Windows
Analysis Report
SLNA_Updated_Medical_Grant_Application(1).docx
Overview
General Information
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- WINWORD.EXE (PID: 3432 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\WINWOR D.EXE" /Au tomation - Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_OLE_RemoteTemplate | Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents | ditekSHen |
|
System Summary |
---|
Source: | Author: X__Junior (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-13T12:10:43.753717+0100 | 2055129 | 1 | A Network Trojan was detected | 5.255.125.140 | 443 | 192.168.2.22 | 49164 | TCP |
2024-12-13T12:10:52.189469+0100 | 2055129 | 1 | A Network Trojan was detected | 5.255.125.140 | 443 | 192.168.2.22 | 49168 | TCP |
2024-12-13T12:11:04.002228+0100 | 2055129 | 1 | A Network Trojan was detected | 5.255.125.140 | 443 | 192.168.2.22 | 49174 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-13T12:10:43.753705+0100 | 2055081 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49164 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:10:52.188852+0100 | 2055081 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49168 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:11:04.001903+0100 | 2055081 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49174 | 5.255.125.140 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-13T12:10:43.753705+0100 | 2033858 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49164 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:10:52.188852+0100 | 2033858 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49168 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:11:04.001903+0100 | 2033858 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49174 | 5.255.125.140 | 443 | TCP |
Click to jump to signature section
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Word Document stream: |
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | LNK file: |
Source: | Window detected: |
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Persistence and Installation Behavior |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Extracted files from sample: |
Source: | File dump: | Jump to dropped file | ||
Source: | File dump: | Jump to dropped file | ||
Source: | File dump: | Jump to dropped file | ||
Source: | File dump: | Jump to dropped file | ||
Source: | File dump: | Jump to dropped file |
Source: | Section loaded: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 3 Exploitation for Client Execution | Path Interception | Path Interception | 1 Masquerading | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 2 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
defence-lk.military-bd.org | 5.255.125.140 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
5.255.125.140 | defence-lk.military-bd.org | Netherlands | 60404 | LITESERVERNL | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1574549 |
Start date and time: | 2024-12-13 12:09:29 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 1 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SLNA_Updated_Medical_Grant_Application(1).docx |
Detection: | MAL |
Classification: | mal80.evad.winDOCX@1/25@9/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: SLNA_Updated_Medical_Grant_Application(1).docx
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
LITESERVERNL | Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
05af1f5ca1b87cc9cc9b25185115607d | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
7dcce5b76c8b17472d024758970a406b | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | AveMaria, UACMe | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025652728340135468 |
Encrypted: | false |
SSDEEP: | 6:I3DPchx7iQ9vxggLRePBMyJlUB3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPExNyHaBRvYg3J/ |
MD5: | A738A8739E7D77801FDAE223AB567E6F |
SHA1: | F39D557A08A1BD33C15F99AC3D9C96DB5FE6B1D4 |
SHA-256: | E71E8DD02042A088DDC69AA0C105AE13F6C819CA74B4B3F8082B6B8891CA82B0 |
SHA-512: | 980D951C60137D406400066CAED5F871F85C0828E0B36A4BD605797A8EA778C8EE4B5CBC3C9301E2B5FB280567332586EB56B1B79BCBAA451F82DBE181AACBDA |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\Profile[1].rtf
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8 |
Entropy (8bit): | 3.0 |
Encrypted: | false |
SSDEEP: | 3:gOin:qn |
MD5: | 43D35B5B20F491BE219AB2EAA172EC55 |
SHA1: | 1327F20512762A533C22FE181BE3FCDD29AB76FE |
SHA-256: | 1955C6914097477D5141F720C9E8FA44B4FE189E854DA298D85090CBC338B35A |
SHA-512: | A721F07B2AA9C5D723A4B11575A602E94A7973278E62BCB5B54D4A48B5ADF1BBE3945E5250DD0CCDD8B1B683B864F8C8B98B7C160118ED84846DE085EB1D3666 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\Profile[1].rtf
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8 |
Entropy (8bit): | 3.0 |
Encrypted: | false |
SSDEEP: | 3:gOin:qn |
MD5: | 43D35B5B20F491BE219AB2EAA172EC55 |
SHA1: | 1327F20512762A533C22FE181BE3FCDD29AB76FE |
SHA-256: | 1955C6914097477D5141F720C9E8FA44B4FE189E854DA298D85090CBC338B35A |
SHA-512: | A721F07B2AA9C5D723A4B11575A602E94A7973278E62BCB5B54D4A48B5ADF1BBE3945E5250DD0CCDD8B1B683B864F8C8B98B7C160118ED84846DE085EB1D3666 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\141EC1A9.jpg
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 50 |
Entropy (8bit): | 4.46146788019945 |
Encrypted: | false |
SSDEEP: | 3:wcek9LRAlxkAMvtEKb:wJcexJC |
MD5: | A471D39C02EE8428702B468C843C62E3 |
SHA1: | 91E6F53C4DCE4D7822F120DA20A75113E5A7DCED |
