK.exe |
File size: | 23'243'776 bytes |
MD5: | b8437f2884c33e61fb50c622bb30b90a |
SHA1: | b2c2f68bbb403e8bb0d5528673526ae5ce16bbf7 |
SHA256: | 07dc6a075721aed972aa0c19e2b4ec5aebd9d56650136b6c7956a95857ca244d |
SHA512: | 64993908ff7ba2c3ac4e4e34e6b69950270399356fe13bbe4e9aa894efc21b2949a9fe7d42c658f4ee5ab7b4af6f1dbeab97b846515f5bfcfbeed7c5dfd014cf |
SSDEEP: | 393216:wBiLN/Rdx34bymzUY7kIJA2YX3uShzl/o8RXDp8fJuOZL//rf6fJNdVs:SeX8pDYX31A60JuOZL/Df6f52 |
TLSH: | 743733B22AE611F4F3EBCF20D5C6B258E1A977C74AB8F44F29C409425A50DDACC05E67 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...,c.e.........."....&.......................@.............................P|...........`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x14119dd93 |
Entrypoint Section: | .beatwar |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6593632C [Tue Jan 2 01:13:16 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | bd983510c1a76cf49b3d859806b034d1 |
Instruction |
---|
push ebp |
pushfd |
dec eax |
mov ebp, A32AC11Ah |
mov dword ptr [ebx-1A3E386Dh], ecx |
retn ED2Bh |
call 00007FC8C9DF6CD3h |
aaa |
push ecx |
mov ah, 70h |
sbb byte ptr [edx+40B0FF84h], 00000041h |
add byte ptr [edi+3E3AE004h], al |
pop edx |
je 00007FC8C8B5F78Eh |
fbstp [eax] |
sub al, 00h |
jle 00007FC8C8B5F794h |
sub dh, byte ptr [edi] |
inc ecx |
dec byte ptr [esi] |
adc al, F9h |
or ebx, dword ptr [ebx-5FFC60AEh] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2471d40 | 0x244 | .beatwar |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x27c4000 | 0x1e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x27ba300 | 0x8c04 | .beatwar |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x27c3000 | 0x11c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x1234f28 | 0x28 | .beatwar |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x27ba1c0 | 0x140 | .beatwar |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1198000 | 0x1e8 | .beatwar |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xb8c5c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xba000 | 0x234a8 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xde000 | 0x40270 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x11f000 | 0x6114 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.beatwar | 0x126000 | 0x1071f8d | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.beatwar | 0x1198000 | 0x13e8 | 0x1400 | adc00d38c138b97eca8f8987cc88824c | False | 0.0404296875 | data | 0.3130265279645761 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.beatwar | 0x119a000 | 0x1628f04 | 0x1629000 | 3efec529b202a077840601f198de1b9e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x27c3000 | 0x11c | 0x200 | 007215ccc256724f5e4b0ac4591aef39 | False | 0.40625 | data | 2.691173783288699 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x27c4000 | 0x1e0 | 0x200 | 843f83318fe1e44e5e03a74a86f08715 | False | 0.537109375 | data | 4.787901013849104 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x27c4058 | 0x188 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5892857142857143 |
DLL | Import |
---|---|
KERNEL32.dll | GetFileSize |
USER32.dll | GetDesktopWindow |
ADVAPI32.dll | CryptEncrypt |
MSVCP140.dll | ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ |
ntdll.dll | VerSetConditionMask |
WININET.dll | InternetReadFile |
PSAPI.DLL | GetModuleInformation |
Normaliz.dll | IdnToAscii |
WLDAP32.dll | |
CRYPT32.dll | CertEnumCertificatesInStore |
WS2_32.dll | WSAIoctl |
RPCRT4.dll | UuidToStringA |
USERENV.dll | UnloadUserProfile |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
VCRUNTIME140.dll | strstr |
api-ms-win-crt-stdio-l1-1-0.dll | fgetpos |
api-ms-win-crt-heap-l1-1-0.dll | _set_new_mode |
api-ms-win-crt-runtime-l1-1-0.dll | _initterm_e |
api-ms-win-crt-time-l1-1-0.dll | _difftime64 |
api-ms-win-crt-string-l1-1-0.dll | strncpy |
api-ms-win-crt-utility-l1-1-0.dll | rand |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-convert-l1-1-0.dll | strtod |
api-ms-win-crt-filesystem-l1-1-0.dll | _unlock_file |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
KERNEL32.dll | GetSystemTimeAsFileTime |
KERNEL32.dll | HeapAlloc, HeapFree, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-29T11:02:33.847091+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49730 | 142.44.215.161 | 443 | TCP |
2024-11-29T11:02:35.848968+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49731 | 185.199.109.133 | 443 | TCP |
2024-11-29T11:02:37.616823+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49732 | 185.199.109.133 | 443 | TCP |
2024-11-29T11:02:39.464399+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49733 | 185.199.109.133 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 29, 2024 11:02:32.070966005 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:32.071024895 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:32.071125031 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:32.082741022 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:32.082753897 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:33.371684074 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:33.371813059 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:33.474672079 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:33.474710941 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:33.475281954 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:33.475341082 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:33.514281034 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:33.559344053 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:33.847137928 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:33.847238064 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:33.847292900 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:33.847332001 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:33.848352909 CET | 49730 | 443 | 192.168.2.4 | 142.44.215.161 |
