Windows
Analysis Report
rQuotation.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- rQuotation.exe (PID: 7704 cmdline:
"C:\Users\ user\Deskt op\rQuotat ion.exe" MD5: DCA8BDEFE8237A48128806FF688AC05A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Loki Password Stealer (PWS), LokiBot | "Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2 |
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 11 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Click to see the 11 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-16T13:15:07.027308+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.9 | 49708 | 172.67.153.63 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00D614D8 | |
Source: | Code function: | 0_2_00D614C7 | |
Source: | Code function: | 0_2_00D61238 | |
Source: | Code function: | 0_2_00D61228 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: |
Source: | .Net Code: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00D652A2 |
Source: | High entropy of concatenated method names: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | 11 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 31 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 31 Virtualization/Sandbox Evasion | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | ReversingLabs | Win32.Infostealer.Tinba | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
dddotx.shop | 172.67.153.63 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false |
| unknown | |
false | high | ||
false |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.153.63 | dddotx.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1576016 |
Start date and time: | 2024-12-16 13:14:03 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 2 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | rQuotation.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/1@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Execution Graph export aborted for target rQuotation.exe, PID 7704 because it is empty
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: rQuotation.exe
Time | Type | Description |
---|---|---|
07:15:04 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.153.63 | Get hash | malicious | Lokibot, PureLog Stealer, zgRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
dddotx.shop | Get hash | malicious | Lokibot, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | Lokibot, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Lokibot, PureLog Stealer | Browse |
| ||
Get hash | malicious | Lokibot, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
|
Process: | C:\Users\user\Desktop\rQuotation.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 847 |
Entropy (8bit): | 5.345615485833535 |
Encrypted: | false |
SSDEEP: | 24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKlYHKh3oPtHo6hAHKzeR |
MD5: | EEEC189088CC5F1F69CEE62A3BE59EA2 |
SHA1: | 250F25CE24458FC0C581FDDF59FAA26D557844C5 |
SHA-256: | 5345D03A7E6C9436497BA4120DE1F941800F2522A21DE70CEA6DB1633D356E11 |
SHA-512: | 2E017FD29A505BCAC78C659DE10E0D869C42CE3B057840680B23961DBCB1F82B1CC7094C87CEEB8FA14826C4D8CFED88DC647422A4A3FA36C4AAFD6430DAEFE5 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 4.801295426326709 |
TrID: |
|
File name: | rQuotation.exe |
File size: | 130'560 bytes |
MD5: | dca8bdefe8237a48128806ff688ac05a |
SHA1: | 6ebb0844c2d34d0fcc21a903d43757a5d238273d |
SHA256: | c390804ad264760c94d771b4e8326ba728624673b6900d664d2faff699480fc2 |
SHA512: | 0d2a21abed6f319200ef19155aa3673d75fb2d141710926ff5d5185fecc978956a94aeefba9f352ee1de5b6655f68655756f627455542fb6e61144f6c3b21fad |
SSDEEP: | 768:pEC6hHEQS0a5gzQKosk3jo6l9M8GeD24thF07INvu+FlmQYRaxlKqxk2GZ2GzmuZ:ESJMQICjJl9LGcxDNXltYbqQmuj9 |
TLSH: | CDD3A535B2835321C41B0EB5D0EE352C03B29F4BA277D69AE88C33F54EF17D19A86619 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...T.................0.............~.... ... ....@.. .......................`............`................................ |
Icon Hash: | 1a5ada12a98c3689 |
Entrypoint: | 0x41087e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x9E09E354 [Thu Jan 8 01:22:28 2054 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x10830 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x12000 | 0x10e54 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x24000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x107e6 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xe884 | 0xea00 | 6b85af04ee8df69b6c1200c1372c0d44 | False | 0.44012086004273504 | Applesoft BASIC program data, first line number 1 | 5.771795430516578 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x12000 | 0x10e54 | 0x11000 | a22b0fd7056d76defe46070a8624efbc | False | 0.056597541360294115 | data | 2.6809687333439816 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x24000 | 0xc | 0x200 | efffbd905373a34c102543d2187f6088 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x12130 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | 0.046891636105524666 | ||
RT_GROUP_ICON | 0x22958 | 0x14 | data | 1.15 | ||
RT_VERSION | 0x2296c | 0x2fc | data | 0.43586387434554974 | ||
RT_MANIFEST | 0x22c68 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-16T13:15:07.027308+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.9 | 49708 | 172.67.153.63 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 16, 2024 13:15:02.970251083 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:02.970305920 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:02.970458984 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:02.979619980 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:02.979631901 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.198086023 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.198163986 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.245198011 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.245233059 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.245579958 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.297137976 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.555700064 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.603348970 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.884666920 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.884702921 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.884735107 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.884756088 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.884768009 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.884805918 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.884814978 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.884820938 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.884848118 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.884862900 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.896116018 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.896176100 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.896182060 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.904486895 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.904536009 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:04.904541016 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:04.953378916 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.004534960 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.047133923 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.047148943 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.080059052 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.080121994 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.080128908 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.090159893 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.090194941 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.090224028 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.090229988 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.090266943 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.098345041 