SHA-256: | 0C9A8CE9516EDB686FAF2BEE4BD9DC3285207031FE5F2F742ACCF4A525518D8E |
SHA-512: | 806DD530CE299B765554BB6AE827506D63B9D8A24294DF4E827CA8B808894C2B8845009239F80282F522177DE483D95099E74EF797E6F3B15A2B54F92DFFC03B |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\313CC648.rtf
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8 |
Entropy (8bit): | 3.0 |
Encrypted: | false |
SSDEEP: | 3:gOin:qn |
MD5: | 43D35B5B20F491BE219AB2EAA172EC55 |
SHA1: | 1327F20512762A533C22FE181BE3FCDD29AB76FE |
SHA-256: | 1955C6914097477D5141F720C9E8FA44B4FE189E854DA298D85090CBC338B35A |
SHA-512: | A721F07B2AA9C5D723A4B11575A602E94A7973278E62BCB5B54D4A48B5ADF1BBE3945E5250DD0CCDD8B1B683B864F8C8B98B7C160118ED84846DE085EB1D3666 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\66A6FD05.rtf
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8 |
Entropy (8bit): | 3.0 |
Encrypted: | false |
SSDEEP: | 3:gOin:qn |
MD5: | 43D35B5B20F491BE219AB2EAA172EC55 |
SHA1: | 1327F20512762A533C22FE181BE3FCDD29AB76FE |
SHA-256: | 1955C6914097477D5141F720C9E8FA44B4FE189E854DA298D85090CBC338B35A |
SHA-512: | A721F07B2AA9C5D723A4B11575A602E94A7973278E62BCB5B54D4A48B5ADF1BBE3945E5250DD0CCDD8B1B683B864F8C8B98B7C160118ED84846DE085EB1D3666 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\74C7D742.jpg
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 50 |
Entropy (8bit): | 4.46146788019945 |
Encrypted: | false |
SSDEEP: | 3:wcek9LRAlxkAMvtEKb:wJcexJC |
MD5: | A471D39C02EE8428702B468C843C62E3 |
SHA1: | 91E6F53C4DCE4D7822F120DA20A75113E5A7DCED |
SHA-256: | 0C9A8CE9516EDB686FAF2BEE4BD9DC3285207031FE5F2F742ACCF4A525518D8E |
SHA-512: | 806DD530CE299B765554BB6AE827506D63B9D8A24294DF4E827CA8B808894C2B8845009239F80282F522177DE483D95099E74EF797E6F3B15A2B54F92DFFC03B |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E1F7FA9F.rtf
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8 |
Entropy (8bit): | 3.0 |
Encrypted: | false |
SSDEEP: | 3:gOin:qn |
MD5: | 43D35B5B20F491BE219AB2EAA172EC55 |
SHA1: | 1327F20512762A533C22FE181BE3FCDD29AB76FE |
SHA-256: | 1955C6914097477D5141F720C9E8FA44B4FE189E854DA298D85090CBC338B35A |
SHA-512: | A721F07B2AA9C5D723A4B11575A602E94A7973278E62BCB5B54D4A48B5ADF1BBE3945E5250DD0CCDD8B1B683B864F8C8B98B7C160118ED84846DE085EB1D3666 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E29618AA.jpg
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 50 |
Entropy (8bit): | 4.46146788019945 |
Encrypted: | false |
SSDEEP: | 3:wcek9LRAlxkAMvtEKb:wJcexJC |
MD5: | A471D39C02EE8428702B468C843C62E3 |
SHA1: | 91E6F53C4DCE4D7822F120DA20A75113E5A7DCED |
SHA-256: | 0C9A8CE9516EDB686FAF2BEE4BD9DC3285207031FE5F2F742ACCF4A525518D8E |
SHA-512: | 806DD530CE299B765554BB6AE827506D63B9D8A24294DF4E827CA8B808894C2B8845009239F80282F522177DE483D95099E74EF797E6F3B15A2B54F92DFFC03B |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{7B8F8993-2CAB-4ED4-96F6-4F44F9217D9B}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 1.0702375532243473 |
Encrypted: | false |
SSDEEP: | 24:r4gql/SOmaPMvgDMxim1eYaQ5Ov5TzzlVhkvgDMxhvgDMxiZQ:rsBEvgcBaG6Lkvgchvgc/ |
MD5: | B01873C45A5001CC8362A2A82D621883 |
SHA1: | B73B16EE89B47F7DE732DCF6F633D6F5A29CE908 |
SHA-256: | D013493F2B61702F92F48A389CDB16DF34FF1B561BD85EBE617597E520AE3254 |
SHA-512: | CD2CCC980CBF4EEA001D22186DC10F1CE91135A22118C0AD8848998E166AFB91FAD55A0284960916AD58BB0697A79A5C9F9A96D10A64705011E22234639616D2 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6316F4BA-3B9F-4B2D-9F83-93B5CF3E590F}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 9728 |
Entropy (8bit): | 3.931490614375623 |
Encrypted: | false |
SSDEEP: | 96:G/QDGcsU8ehsaMwSBgSVpRIiHPm0NtmF20yTvnqHoM++Fh4LtOWBlMcCnDVEd:PMe2aUwmm0Nt1jqz++Fat/zPCDVEd |
MD5: | 0AD73F3B0A1A1DB151455317FC1714AA |
SHA1: | FA194655B19C2E525A4A9F9FDFAA9A930006224F |
SHA-256: | 4FEAC5E4EE0E90E2CEAADFE8DADF429CFD72A064B71F3FF152D71FFA88F29356 |
SHA-512: | 89504244B2FAEE60BE7C7FBFD8F80B12D94A8790B8ACB934145DFF169E802C7CABD6EBAC25D93B9906DD2D178807879D604E0A3A2C909F5FAA5F62A0C2BC1956 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B41141A1-1342-4534-87E0-085337AD5912}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 663 |
Entropy (8bit): | 5.949125862393289 |
Encrypted: | false |
SSDEEP: | 12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF |
MD5: | ED3C1C40B68BA4F40DB15529D5443DEC |
SHA1: | 831AF99BB64A04617E0A42EA898756F9E0E0BCCA |
SHA-256: | 039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A |
SHA-512: | C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025652728340135468 |
Encrypted: | false |
SSDEEP: | 6:I3DPchx7iQ9vxggLRePBMyJlUB3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPExNyHaBRvYg3J/ |
MD5: | A738A8739E7D77801FDAE223AB567E6F |
SHA1: | F39D557A08A1BD33C15F99AC3D9C96DB5FE6B1D4 |
SHA-256: | E71E8DD02042A088DDC69AA0C105AE13F6C819CA74B4B3F8082B6B8891CA82B0 |
SHA-512: | 980D951C60137D406400066CAED5F871F85C0828E0B36A4BD605797A8EA778C8EE4B5CBC3C9301E2B5FB280567332586EB56B1B79BCBAA451F82DBE181AACBDA |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025723827784860376 |
Encrypted: | false |
SSDEEP: | 6:I3DPcZ0FvxggLRjGxo4Mg/IRXv//4tfnRujlw//+GtluJ/eRuj:I3DPG0pPP4MFvYg3J/ |
MD5: | F0FD508377E25B78444249CDB8505D2D |
SHA1: | FB75C3132468FEBCD7E24B4FF9D4F1B6A0D9D4B4 |
SHA-256: | 2AFD383DC703F33277D10203EFC74D75901340106C673BA5FE5A59EDC62AA90E |
SHA-512: | 0F4F9AE40A9323B52D685C647339CED1568D73EE42793E9577A96CD1F5CEC4EA9C05675FEA778ED4AF12BF3630FA9CB83A948983234AA3348EB84D488E644C1F |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\11d601c6 on defence-lk.military-bd.org.url
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 87 |
Entropy (8bit): | 4.967039725803807 |
Encrypted: | false |
SSDEEP: | 3:HRAbABGQYm2fAbuIMCl69KntnUUn9P:HRYFVm4Aa0l69Cnt |
MD5: | 4F99A9E4BD0C6E6D16C29840AA16BC64 |
SHA1: | 48F695A9145B41B21B796D1EC01F113D9E365052 |
SHA-256: | 5A3495688FE0CA1663B82A8EF4BFA25401564D4AF01A1894F6E181DF0B0EBE03 |
SHA-512: | 704BC6823B507444DA07F5F5EB2B0175C2F3A5B9DD627A94321DBBD13F6536BC470F0D064A455A6AFFF77D0978A5A06CEF5CD7982C61928DA0D70508D65E5A87 |
Malicious: | true |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 98 |
Entropy (8bit): | 4.953383314008324 |
Encrypted: | false |
SSDEEP: | 3:HRAbABGQYm2fAbuIMCl69KntnUUn9aIPDy:HRYFVm4Aa0l69Cn9O |
MD5: | F491B75DE719A5E98E7CF278462F462A |
SHA1: | C4227FA70EDA0FAE7543E98A2A76794A318B5057 |
SHA-256: | FCD4C8EBBF068E792A4A5D3111AB77325DA1C4450E8048D477F1116AC18C8D1B |
SHA-512: | A8F2D03E7E0490378F46488BC4AD9D518A508A656499916D77B8F0C4DE4FDE1B2C36F9C3BF5EE91E626D267ED12D39C54858AFDED8A65F01CF63F4A03201E3A7 |
Malicious: | true |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SLNA_Updated_Medical_Grant_Application(1).LNK
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1174 |
Entropy (8bit): | 4.559126807858301 |
Encrypted: | false |
SSDEEP: | 24:88jFWP/XT4SYXbk8h4WGwwgJ+eHrEGwwgJ9Dv3q+57u:8V/XTFYXbJfJ+1fJc+9u |
MD5: | 5C6244DAEAC70242CE9CF2E6EBC81517 |
SHA1: | AFF3F4AB83CE9362467FFCFACA4FB71F92C1DC96 |
SHA-256: | 4AA89605A234B3D66C883FE22D09F507256D6EB4CA8F4956DFCBF2E9D29960F4 |
SHA-512: | 8777683729750D50DD22E85A12E7F7DFEA15B33E5DE9A84111CAEB0A0C58F120D90693DC3D7F805C806E6F2A3794FD96DD3179D235E5AC2968528BF58F578BC1 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 266 |
Entropy (8bit): | 5.194794594184178 |
Encrypted: | false |
SSDEEP: | 6:Hw+YAuPaZ5SutAn+Ip10l69qb45HQ+pI45HQC:HwNAHHSuyn+IpU69G41rq41t |
MD5: | A2BEB1D217A111FCB3B713924C06F8BA |
SHA1: | 70C331A30CA1641206F01BE07129702D5B87C703 |
SHA-256: | 5D011E02E7C154018CF78E2FCBAD7BEAA8C38EA44C1C27B2E45ECDFFD51FBF52 |
SHA-512: | 47B22EFE05BEE500E514798034D68423962E382BC941FA01914A55269A8447BEC861B6F242D97E96143F0F21F48CA846244D24C841D7B76BED61B39D5AEF0542 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4797606462020307 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l |
MD5: | 2CF7D3B8DED3F1D5CE1AC92F3E51D4ED |
SHA1: | 95E13378EA9CACA068B2687F01E9EF13F56627C2 |
SHA-256: | 60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1 |
SHA-512: | 2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:Qn:Qn |
MD5: | F3B25701FE362EC84616A93A45CE9998 |
SHA1: | D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB |
SHA-256: | B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209 |
SHA-512: | 98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 19376 |
Entropy (8bit): | 7.43519130998915 |
Encrypted: | false |
SSDEEP: | 384:+P76GaLYlB+k3chsh/5THXp9u1dZyQTXUdORYY8F6e:o6GaLYD+1w9XpWTEgRt0 |
MD5: | 6E28C4287DFA9F9E5EA0EBDFCB55949D |
SHA1: | 6724B3E2722105459DED915204A65132A1A8E1BF |
SHA-256: | 47925F4C80AEEF33AFE0EA88FF0961ADD2D36B7842D3140C8E29847BB551F998 |
SHA-512: | 91E3CCA72EB84DF355BCBE23ECD8217DB5C6504A61CE9C13E4957AA6B5FB6EE68707772661C0B72B3D9088F69DF0B92F012E2EA0EED9413D0CE622CED4F73250 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4797606462020307 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l |
MD5: | 2CF7D3B8DED3F1D5CE1AC92F3E51D4ED |
SHA1: | 95E13378EA9CACA068B2687F01E9EF13F56627C2 |
SHA-256: | 60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1 |
SHA-512: | 2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 19376 |
Entropy (8bit): | 7.43519130998915 |
Encrypted: | false |
SSDEEP: | 384:+P76GaLYlB+k3chsh/5THXp9u1dZyQTXUdORYY8F6e:o6GaLYD+1w9XpWTEgRt0 |
MD5: | 6E28C4287DFA9F9E5EA0EBDFCB55949D |
SHA1: | 6724B3E2722105459DED915204A65132A1A8E1BF |
SHA-256: | 47925F4C80AEEF33AFE0EA88FF0961ADD2D36B7842D3140C8E29847BB551F998 |
SHA-512: | 91E3CCA72EB84DF355BCBE23ECD8217DB5C6504A61CE9C13E4957AA6B5FB6EE68707772661C0B72B3D9088F69DF0B92F012E2EA0EED9413D0CE622CED4F73250 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.880031679106133 |
TrID: |
|
File name: | SLNA_Updated_Medical_Grant_Application(1).docx |
File size: | 15'041 bytes |
MD5: | 5a33bcadb199a553dd6ee2bdbdec4eea |
SHA1: | 0f318222204f14982f1579aac204812a253ea49d |
SHA256: | 8ae6cf2d0932782784084ff0e792a85146d5073115556e8d05a225e635ec96fa |
SHA512: | b2022d56a87b6e4284f8c271b1d9c8ccf8289986acfd2147bf2f38a98e855bf8521706ef3e4adaceedc096d452e44163417d98134fbbb4413e54efbba3a2caa7 |
SSDEEP: | 384:9iUQdLn9+GIEqFO5rgZy/UQR111POHIsTJyLO0U:Y7w7EqFYEU/fOBx |
TLSH: | A962AEB0E497C062CB0342F4A15C6ED1BD4C9BE7E36B35BE752811C06C6369A4F2A422 |
File Content Preview: | PK.........@.Y.U~............._rels/.rels..MK.1.....!..;.*"..^D.Md..C2.........(......3y..3C.....+.4xW..(A........yX..JB....Wp.....b..#InJ......*.E..b.=[J....M..%...a .B...,o0.f@=a... n........o.A...;.N.<...v.."...e....b.R...1..R.EF..7Z.n...hY...j.y..#1'. |
Icon Hash: | 65e6a3a3afb7bdbf |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-13T12:10:43.753705+0100 | 2033858 | ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf | 1 | 192.168.2.22 | 49164 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:10:43.753705+0100 | 2055081 | ET MALWARE TA399/Sidewinder Activity Payload Request M1, Microsoft Outlook UA Request for .rtf | 1 | 192.168.2.22 | 49164 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:10:43.753717+0100 | 2055129 | ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound | 1 | 5.255.125.140 | 443 | 192.168.2.22 | 49164 | TCP |