Nov 29, 2024 11:02:33.848376036 CET | 443 | 49730 | 142.44.215.161 | 192.168.2.4 |
Nov 29, 2024 11:02:34.000916004 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:34.000986099 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:34.001095057 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:34.001465082 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:34.001481056 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.306829929 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.306930065 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.311382055 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.311398029 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.311660051 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.311723948 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.312058926 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.355377913 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.848975897 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.849047899 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.849119902 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.849168062 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.849843979 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.849905014 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.849919081 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.849965096 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.849970102 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.850001097 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.850017071 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.850056887 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.850109100 CET | 49731 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.850126982 CET | 443 | 49731 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.855300903 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.855345011 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:35.855424881 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.855609894 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:35.855622053 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.156143904 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.156234980 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.157109022 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.157136917 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.157315016 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.157326937 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.616846085 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.617011070 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.617026091 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.617039919 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.617104053 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.617805958 CET | 49732 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.617819071 CET | 443 | 49732 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.623949051 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.623987913 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:37.624079943 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.624341011 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:37.624355078 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:38.925024033 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:38.925101042 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:38.925542116 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:38.925553083 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:38.925729036 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:38.925734043 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:39.464417934 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:39.464520931 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:39.464550018 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:39.464600086 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:39.465213060 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:39.465260029 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:39.465265989 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:39.465301037 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:39.465316057 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:39.465352058 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:39.492362976 CET | 49733 | 443 | 192.168.2.4 | 185.199.109.133 |
Nov 29, 2024 11:02:39.492400885 CET | 443 | 49733 | 185.199.109.133 | 192.168.2.4 |
Nov 29, 2024 11:02:43.908363104 CET | 49740 | 443 | 192.168.2.4 | 104.26.0.5 |
Nov 29, 2024 11:02:43.908401966 CET | 443 | 49740 | 104.26.0.5 | 192.168.2.4 |
Nov 29, 2024 11:02:43.908482075 CET | 49740 | 443 | 192.168.2.4 | 104.26.0.5 |
Nov 29, 2024 11:02:43.909532070 CET | 49740 | 443 | 192.168.2.4 | 104.26.0.5 |
Nov 29, 2024 11:02:43.909545898 CET | 443 | 49740 | 104.26.0.5 | 192.168.2.4 |
