Windows
Analysis Report
173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
Overview
General Information
Sample name: | 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe |
Analysis ID: | 1570019 |
MD5: | ea40e46310163064f9f33ff2fb152364 |
SHA1: | 6f5e20a87fd4b534e112928aff8d655559f6758b |
SHA256: | f9c4ce97de10b00f02f0edc2417e510fdb774243a7a41426ac918c618bb3abac |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe (PID: 1020 cmdline:
"C:\Users\ user\Deskt op\1733490 54689897a4 2ce4a1face 346760a1e1 ea6ee459f1 c43651627f 7c7690c5ad f7c1298500 .dat-decod ed.exe" MD5: EA40E46310163064F9F33FF2FB152364)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"Server": "87.120.116.179", "Ports": "1500", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "wpaFxIcglMLADiogibPnifaeFDBMwMuF", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "BeuIAVEwZRflCChxbBouOkU4PHb82EjrnChy5tY9ZLUF9209+gb1OdfbM3LYzyzrwVJ2FuUrNib1mzMhYhPzzV5qj4NZWUFFWChE+8RScndJABLhzP86T9S8dw2xlnrMCojFUlu4HV4DwsBjHso4WQ/rQSHfAWYDO1D1ALcsJK4=", "BDOS": "null", "External_config_on_Pastebin": "false"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF848F430E5 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF848F43F29 | |
Source: | Code function: | 0_2_00007FF848F400C1 |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 2 Virtualization/Sandbox Evasion | OS Credential Dumping | 111 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 13 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | ReversingLabs | ByteCode-MSIL.Backdoor.AsyncRAT | ||
100% | Avira | HEUR/AGEN.1307404 | ||
100% | Joe Sandbox ML |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
87.120.116.179 | unknown | Bulgaria | 25206 | UNACS-AS-BG8000BurgasBG | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1570019 |
Start date and time: | 2024-12-06 14:14:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 50s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/0@0/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- VT rate limit hit for: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
87.120.116.179 | Get hash | malicious | XWorm | Browse | ||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
UNACS-AS-BG8000BurgasBG | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XenoRAT | Browse |
| ||
Get hash | malicious | XenoRAT | Browse |
| ||
Get hash | malicious | Amadey, AsyncRAT, Stealc, Vidar | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 5.616671765821841 |
TrID: |
|
File name: | 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe |
File size: | 48'640 bytes |
MD5: | ea40e46310163064f9f33ff2fb152364 |
SHA1: | 6f5e20a87fd4b534e112928aff8d655559f6758b |
SHA256: | f9c4ce97de10b00f02f0edc2417e510fdb774243a7a41426ac918c618bb3abac |
SHA512: | 59d090807eb27afdab1aa8ca0d831efa0917cab9ad38ed662bb29c50bfc826877ea2453ef917656af74334edb911d27fa1a0ee9feb4d6739c573c185710bee7c |
SSDEEP: | 768:dOEuILWCKi+DiBtelDSN+iV08YbygeKNWap+vEgK/J9lZVc6KN:dOtmBtKDs4zb1fNWRnkJ3ZVclN |
TLSH: | 9D235C4037E88136E2FD4BB8ADF2A54186B9D2676903C6596CC814EA1F13BC596036FE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40cb8e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60930A0B [Wed May 5 21:11:39 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcb3c | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0xdf7 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xab94 | 0xac00 | 855a9fc8bff2f2b21410de51229f1930 | False | 0.5017033066860465 | data | 5.64159433302446 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0xdf7 | 0xe00 | 2083376922615c09cdda9acfd9305376 | False | 0.4017857142857143 | data | 5.110607648061562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | d2892f5e6b6d9366633263ebc642dea3 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2d4 | data | 0.4350828729281768 | ||
RT_MANIFEST | 0xe374 | 0xa83 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.40245261984392416 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 6, 2024 14:15:08.715178013 CET | 49704 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:08.835129976 CET | 1500 | 49704 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:08.835247993 CET | 49704 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:08.856750965 CET | 49704 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:08.976443052 CET | 1500 | 49704 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:10.986429930 CET | 1500 | 49704 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:10.986510038 CET | 49704 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:16.025044918 CET | 49704 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:16.029709101 CET | 49705 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:16.144978046 CET | 1500 | 49704 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:16.149573088 CET | 1500 | 49705 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:16.149671078 CET | 49705 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:16.150186062 CET | 49705 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:16.269970894 CET | 1500 | 49705 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:18.295732975 CET | 1500 | 49705 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:18.295856953 CET | 49705 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:23.309282064 CET | 49705 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:23.310065031 CET | 49706 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:23.429577112 CET | 1500 | 49705 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:23.430192947 CET | 1500 | 49706 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:23.430310965 CET | 49706 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:23.430741072 CET | 49706 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:23.550492048 CET | 1500 | 49706 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:25.561389923 CET | 1500 | 49706 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:25.561480045 CET | 49706 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:30.576113939 CET | 49706 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:30.576585054 CET | 49717 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:30.695954084 CET | 1500 | 49706 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:30.696307898 CET | 1500 | 49717 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:30.696386099 CET | 49717 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:30.701807022 CET | 49717 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:30.821656942 CET | 1500 | 49717 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:32.826926947 CET | 1500 | 49717 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:32.827115059 CET | 49717 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:37.840423107 CET | 49717 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:37.840828896 CET | 49738 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:37.960316896 CET | 1500 | 49717 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:37.960616112 CET | 1500 | 49738 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:37.960736036 CET | 49738 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:37.965111017 CET | 49738 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:38.085037947 CET | 1500 | 49738 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:40.112360954 CET | 1500 | 49738 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:40.112462044 CET | 49738 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:45.121716976 CET | 49738 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:45.122123957 CET | 49754 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:45.241482019 CET | 1500 | 49738 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:45.241879940 CET | 1500 | 49754 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:45.241971970 CET | 49754 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:45.243891001 CET | 49754 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:45.363610983 CET | 1500 | 49754 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:47.395306110 CET | 1500 | 49754 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:47.395385027 CET | 49754 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:52.402925014 CET | 49754 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:52.403410912 CET | 49770 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:52.524281979 CET | 1500 | 49754 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:52.524761915 CET | 1500 | 49770 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:52.524897099 CET | 49770 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:52.525357962 CET | 49770 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:52.644990921 CET | 1500 | 49770 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:54.666462898 CET | 1500 | 49770 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:54.666676044 CET | 49770 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:59.668471098 CET | 49770 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:59.668840885 CET | 49791 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:59.788295984 CET | 1500 | 49770 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:59.788562059 CET | 1500 | 49791 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:15:59.788655996 CET | 49791 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:59.789105892 CET | 49791 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:15:59.908884048 CET | 1500 | 49791 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:01.940740108 CET | 1500 | 49791 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:01.940885067 CET | 49791 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:06.950032949 CET | 49791 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:06.950517893 CET | 49808 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:07.069863081 CET | 1500 | 49791 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:07.070238113 CET | 1500 | 49808 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:07.070348024 CET | 49808 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:07.070821047 CET | 49808 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:07.190522909 CET | 1500 | 49808 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:09.222117901 CET | 1500 | 49808 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:09.225589991 CET | 49808 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:14.231092930 CET | 49808 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:14.231623888 CET | 49824 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:14.350863934 CET | 1500 | 49808 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:14.351391077 CET | 1500 | 49824 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:14.351496935 CET | 49824 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:14.351847887 CET | 49824 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:14.471544981 CET | 1500 | 49824 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:16.499623060 CET | 1500 | 49824 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:16.499720097 CET | 49824 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:21.512329102 CET | 49824 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:21.512777090 CET | 49845 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:21.632061958 CET | 1500 | 49824 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:21.632551908 CET | 1500 | 49845 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:21.632646084 CET | 49845 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:21.633090973 CET | 49845 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:21.753206968 CET | 1500 | 49845 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:23.784455061 CET | 1500 | 49845 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:23.784524918 CET | 49845 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:28.794080019 CET | 49845 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:28.794547081 CET | 49861 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:28.914011002 CET | 1500 | 49845 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:28.914272070 CET | 1500 | 49861 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:28.914359093 CET | 49861 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:28.914836884 CET | 49861 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:29.034607887 CET | 1500 | 49861 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:31.052269936 CET | 1500 | 49861 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:31.052411079 CET | 49861 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:36.059340000 CET | 49861 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:36.059834003 CET | 49877 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:36.179275990 CET | 1500 | 49861 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:36.179620028 CET | 1500 | 49877 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:36.179749012 CET | 49877 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:36.180074930 CET | 49877 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:36.299757004 CET | 1500 | 49877 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:38.347346067 CET | 1500 | 49877 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:38.347497940 CET | 49877 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:43.356386900 CET | 49877 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:43.356767893 CET | 49898 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:43.476129055 CET | 1500 | 49877 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:43.476452112 CET | 1500 | 49898 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:43.476579905 CET | 49898 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:43.477005005 CET | 49898 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:43.596685886 CET | 1500 | 49898 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:45.610059023 CET | 1500 | 49898 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:45.610200882 CET | 49898 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:50.621819973 CET | 49898 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:50.622208118 CET | 49914 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:50.741753101 CET | 1500 | 49898 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:50.741904020 CET | 1500 | 49914 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:50.742053032 CET | 49914 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:50.742546082 CET | 49914 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:50.862282038 CET | 1500 | 49914 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:52.878922939 CET | 1500 | 49914 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:52.879049063 CET | 49914 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:57.887226105 CET | 49914 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:57.887609005 CET | 49930 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:58.007325888 CET | 1500 | 49914 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:58.007484913 CET | 1500 | 49930 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:16:58.007560968 CET | 49930 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:58.008033037 CET | 49930 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:16:58.127768993 CET | 1500 | 49930 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:17:00.125433922 CET | 1500 | 49930 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:17:00.125585079 CET | 49930 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:17:05.137403965 CET | 49930 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:17:05.137805939 CET | 49947 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:17:05.258318901 CET | 1500 | 49930 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:17:05.258661985 CET | 1500 | 49947 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:17:05.258774042 CET | 49947 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:17:05.259234905 CET | 49947 | 1500 | 192.168.2.5 | 87.120.116.179 |
Dec 6, 2024 14:17:05.378891945 CET | 1500 | 49947 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:17:07.394742966 CET | 1500 | 49947 | 87.120.116.179 | 192.168.2.5 |
Dec 6, 2024 14:17:07.394857883 CET | 49947 | 1500 | 192.168.2.5 | 87.120.116.179 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 08:15:05 |
Start date: | 06/12/2024 |
Path: | C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x700000 |
File size: | 48'640 bytes |
MD5 hash: | EA40E46310163064F9F33FF2FB152364 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 24% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|