2024-12-13T12:10:52.188852+0100 | 2033858 | ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf | 1 | 192.168.2.22 | 49168 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:10:52.188852+0100 | 2055081 | ET MALWARE TA399/Sidewinder Activity Payload Request M1, Microsoft Outlook UA Request for .rtf | 1 | 192.168.2.22 | 49168 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:10:52.189469+0100 | 2055129 | ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound | 1 | 5.255.125.140 | 443 | 192.168.2.22 | 49168 | TCP |
2024-12-13T12:11:04.001903+0100 | 2033858 | ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf | 1 | 192.168.2.22 | 49174 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:11:04.001903+0100 | 2055081 | ET MALWARE TA399/Sidewinder Activity Payload Request M1, Microsoft Outlook UA Request for .rtf | 1 | 192.168.2.22 | 49174 | 5.255.125.140 | 443 | TCP |
2024-12-13T12:11:04.002228+0100 | 2055129 | ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound | 1 | 5.255.125.140 | 443 | 192.168.2.22 | 49174 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 13, 2024 12:10:30.289742947 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:30.289773941 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:30.289865017 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:30.301930904 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:30.301947117 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.055875063 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.055989027 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.060239077 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.060246944 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.060645103 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.060703993 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.188606977 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.231342077 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.610483885 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.610564947 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.610603094 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.610632896 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.667865038 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.667896032 CET | 443 | 49161 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:32.667907000 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:32.667944908 CET | 49161 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:34.223263025 CET | 49162 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:34.223306894 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:34.223412991 CET | 49162 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:34.223997116 CET | 49162 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:34.224014044 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:35.586493015 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:35.586644888 CET | 49162 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:35.590483904 CET | 49162 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:35.590492964 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:35.590790987 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:35.596483946 CET | 49162 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:35.643335104 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:36.121901989 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:36.122075081 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:36.122160912 CET | 49162 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:36.122209072 CET | 443 | 49162 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:39.894501925 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:39.894557953 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:39.894699097 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:39.898637056 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:39.898663998 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.258089066 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.258385897 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.262104034 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.262120962 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.262398005 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.276007891 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.319338083 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.790649891 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.791805029 CET | 443 | 49163 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.791809082 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.791943073 CET | 49163 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.825912952 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.825951099 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:41.826054096 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.826509953 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:41.826534033 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.193114042 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.193236113 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.194677114 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.194685936 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.195983887 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.195991039 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.753530979 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.753602982 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.753643990 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.753678083 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.759479046 CET | 49164 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.759500980 CET | 443 | 49164 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.779337883 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.779386997 CET | 443 | 49165 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:43.779478073 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.779906988 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:43.779944897 CET | 443 | 49165 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:45.137238026 CET | 443 | 49165 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:45.137387037 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.138772964 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.138792992 CET | 443 | 49165 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:45.140290976 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.140300035 CET | 443 | 49165 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:45.668703079 CET | 443 | 49165 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:45.668821096 CET | 443 | 49165 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:45.668867111 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.672396898 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.672396898 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.672427893 CET | 49165 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.721568108 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.721626043 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:45.721715927 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.723047018 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:45.723057985 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:47.089168072 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:47.089382887 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:47.090787888 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:47.090802908 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:47.091917992 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:47.091929913 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:47.622312069 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:47.622395039 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:47.622562885 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:47.622562885 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:47.622878075 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:47.622878075 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:47.622903109 CET | 443 | 49166 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:47.623334885 CET | 49166 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:48.373406887 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:48.373445034 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:48.373493910 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:48.382386923 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:48.382399082 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:49.744813919 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:49.744976044 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:49.749025106 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:49.749041080 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:49.749355078 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:49.751399040 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:49.799333096 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:50.279473066 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:50.279637098 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:50.279700994 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:50.279701948 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:50.279701948 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:50.279732943 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:50.285768032 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:50.285809040 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:50.286118031 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:50.286118031 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:50.286145926 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:50.586805105 CET | 49167 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:50.586827993 CET | 443 | 49167 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:51.650618076 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:51.650790930 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:51.652337074 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:51.652348995 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:51.653883934 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:51.653896093 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:52.189052105 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:52.189213991 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:52.189227104 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:52.189255953 