Nov 29, 2024 11:02:45.129311085 CET | 443 | 49740 | 104.26.0.5 | 192.168.2.4 |
Nov 29, 2024 11:02:45.129453897 CET | 49740 | 443 | 192.168.2.4 | 104.26.0.5 |
Nov 29, 2024 11:02:45.208894014 CET | 49740 | 443 | 192.168.2.4 | 104.26.0.5 |
Nov 29, 2024 11:02:45.208920002 CET | 443 | 49740 | 104.26.0.5 | 192.168.2.4 |
Nov 29, 2024 11:02:45.209022045 CET | 49740 | 443 | 192.168.2.4 | 104.26.0.5 |
Nov 29, 2024 11:02:45.209182978 CET | 443 | 49740 | 104.26.0.5 | 192.168.2.4 |
Nov 29, 2024 11:02:45.209244013 CET | 49740 | 443 | 192.168.2.4 | 104.26.0.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 29, 2024 11:02:31.658500910 CET | 59524 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 29, 2024 11:02:32.054470062 CET | 53 | 59524 | 1.1.1.1 | 192.168.2.4 |
Nov 29, 2024 11:02:33.858995914 CET | 65206 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 29, 2024 11:02:34.000010014 CET | 53 | 65206 | 1.1.1.1 | 192.168.2.4 |
Nov 29, 2024 11:02:43.758725882 CET | 62476 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 29, 2024 11:02:43.906097889 CET | 53 | 62476 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 29, 2024 11:02:31.658500910 CET | 192.168.2.4 | 1.1.1.1 | 0xb6ea | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 29, 2024 11:02:33.858995914 CET | 192.168.2.4 | 1.1.1.1 | 0x6818 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 29, 2024 11:02:43.758725882 CET | 192.168.2.4 | 1.1.1.1 | 0xb630 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 29, 2024 11:02:32.054470062 CET | 1.1.1.1 | 192.168.2.4 | 0xb6ea | No error (0) | 142.44.215.161 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 11:02:34.000010014 CET | 1.1.1.1 | 192.168.2.4 | 0x6818 | No error (0) | 185.199.109.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 11:02:34.000010014 CET | 1.1.1.1 | 192.168.2.4 | 0x6818 | No error (0) | 185.199.108.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 11:02:34.000010014 CET | 1.1.1.1 | 192.168.2.4 | 0x6818 | No error (0) | 185.199.110.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 11:02:34.000010014 CET | 1.1.1.1 | 192.168.2.4 | 0x6818 | No error (0) | 185.199.111.133 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 11:02:43.906097889 CET | 1.1.1.1 | 192.168.2.4 | 0xb630 | No error (0) | 104.26.0.5 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 11:02:43.906097889 CET | 1.1.1.1 | 192.168.2.4 | 0xb630 | No error (0) | 104.26.1.5 | A (IP address) | IN (0x0001) | false | ||
Nov 29, 2024 11:02:43.906097889 CET | 1.1.1.1 | 192.168.2.4 | 0xb630 | No error (0) | 172.67.72.57 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 142.44.215.161 | 443 | 7444 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 10:02:33 UTC | 68 | OUT | |
2024-11-29 10:02:33 UTC | 188 | IN | |
2024-11-29 10:02:33 UTC | 13 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 185.199.109.133 | 443 | 7444 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 10:02:35 UTC | 125 | OUT | |
2024-11-29 10:02:35 UTC | 897 | IN | |
2024-11-29 10:02:35 UTC | 1378 | IN | |
2024-11-29 10:02:35 UTC | 1378 | IN | |
2024-11-29 10:02:35 UTC | 389 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 185.199.109.133 | 443 | 7444 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 10:02:37 UTC | 129 | OUT | |
2024-11-29 10:02:37 UTC | 896 | IN | |
2024-11-29 10:02:37 UTC | 1275 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 185.199.109.133 | 443 | 7444 | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-29 10:02:38 UTC | 120 | OUT | |
2024-11-29 10:02:39 UTC | 897 | IN | |
2024-11-29 10:02:39 UTC | 1378 | IN | |
2024-11-29 10:02:39 UTC | 1378 | IN | |
2024-11-29 10:02:39 UTC | 97 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:02:24 |
Start date: | 29/11/2024 |
Path: | C:\Users\user\Desktop\dMFmJxq6oK.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c1070000 |
File size: | 23'243'776 bytes |
MD5 hash: | B8437F2884C33E61FB50C622BB30B90A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 05:02:24 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 05:02:42 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c8610000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 05:02:42 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\certutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6abca0000 |
File size: | 1'651'712 bytes |
MD5 hash: | F17616EC0522FC5633151F7CAA278CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 05:02:42 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\find.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6cdae0000 |
File size: | 17'920 bytes |
MD5 hash: | 4BF76A28D31FC73AA9FC970B22D056AF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 05:02:42 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\find.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6cdae0000 |
File size: | 17'920 bytes |
MD5 hash: | 4BF76A28D31FC73AA9FC970B22D056AF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 7 |
Start time: | 05:02:44 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c8610000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 05:02:44 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c8610000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 05:02:44 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 05:02:45 |
Start date: | 29/11/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7016d0000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |