Windows
Analysis Report
1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
Overview
General Information
Sample name: | 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe |
Analysis ID: | 1572736 |
MD5: | 54af7dde5c98e20089ae4a5dc295cb32 |
SHA1: | d7affca6008365f9e8c48ed22847f98d97781738 |
SHA256: | c66fdb0e04d7bee6ac4513956d1cf5f9fc21e27cad0d32bbc7906ff4440ed2e9 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe (PID: 4580 cmdline:
"C:\Users\ user\Deskt op\1733858 044dd572d6 6bc3a8dabf e408fb29ad 3eddb6c690 affcab2d50 d59673d001 9848271178 .dat-decod ed.exe" MD5: 54AF7DDE5C98E20089AE4A5DC295CB32)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"Server": "dcrsf.duckdns.org", "Ports": "5999", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "DXHnpqvTVbV4bhEh6LUz5f6sS1braVIP", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "bOH4+nkkOuFt62yM3B3NrX5jCy5PJU3D72L179e0uKevKDfMJUljcwbS8epgem8pE2v7bumGCks5hNJ6yaqqRhVVc/7YrRk3B1yFueVgPNQJL+NYnbEAIIc94f2NV1IzZ0YUw9+iDwAWiK8vp8Zvjop2yuTCnm+vvjUom3TYAoU=", "BDOS": "null", "External_config_on_Pastebin": "false"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_DcRat_2 | Yara detected DcRat | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T20:16:03.387892+0100 | 2034847 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 5999 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T20:16:03.387892+0100 | 2842478 | 1 | Malware Command and Control Activity Detected | 45.135.232.38 | 5999 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T20:16:03.387892+0100 | 2848048 | 1 | Domain Observed Used for C2 Detected | 45.135.232.38 | 5999 | 192.168.2.5 | 49704 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF848E78346 | |
Source: | Code function: | 0_2_00007FF848E790F2 | |
Source: | Code function: | 0_2_00007FF848E730E2 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF848E700C1 |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 Scheduled Task/Job | 1 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 31 Virtualization/Sandbox Evasion | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Native API | Logon Script (Windows) | 1 DLL Side-Loading | 1 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Obfuscated Files or Information | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 21 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | ReversingLabs | ByteCode-MSIL.Backdoor.AsyncRAT | ||
100% | Avira | HEUR/AGEN.1307404 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false | high | |
dcrsf.duckdns.org | 45.135.232.38 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.135.232.38 | dcrsf.duckdns.org | Russian Federation | 49392 | ASBAXETNRU | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1572736 |
Start date and time: | 2024-12-10 20:15:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/2@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 23.193.114.26, 23.193.114.18, 52.149.20.212, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
Time | Type | Description |
---|---|---|
14:16:05 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.135.232.38 | Get hash | malicious | Remcos | Browse | ||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bg.microsoft.map.fastly.net | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ASBAXETNRU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.144086598890895 |
Encrypted: | false |
SSDEEP: | 6:kKaaL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:BiDnLNkPlE99SNxAhUe/3 |
MD5: | B251F79C5942E6DFA5AD6BBF8DF9B703 |
SHA1: | F710D85FC7B1BF92765B752EC317B927F63B50D8 |
SHA-256: | 1D2CBEE4ADF7A4C606AF5FC974F2EB78810440EDD001AD3251B5414D103F43A1 |
SHA-512: | 3D2939491C55741F13316922CDC55CD1C7146DD85AB78C92EBDCABE3BECFD61D4EAC8BFFD143CFFBDD2C1975D9AF5DC0F41A5AA47A88E781903909BA902CA53D |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.6204762789751666 |
TrID: |
|
File name: | 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe |
File size: | 48'640 bytes |
MD5: | 54af7dde5c98e20089ae4a5dc295cb32 |
SHA1: | d7affca6008365f9e8c48ed22847f98d97781738 |
SHA256: | c66fdb0e04d7bee6ac4513956d1cf5f9fc21e27cad0d32bbc7906ff4440ed2e9 |
SHA512: | c2fa8350cdaa1ba19da3bea5c6ef2a90b6cce3f6a9618483cebaf83c4ed47a1dd90aa5a4708ee31fe35a13ef991aa4d66fa3858497bda3d61a8ba1d5c9a52352 |
SSDEEP: | 768:xGq+s3pUtDILNCCa+Di+0jd3gLqRp8AoPiIiYbrge4k6kNaioVFIJ5vEgK/JLZVS:8q+AGtQO+GaPAKBbUkN8C5nkJLZVclN |
TLSH: | B5237E0037E9C136E2FD4BB4A8F2924582B9D66B6903DB596CC411EA1F13BC597036FE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40cbbe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60930A0B [Wed May 5 21:11:39 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcb68 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0xdf7 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xabc4 | 0xac00 | d1321a55bfb633435ca6ed2a56b2550e | False | 0.5023846293604651 | data | 5.646251060684921 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0xdf7 | 0xe00 | 2083376922615c09cdda9acfd9305376 | False | 0.4017857142857143 | data | 5.110607648061562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 82148d01c3935cf90ef81a3dd1fad607 | False | 0.044921875 | data | 0.07763316234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2d4 | data | 0.4350828729281768 | ||
RT_MANIFEST | 0xe374 | 0xa83 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.40245261984392416 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T20:16:03.387892+0100 | 2842478 | ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) | 1 | 45.135.232.38 | 5999 | 192.168.2.5 | 49704 | TCP |
2024-12-10T20:16:03.387892+0100 | 2034847 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 5999 | 192.168.2.5 | 49704 | TCP |
2024-12-10T20:16:03.387892+0100 | 2848048 | ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT) | 1 | 45.135.232.38 | 5999 | 192.168.2.5 | 49704 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 10, 2024 20:16:01.802001953 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:01.922418118 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:01.922518969 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:01.943928957 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:02.067188025 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:03.256216049 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:03.266293049 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:03.387892008 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:03.706769943 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:03.759587049 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:06.827230930 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:06.953440905 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:06.953500986 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:07.073065042 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:15.411967039 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:15.462788105 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:15.615587950 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:15.665858984 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:17.996289968 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:18.116497993 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:18.116588116 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:18.237580061 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:18.601259947 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:18.650227070 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:18.790946960 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:18.800122976 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:18.919531107 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:18.919594049 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:19.039717913 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:29.166645050 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:29.288120031 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:29.288168907 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:29.407548904 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:29.767936945 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:29.822137117 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:29.959809065 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:29.961548090 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:30.080857038 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:30.080926895 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:30.201452971 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:40.338366985 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:40.458393097 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:40.458451986 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:40.578392982 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:40.939496040 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:40.994005919 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:41.131176949 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:41.132734060 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:41.257961988 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:41.258048058 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:41.384761095 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:45.412847042 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:45.462733984 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:45.604840040 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:45.650233984 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:51.510117054 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:51.629745007 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:51.629852057 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:51.749413013 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:52.111699104 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:52.165877104 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:52.303086042 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:52.304716110 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:52.425376892 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:16:52.425467014 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:16:52.545461893 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:02.681998968 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:02.802885056 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:02.802946091 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:02.924954891 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:03.322424889 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:03.368997097 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:03.540584087 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:03.551318884 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:03.675327063 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:03.675411940 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:03.802160978 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:13.857110023 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:13.982580900 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:13.982640982 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:14.106453896 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:14.466368914 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:14.525315046 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:14.657773972 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:14.663151026 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:14.785814047 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:14.785924911 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:14.907242060 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:15.417395115 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:15.462768078 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:15.606928110 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:15.650268078 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:25.046766996 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:25.172135115 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:25.172214031 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:25.295485973 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:25.654552937 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:25.697191000 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:25.846483946 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:25.848222971 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:26.019962072 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:26.020045042 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:26.147808075 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:36.197582960 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:36.330612898 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:36.330672979 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:36.495647907 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:36.812256098 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:36.853518963 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:37.004226923 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:37.006690979 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:37.130260944 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:37.130321980 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:37.256381035 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:45.417232990 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:45.462809086 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:45.609090090 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:45.650312901 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:47.369676113 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:47.489237070 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:47.489293098 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:47.611387968 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:48.028755903 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:48.072346926 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:48.220537901 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:48.222224951 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:48.422280073 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:48.422398090 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:48.543632984 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:58.541300058 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:58.660885096 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:58.660967112 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:58.782511950 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:59.141976118 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:59.181543112 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:59.333857059 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:59.335422039 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:59.454721928 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:17:59.454781055 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:17:59.576860905 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:18:04.728861094 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:18:04.856704950 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:18:04.856760025 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:18:04.976571083 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:18:05.338068008 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:18:05.384676933 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Dec 10, 2024 20:18:05.530998945 CET | 5999 | 49704 | 45.135.232.38 | 192.168.2.5 |
Dec 10, 2024 20:18:05.572170973 CET | 49704 | 5999 | 192.168.2.5 | 45.135.232.38 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 10, 2024 20:16:01.456506968 CET | 51399 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 10, 2024 20:16:01.796236992 CET | 53 | 51399 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 10, 2024 20:16:01.456506968 CET | 192.168.2.5 | 1.1.1.1 | 0x46df | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 10, 2024 20:16:01.796236992 CET | 1.1.1.1 | 192.168.2.5 | 0x46df | No error (0) | 45.135.232.38 | A (IP address) | IN (0x0001) | false | ||
Dec 10, 2024 20:16:16.693447113 CET | 1.1.1.1 | 192.168.2.5 | 0xb0da | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Dec 10, 2024 20:16:16.693447113 CET | 1.1.1.1 | 192.168.2.5 | 0xb0da | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 14:15:57 |
Start date: | 10/12/2024 |
Path: | C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7f0000 |
File size: | 48'640 bytes |
MD5 hash: | 54AF7DDE5C98E20089AE4A5DC295CB32 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 22.9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E78346 Relevance: .5, Instructions: 472COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E790F2 Relevance: .5, Instructions: 458COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|