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:52.189286947 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:52.189328909 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:52.232356071 CET | 49168 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:52.232379913 CET | 443 | 49168 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:52.248871088 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:52.248900890 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:52.248955011 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:52.249259949 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:52.249274015 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:53.614561081 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:53.614703894 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:53.616173983 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:53.616183996 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:53.617563963 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:53.617571115 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:54.149108887 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:54.149343014 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:54.149352074 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:54.149388075 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:54.149403095 CET | 443 | 49169 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:54.149415970 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:54.149458885 CET | 49169 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:54.171468973 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:54.171519041 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:54.171586037 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:54.171905994 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:54.171920061 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:55.536179066 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:55.536398888 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:55.568742037 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:55.568756104 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:55.601672888 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:55.601697922 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:56.072252035 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:56.072326899 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.072340012 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:56.072382927 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.072390079 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:56.072429895 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.072463989 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:56.072508097 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.072649956 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.072666883 CET | 443 | 49170 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:56.072670937 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.072772980 CET | 49170 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.075261116 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.075319052 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:56.075407028 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.075690985 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:56.075712919 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.435098886 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.435239077 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.436722040 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.436739922 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.438086033 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.438107014 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.967058897 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.967150927 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.967160940 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.967293024 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.967562914 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.967562914 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.967586040 CET | 443 | 49171 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.967703104 CET | 49171 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.972533941 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.972584963 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:57.972639084 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.972934961 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:57.972950935 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.338320971 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.338465929 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.339982986 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.339996099 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.341398001 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.341409922 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.866611004 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.866699934 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.866708994 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.866754055 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.866759062 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.866799116 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.867028952 