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.106146097 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.106199980 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.106205940 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.114367008 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.114428043 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.114434004 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.122692108 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.122747898 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.122752905 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.130768061 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.130826950 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.130831003 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.139197111 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.139260054 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.139264107 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.155469894 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.155497074 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.155529976 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.155534983 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.155574083 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.163566113 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.171654940 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.171683073 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.171713114 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.171717882 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.171761036 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.196506977 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.250284910 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.267671108 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.271477938 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.271554947 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.271567106 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.290260077 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.290272951 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.290339947 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.290349960 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.299482107 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.299565077 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.299582958 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.299644947 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.303874016 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.303926945 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.312549114 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.312557936 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.312618017 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.316989899 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.316997051 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.317049026 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.325505018 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.325514078 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.325570107 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.331880093 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.331902027 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.331948996 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.335082054 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.335144997 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.340780973 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.340887070 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.346801043 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.346869946 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.349754095 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.349812984 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.355645895 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.355720043 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.362303972 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.362416983 CET | 443 | 49707 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.362426996 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.362493992 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.370587111 CET | 49707 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.372848034 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.372890949 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:05.372973919 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.373164892 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:05.373178005 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:06.582312107 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:06.585238934 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:06.585253954 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:07.027288914 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:07.027358055 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:07.027400017 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:07.027420998 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:07.027431965 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:07.027472019 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:07.027477026 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:07.027554989 CET | 443 | 49708 | 172.67.153.63 | 192.168.2.9 |
Dec 16, 2024 13:15:07.027592897 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Dec 16, 2024 13:15:07.102685928 CET | 49708 | 443 | 192.168.2.9 | 172.67.153.63 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 16, 2024 13:15:02.566986084 CET | 59036 | 53 | 192.168.2.9 | 1.1.1.1 |
Dec 16, 2024 13:15:02.964936018 CET | 53 | 59036 | 1.1.1.1 | 192.168.2.9 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 16, 2024 13:15:02.566986084 CET | 192.168.2.9 | 1.1.1.1 | 0x4233 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 16, 2024 13:15:02.964936018 CET | 1.1.1.1 | 192.168.2.9 | 0x4233 | No error (0) | 172.67.153.63 | A (IP address) | IN (0x0001) | false | ||
Dec 16, 2024 13:15:02.964936018 CET | 1.1.1.1 | 192.168.2.9 | 0x4233 | No error (0) | 104.21.12.202 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.9 | 49707 | 172.67.153.63 | 443 | 7704 | C:\Users\user\Desktop\rQuotation.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-16 12:15:04 UTC | 73 | OUT | |
2024-12-16 12:15:04 UTC | 919 | IN | |
2024-12-16 12:15:04 UTC | 450 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN | |
2024-12-16 12:15:04 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.9 | 49708 | 172.67.153.63 | 443 | 7704 | C:\Users\user\Desktop\rQuotation.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-16 12:15:06 UTC | 45 | OUT | |
2024-12-16 12:15:07 UTC | 552 | IN | |
2024-12-16 12:15:07 UTC | 817 | IN | |
2024-12-16 12:15:07 UTC | 1369 | IN | |
2024-12-16 12:15:07 UTC | 1369 | IN | |
2024-12-16 12:15:07 UTC | 1006 | IN | |
2024-12-16 12:15:07 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 07:15:01 |
Start date: | 16/12/2024 |
Path: | C:\Users\user\Desktop\rQuotation.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x580000 |
File size: | 130'560 bytes |
MD5 hash: | DCA8BDEFE8237A48128806FF688AC05A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Function 00D60838 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60848 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D60972 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D653F9 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61228 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61238 Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D614D8 Relevance: .1, Instructions: 105COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D614C7 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|