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.867043018 CET | 443 | 49172 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:10:59.867053986 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:10:59.867091894 CET | 49172 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:00.183146000 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:00.183191061 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:00.183324099 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:00.183695078 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:00.183703899 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:01.549206018 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:01.549309969 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:01.553690910 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:01.553720951 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:01.554039001 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:01.556166887 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:01.603324890 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:02.085154057 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:02.085228920 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:02.085270882 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:02.085341930 CET | 49173 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:02.085357904 CET | 443 | 49173 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:02.092824936 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:02.092863083 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:02.092916965 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:02.093319893 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:02.093331099 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:03.456159115 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:03.456907034 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:03.458378077 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:03.458384037 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:03.459718943 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:03.459723949 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:04.001975060 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:04.002052069 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:04.002059937 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:04.002091885 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:04.002100945 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:04.002129078 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:04.003289938 CET | 49174 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:04.003304005 CET | 443 | 49174 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:04.020936966 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:04.020983934 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:04.021034002 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:04.026241064 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:04.026253939 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:05.390048027 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:05.391343117 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:05.393696070 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:05.393706083 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:05.399717093 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:05.399741888 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:05.924756050 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:05.924864054 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:05.924958944 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:05.924958944 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:05.924985886 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:05.925004959 CET | 443 | 49175 | 5.255.125.140 | 192.168.2.22 |
Dec 13, 2024 12:11:05.925020933 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Dec 13, 2024 12:11:05.925055981 CET | 49175 | 443 | 192.168.2.22 | 5.255.125.140 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 13, 2024 12:10:29.773616076 CET | 54562 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:10:30.285824060 CET | 53 | 54562 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:10:33.164014101 CET | 52917 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:10:33.677314043 CET | 53 | 52917 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:10:33.679138899 CET | 62751 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:10:34.222779036 CET | 53 | 62751 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:10:39.332797050 CET | 57893 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:10:39.505675077 CET | 53 | 57893 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:10:39.507448912 CET | 54821 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:10:39.875825882 CET | 53 | 54821 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:10:47.641995907 CET | 54719 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:10:48.011981964 CET | 53 | 54719 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:10:48.014941931 CET | 49881 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:10:48.370584011 CET | 53 | 49881 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:10:59.911575079 CET | 54998 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:11:00.046056986 CET | 53 | 54998 | 8.8.8.8 | 192.168.2.22 |
Dec 13, 2024 12:11:00.048675060 CET | 52781 | 53 | 192.168.2.22 | 8.8.8.8 |
Dec 13, 2024 12:11:00.182604074 CET | 53 | 52781 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 13, 2024 12:10:29.773616076 CET | 192.168.2.22 | 8.8.8.8 | 0xbe18 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:10:33.164014101 CET | 192.168.2.22 | 8.8.8.8 | 0x52aa | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:10:33.679138899 CET | 192.168.2.22 | 8.8.8.8 | 0x2a10 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:10:39.332797050 CET | 192.168.2.22 | 8.8.8.8 | 0xc083 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:10:39.507448912 CET | 192.168.2.22 | 8.8.8.8 | 0x1100 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:10:47.641995907 CET | 192.168.2.22 | 8.8.8.8 | 0xd005 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:10:48.014941931 CET | 192.168.2.22 | 8.8.8.8 | 0x1639 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:10:59.911575079 CET | 192.168.2.22 | 8.8.8.8 | 0x3e0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 12:11:00.048675060 CET | 192.168.2.22 | 8.8.8.8 | 0x69dc | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 13, 2024 12:10:30.285824060 CET | 8.8.8.8 | 192.168.2.22 | 0xbe18 | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:10:33.677314043 CET | 8.8.8.8 | 192.168.2.22 | 0x52aa | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:10:34.222779036 CET | 8.8.8.8 | 192.168.2.22 | 0x2a10 | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:10:39.505675077 CET | 8.8.8.8 | 192.168.2.22 | 0xc083 | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:10:39.875825882 CET | 8.8.8.8 | 192.168.2.22 | 0x1100 | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:10:48.011981964 CET | 8.8.8.8 | 192.168.2.22 | 0xd005 | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:10:48.370584011 CET | 8.8.8.8 | 192.168.2.22 | 0x1639 | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:11:00.046056986 CET | 8.8.8.8 | 192.168.2.22 | 0x3e0 | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 12:11:00.182604074 CET | 8.8.8.8 | 192.168.2.22 | 0x69dc | No error (0) | 5.255.125.140 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.22 | 49161 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:32 UTC | 174 | OUT | |
2024-12-13 11:10:32 UTC | 232 | IN | |
2024-12-13 11:10:32 UTC | 196 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.22 | 49162 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:35 UTC | 164 | OUT | |
2024-12-13 11:10:36 UTC | 232 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
2 | 192.168.2.22 | 49163 | 5.255.125.140 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:41 UTC | 168 | OUT | |
2024-12-13 11:10:41 UTC | 232 | IN | |
2024-12-13 11:10:41 UTC | 196 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.22 | 49164 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:43 UTC | 394 | OUT | |
2024-12-13 11:10:43 UTC | 205 | IN | |
2024-12-13 11:10:43 UTC | 8 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.22 | 49165 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:45 UTC | 183 | OUT | |
2024-12-13 11:10:45 UTC | 232 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.22 | 49166 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:47 UTC | 174 | OUT | |
2024-12-13 11:10:47 UTC | 232 | IN | |
2024-12-13 11:10:47 UTC | 196 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.22 | 49167 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:49 UTC | 164 | OUT | |
2024-12-13 11:10:50 UTC | 232 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.22 | 49168 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:51 UTC | 394 | OUT | |
2024-12-13 11:10:52 UTC | 205 | IN | |
2024-12-13 11:10:52 UTC | 8 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.22 | 49169 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:53 UTC | 183 | OUT | |
2024-12-13 11:10:54 UTC | 232 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.22 | 49170 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:55 UTC | 174 | OUT | |
2024-12-13 11:10:56 UTC | 232 | IN | |
2024-12-13 11:10:56 UTC | 196 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.22 | 49171 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:57 UTC | 174 | OUT | |
2024-12-13 11:10:57 UTC | 232 | IN | |
2024-12-13 11:10:57 UTC | 196 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.22 | 49172 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:10:59 UTC | 174 | OUT | |
2024-12-13 11:10:59 UTC | 232 | IN | |
2024-12-13 11:10:59 UTC | 196 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
12 | 192.168.2.22 | 49173 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:11:01 UTC | 164 | OUT | |
2024-12-13 11:11:02 UTC | 232 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
13 | 192.168.2.22 | 49174 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:11:03 UTC | 394 | OUT | |
2024-12-13 11:11:03 UTC | 205 | IN | |
2024-12-13 11:11:03 UTC | 8 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
14 | 192.168.2.22 | 49175 | 5.255.125.140 | 443 | 3432 | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-13 11:11:05 UTC | 183 | OUT | |
2024-12-13 11:11:05 UTC | 232 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 06:10:26 |
Start date: | 13/12/2024 |
Path: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13ffd0000 |
File size: | 1'423'704 bytes |
MD5 hash: | 9EE74859D22DAE61F1750B3A1BACB6F5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |