Windows
Analysis Report
Lu4421.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Lu4421.exe (PID: 6768 cmdline:
"C:\Users\ user\Deskt op\Lu4421. exe" MD5: E5358FCA58C0E1B1E29EB195FB0F4675) - svchost.exe (PID: 480 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\svchos t.exe" MD5: 67CA41C73D556CC4CFC67FC5B425BBBD) - WerFault.exe (PID: 1060 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 768 -s 294 4 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Stealerium | According to SecurityScorecard, Stealerium is an open-source stealer available on GitHub. The malware steals information from browsers, cryptocurrency wallets, and applications such as Discord, Pidgin, Outlook, Telegram, Skype, Element, Signal, Tox, Steam, Minecraft, and VPN clients. The binary also gathers data about the infected host, such as the running processes, Desktop and webcam screenshots, Wi-Fi networks, the Windows product key, and the public and private IP address. The stealer employs multiple anti-analysis techniques, such as detecting virtual machines, sandboxes, and malware analysis tools and checking if the process is being debugged. The malware also embedded a keylogger module and a clipper module that replaces cryptocurrency wallet addresses with the threat actors addresses if the victim makes a transaction. The stolen information is sent to a Discord channel using a Discord Webhook. | No Attribution |
{"Server": "51.89.44.68", "Ports": "8848", "Version": "1.0.7", "Autorun": "true", "Install_Folder": "%Temp%", "Install_File": "svchost.exe", "AES_key": "codpZo7sp26vCJaNdBX6AeJsQEdcysZj", "Mutex": "etb3t1tr5n", "Certificate": "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", "ServerSignature": "TgOPkoSwK50ROL73TIpqMjhVitaE57QcwTult9vLNILRIrVCY/vBZYLwQCNT33NmMQG0jNBBHbvw/4wy7BckYa8zQCUKS+IAyG6llcuwMMlU90EILj05Fxf+hcTpljihzyJLdY/g7vGbQp50Ejelt1z28kvim/7J2Kobrr6sanM=", "External_config_on_Pastebin": "null", "BDOS": "true", "Startup_Delay": "1", "Group": "Default", "AntiProcess": "false", "AntiVM": "true"}
{"C2 url": "https://szurubooru.zulipchat.com/api/v1/messages", "User": "szurubooru@gmail.com", "API key": "fgwT5umbrQdW6Y1buIWZJK6S2FVQZAeS"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_Stealerium | Yara detected Stealerium | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AntiVM_5 | Yara detected AntiVM_5 | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DcRat_2 | Yara detected DcRat | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_AntiVM_5 | Yara detected AntiVM_5 | Joe Security | ||
Click to see the 25 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
Click to see the 15 entries |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T12:07:32.534040+0100 | 2842478 | 1 | Malware Command and Control Activity Detected | 51.89.44.68 | 8848 | 192.168.2.4 | 49739 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T12:07:27.709803+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 185.199.108.133 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | URLs: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 1_2_00007FFD9B7D7418 | |
Source: | Code function: | 1_2_00007FFD9B7D8708 |
Source: | Code function: | 0_2_011AC0A0 | |
Source: | Code function: | 0_2_011AF5A5 | |
Source: | Code function: | 0_2_00007FFD9B7FAB70 | |
Source: | Code function: | 0_2_00007FFD9B7F8B52 | |
Source: | Code function: | 0_2_00007FFD9B7F7DA6 | |
Source: | Code function: | 0_2_00007FFD9B7FF25A | |
Source: | Code function: | 1_2_00007FFD9B7DDBEF | |
Source: | Code function: | 1_2_00007FFD9B7D7418 | |
Source: | Code function: | 1_2_00007FFD9B7D6B12 | |
Source: | Code function: | 1_2_00007FFD9B7D5D66 | |
Source: | Code function: | 1_2_00007FFD9B7D7D8D | |
Source: | Code function: | 1_2_00007FFD9B7D847E | |
Source: | Code function: | 1_2_00007FFD9B7D04B8 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Suspicious method names: | ||
Source: | Suspicious method names: | ||
Source: | Suspicious method names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static file information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_011AB271 | |
Source: | Code function: | 0_2_011AC184 | |
Source: | Code function: | 0_2_00007FFD9B7F24A1 | |
Source: | Code function: | 0_2_00007FFD9B7F24A1 | |
Source: | Code function: | 0_2_00007FFD9B7F00C1 | |
Source: | Code function: | 1_2_00007FFD9B7D785C |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Special instruction interceptor: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior |
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Language, Device and Operating System Detection |
---|
Source: | File source: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_011AF200 |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 231 Windows Management Instrumentation | 1 Scheduled Task/Job | 112 Process Injection | 11 Masquerading | OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Scheduled Task/Job | 1 Disable or Modify Tools | LSASS Memory | 761 Security Software Discovery | Remote Desktop Protocol | 1 Data from Local System | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Scheduled Task/Job | Logon Script (Windows) | 1 Abuse Elevation Control Mechanism | 271 Virtualization/Sandbox Evasion | Security Account Manager | 2 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 112 Process Injection | NTDS | 271 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Abuse Elevation Control Mechanism | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | 13 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 111 Obfuscated Files or Information | Cached Domain Credentials | 126 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Timestomp | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
68% | ReversingLabs | Win64.Trojan.Amadey | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML | |||
84% | ReversingLabs | ByteCode-MSIL.Backdoor.AsyncRAT |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true | false | high | |
github.com | 20.233.83.145 | true | false | high | |
raw.githubusercontent.com | 185.199.108.133 | true | false | high | |
41.140.13.0.in-addr.arpa | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.199.108.133 | raw.githubusercontent.com | Netherlands | 54113 | FASTLYUS | false | |
51.89.44.68 | unknown | France | 16276 | OVHFR | true | |
20.233.83.145 | github.com | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577337 |
Start date and time: | 2024-12-18 12:06:24 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Lu4421.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/9@3/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 199.232.214.172, 20.42.65.92, 20.190.181.23, 20.109.210.53, 13.107.246.63
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Lu4421.exe
Time | Type | Description |
---|---|---|
06:07:19 | API Interceptor | |
06:07:34 | API Interceptor | |
06:07:52 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.199.108.133 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
20.233.83.145 | Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
github.com | Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| |
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | WSHRat, Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
raw.githubusercontent.com | Get hash | malicious | Can Stealer | Browse |
| |
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
bg.microsoft.map.fastly.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | SystemBC | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
OVHFR | Get hash | malicious | Xmrig | Browse |
| |
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
MICROSOFT-CORP-MSN-AS-BLOCKUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
FASTLYUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Abobus Obfuscator, Braodo | Browse |
| ||
Get hash | malicious | Abobus Obfuscator, Braodo | Browse |
| ||
Get hash | malicious | Abobus Obfuscator, Braodo | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Lu4421.exe_e89c6726561f71ab41431a3c6e42949dc982e4b6_2f8b0fe7_9c5a13bd-6112-4df9-ae06-7491d7fbbf43\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.3165879074051308 |
Encrypted: | false |
SSDEEP: | 192:Sy3e+KIwO0ODr09G0HgtjAiorPGl9Lq9pzuiFIZ24lO8+:m+FwOR89G0HgtjToE9LozuiFIY4lO8+ |
MD5: | 8C61DFBA68C87AF1CC40C905A6060F68 |
SHA1: | CD9D7D2C6F819E3F27DBB81216DC50FE1C9B2D98 |
SHA-256: | C3A1F13235131D5E59EFF70440E5260D0F5CDB11205ABE0B8CFF49C37BD19218 |
SHA-512: | 8A4BAE9D43FF98412AC3B87635777836C7EE2413C4B9AF31D05CAFDB72024764D08F871F4F14E043D8921FCC0AB27F80F8255048A5EA2E41F8E27C8492838792 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 938981 |
Entropy (8bit): | 2.2810211413212906 |
Encrypted: | false |
SSDEEP: | 3072:zS4i9RbVMMPdh43+vm8cYzFYmt99L19+UGyxsaBl4M1/R/RVGs///AxcSe2x1CC/:O4ipVh43QDcYdUasaBl1dMfvq |
MD5: | B339BA73D06AA5B8BDB0D91F98996A87 |
SHA1: | E85D190001EFF69287627299C339EABA879CDE19 |
SHA-256: | CB82751BBE20F590387F6C77AFC0B5ECB2AC193E2B6E6C3EA668D98EC82393E7 |
SHA-512: | D4ECE5C5A626799C42085729F77A0B723BD058621AD9549460DB2A6171E9E5DB8044741EDB8332F72FA011DDF9CD95CABB1861D0D96B5A8A226D9E24A859BDD3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8814 |
Entropy (8bit): | 3.700836325279667 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJEDi6Y9LMkjsgmfZFzUyJprE89b9qb0f9tvnom:R6lXJwi6YhMYsgmfLzUy19qYf/t |
MD5: | 6F1CEE53AE6DE44F29C64CA473AED4E6 |
SHA1: | C2F0EA9B3976A6D7202F6CF4636931DC9D186A50 |
SHA-256: | E5B082EEA6E05BBFB70C58E2C39469AB194D4A3B9774176D2977DA7254D1CD3B |
SHA-512: | 0A8D444102DEC4526002472CD1036C460B84FD8A1869C0DE12C2CF2488392A327E281785B9FB40D21CC220F1E1910D6A49A8A86813EA5A6754C46D675D40D49A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4782 |
Entropy (8bit): | 4.454922366753696 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs4Jg771I9MXWpW8VYaYm8M4JCV6NPzyF0yq8vk6NPz11twU+ed:uIjf+I7Hm7VCJ5ZrW9ZJ1twUld |
MD5: | 9C4801D4A2C64E862CFD4D4043A99C66 |
SHA1: | 223C18547016789C769B53496931A5188A13D614 |
SHA-256: | B80212A8115399C32CF336524B5DC337DF881E64EEB1354B8D9CA0C1F70A0029 |
SHA-512: | 1E203382F02C0B9E2DD141B91CDB8466B06695917C5491769AAA590904A692D0DE6DD0248ACEEBD6484708CDA7CE9EABE05E1F6EBE4458343B19033814E136FB |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\AppData\Local\Temp\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Users\user\AppData\Local\Temp\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.2418003062782916 |
Encrypted: | false |
SSDEEP: | 6:kK/8i9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:XMDImsLNkPlE99SNxAhUe/3 |
MD5: | 7D4978EF9044BBE1214404E544BA9690 |
SHA1: | AA55A666AD0F53C537EDA72FF18DBB769BDE65CF |
SHA-256: | C1DC771F0C46622028015053F737C9253E09987A7CD3441693299DFBAEC8AC6D |
SHA-512: | 00F6E139C91F90616F8B61B8DC1901FE432E50F0CCBB78BCDCA690BED05BC5EAF04181EB2E1DFC8562045861236D265DDF68647A0440BD4B2AF88134090F7B38 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Lu4421.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 802 |
Entropy (8bit): | 5.148231617209204 |
Encrypted: | false |
SSDEEP: | 12:oVRAF42pFDo+fTU29DmS7a3pa7/XhauWhakzXLhaZQhaW80A0Iu0j:oVmF4q6+fbdyGPHWpbgQW0A0IV |
MD5: | 2C667ACDF644153E839FF081C0A35066 |
SHA1: | 27B633F592F18EC7693A9A919718E74E93F0196D |
SHA-256: | 7D969B74084B176757C20B95F2B5ACC279E450C9A5AF8F25D38EF835CA2C9AEA |
SHA-512: | A4C9E37DB43DAA5364876A74A18C23EAF3F1FEAB5212EBC01F813425B89D162DF9CE0DF4D92DC3EEC2D42FF07A89168C07FAF42D1F0B1F8ADA1FAC223AA4E895 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Lu4421.exe |
File Type: | |
Category: | modified |
Size (bytes): | 65024 |
Entropy (8bit): | 5.818068016613434 |
Encrypted: | false |
SSDEEP: | 1536:ihbjnR1AioCzmUxIxqFaUm7wPeUJyq8wJGbbUwm/GMNpqKmY7:ihbjnR1AioCzmUxIxwaTwPeUw8GbbUxM |
MD5: | 67CA41C73D556CC4CFC67FC5B425BBBD |
SHA1: | ADA7F812CD581C493630ECA83BF38C0F8B32B186 |
SHA-256: | 23D2E491A8C7F2F7F344764E6879D9566C9A3E55A3788038E48B346C068DDE5B |
SHA-512: | 0DCEB6468147CD2497ADF31843389A78460ED5ABE2C5A13488FC55A2D202EE6CE0271821D3CF12BC1F09A4D6B79A737EA3BCCFC2BB87F89B3FFF6410FA85EC02 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465566144997875 |
Encrypted: | false |
SSDEEP: | 6144:/IXfpi67eLPU9skLmb0b4jWSPKaJG8nAgejZMMhA2gX4WABl0uNydwBCswSbw:wXD94jWlLZMM6YFH4+w |
MD5: | 68E18F01120AFA1DE2969D61023B8374 |
SHA1: | 8AD64F032F9F51303760256139B8F8633F1F4B26 |
SHA-256: | AE7493DA4C6A4544CAA18A1944E6A949BCD74B239102B2493FC7E613A1794E2F |
SHA-512: | 36600DB197070E68267A7D31A3985BB6C5BA2A98A83A02E59A4C860C110A1BD4EE586D40325F6E20CCA07EDDF02C82D0534F1D4542C77FA5A79E4C19F83C18F5 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.973829401437202 |
TrID: |
|
File name: | Lu4421.exe |
File size: | 5'865'472 bytes |
MD5: | e5358fca58c0e1b1e29eb195fb0f4675 |
SHA1: | a114c059fed08a501c344f40d9f702f03cdebbab |
SHA256: | 220c04c30a7dbd084fdebe00102f6340194845d8664dfd669a5549f23a1031c4 |
SHA512: | f072704ad3ffe2ad975972453f1a58fe3ccd4061ef275e833e60b593e79e65e9955fe841e7248002046e4c35472bbc9c946457f9608fe10c92fa07a9747ea8f3 |
SSDEEP: | 98304:xkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13r7INfWdpe:xkSIlLtzWAXAkuujCPX9YG9he5GnQCAe |
TLSH: | 3146331473F5069AF1FB6BB4E97141119E36BA07C077EA4C1958109C0EB3789AD22FBB |
File Content Preview: | MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..*9..........`... ....@...... ...............................=Z...`...@......@............... ..... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0xd26000 |
Entrypoint Section: | .taggant |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE |
Time Stamp: | 0xFFBE84BF [Sat Dec 19 14:25:03 2105 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | dc12932426806b6b47a373d7ae42c21d |
Instruction |
---|
jmp 00007F5E1D07AE1Ah |
divps xmm3, dqword ptr [ecx+00h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
jmp 00007F5E1D07CE15h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [edx], bh |
add al, byte ptr [eax] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add byte ptr [eax], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
jnle 00007F5E1D07AD92h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
iretd |
add dword ptr [eax], eax |
add byte ptr [eax], cl |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add byte ptr [eax], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add dword ptr [eax+00000000h], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x398085 | 0xad | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x396000 | 0x53c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x2000 | 0x394000 | 0x394000 | ceec5083f285b2c1be8d061a39f91e2c | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.rsrc | 0x396000 | 0x53c | 0x400 | fb14019a6944b144187ed32a35b67085 | False | 0.6904296875 | data | 5.659166984958865 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x398000 | 0x2000 | 0x200 | f556b29b2c3bed37b6a24754dd07217a | False | 0.166015625 | data | 1.1919459888330979 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
0x39a000 | 0x38a000 | 0x200 | 7c37b2d3bde84d00b50b7fc7d29ad5fd | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
iubcysyr | 0x724000 | 0x200000 | 0x1ff400 | 5307be4cfcf1ab435746dd4c576b558c | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
tpxtcrvz | 0x924000 | 0x2000 | 0x200 | ff4192a5c1ad550f8e65ea3f3799fbc4 | False | 0.587890625 | data | 4.534819229507492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.taggant | 0x926000 | 0x4000 | 0x2200 | 96c9148d88dec28e0da1788ac9c5c22a | False | 0.07192095588235294 | DOS executable (COM) | 0.9116417289365074 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x922dd8 | 0x348 | data | 0.43214285714285716 | ||
RT_MANIFEST | 0x923120 | 0x152 | ASCII text, with CRLF line terminators | 0.6479289940828402 |
DLL | Import |
---|---|
kernel32.dll | lstrcpy |
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T12:07:27.709803+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49737 | 185.199.108.133 | 443 | TCP |
2024-12-18T12:07:32.534040+0100 | 2842478 | ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) | 1 | 51.89.44.68 | 8848 | 192.168.2.4 | 49739 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 12:07:21.132110119 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.132141113 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.132200956 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.140517950 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.140566111 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.140624046 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.140845060 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.140858889 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.140906096 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.150988102 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.151005983 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.151051998 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.151866913 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.151905060 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.151931047 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.151943922 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.151989937 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.152017117 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.319804907 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.319823980 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.321609020 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.321625948 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.321825981 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.321846962 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.322858095 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.322870016 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.323661089 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.323673010 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:21.323900938 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:21.323926926 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.534156084 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.534244061 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.536221981 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.536292076 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.537395954 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.537440062 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.537477016 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.537517071 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.537525892 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.537589073 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.538436890 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.538521051 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.543390036 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.543399096 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.543674946 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.545429945 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.545461893 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.545764923 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.546547890 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.546580076 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.546632051 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.546637058 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.546875954 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.547086954 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.548590899 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.548604012 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.548927069 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.550623894 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.550647020 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.550945044 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.585556030 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.601186037 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.601186037 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.601186991 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.601285934 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.601293087 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.614398956 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.614485025 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.614526987 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.614541054 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.614778996 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.614989042 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.659324884 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.659333944 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.659337044 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.659337997 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.659346104 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.659349918 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.978499889 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.978576899 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.978619099 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.978688002 CET | 443 | 49733 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:22.978698015 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.978755951 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:22.991360903 CET | 49733 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.018893003 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.019053936 CET | 443 | 49732 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.019177914 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.019876957 CET | 49732 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.023808956 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.023993969 CET | 443 | 49735 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.024049997 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.024626017 CET | 49735 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.030822039 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.030937910 CET | 443 | 49731 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.031027079 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.031732082 CET | 49731 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.031956911 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.032016039 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.032049894 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.032077074 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.032107115 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.032121897 CET | 443 | 49734 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.032166004 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.033237934 CET | 49734 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.036866903 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.036987066 CET | 443 | 49730 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:23.037182093 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.038350105 CET | 49730 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:23.436557055 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:23.436605930 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:23.436670065 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:23.437084913 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:23.437103033 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.027563095 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.027698040 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:25.029829025 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:25.029853106 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.030139923 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.030983925 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:25.075336933 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.975148916 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.975263119 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.975317955 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:25.975327969 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.975339890 CET | 443 | 49736 | 20.233.83.145 | 192.168.2.4 |
Dec 18, 2024 12:07:25.975363970 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:25.975393057 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:25.975992918 CET | 49736 | 443 | 192.168.2.4 | 20.233.83.145 |
Dec 18, 2024 12:07:25.980243921 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:25.980298042 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:25.980355978 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:25.980673075 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:25.980689049 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.187140942 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.188968897 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.188983917 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.709816933 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.709960938 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.709988117 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.710082054 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.710110903 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.710155964 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.718169928 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.726633072 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.726686001 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.726702929 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.734549046 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.734601974 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.734608889 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.742961884 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.743057966 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.743065119 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.788713932 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.829896927 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.882477045 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.882489920 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.929404974 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.944298983 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.944312096 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.944330931 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.944339037 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.944355965 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.944406033 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.944416046 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.944463015 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.985382080 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.985390902 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.985413074 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.985420942 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.985454082 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.985467911 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:27.985479116 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:27.985507011 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:28.113924980 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:28.113939047 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:28.113967896 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:28.113996029 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:28.114017963 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:28.114033937 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:28.114043951 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:28.114069939 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:28.114083052 CET | 443 | 49737 | 185.199.108.133 | 192.168.2.4 |
Dec 18, 2024 12:07:28.114119053 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:28.114588976 CET | 49737 | 443 | 192.168.2.4 | 185.199.108.133 |
Dec 18, 2024 12:07:31.000942945 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:31.123153925 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:31.123289108 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:31.130796909 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:31.252428055 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:32.400490999 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:32.414112091 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:32.534039974 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:32.819859982 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:32.866838932 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:36.522430897 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:36.642007113 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:36.642131090 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:36.764986038 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:49.799540997 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:49.919255018 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:49.919450045 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:50.039088964 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:50.343367100 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:50.398133993 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:50.534435987 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:50.547136068 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:50.666969061 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:50.667062044 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:50.786784887 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:55.919564009 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:55.960784912 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:07:56.110668898 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:07:56.163779020 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:03.079360008 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:03.203691006 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:03.203922987 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:03.325803995 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:03.621479988 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:03.663821936 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:03.813791990 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:03.815551996 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:03.936805964 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:03.936935902 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:04.056699038 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:16.351872921 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:16.471669912 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:16.471786976 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:16.591545105 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:16.893412113 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:16.945111036 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:17.084558010 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:17.086862087 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:17.206548929 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:17.206696987 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:17.326297045 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:25.906343937 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:25.960820913 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:26.097368002 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:26.148312092 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:29.633277893 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:29.752909899 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:29.753113985 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:29.873243093 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:30.182424068 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:30.226478100 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:30.375303030 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:30.376857042 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:30.496421099 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:30.496517897 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:30.616879940 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:42.923331976 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:43.043646097 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:43.043812037 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:43.163748026 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:43.481240988 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:43.523339987 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:43.675857067 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:43.677515030 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:43.797555923 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:43.797617912 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:43.919270039 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:55.912815094 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:55.961724043 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:56.105763912 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:56.148474932 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:56.196577072 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:56.321353912 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:56.321800947 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:56.484153986 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:56.769371033 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:56.820251942 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:56.961245060 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:56.963002920 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:57.083451986 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:08:57.083870888 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:08:57.204525948 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:09.477078915 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:09.599991083 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:09.600063086 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:09.719521046 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:10.022989035 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:10.070290089 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:10.214107037 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:10.215542078 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:10.336384058 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:10.336489916 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:10.456326962 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:22.758306980 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:22.878806114 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:22.878942013 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:22.998502016 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:23.301453114 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:23.351725101 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:23.490752935 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:23.492521048 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:23.615922928 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:23.615968943 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:23.735486984 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:25.149131060 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:25.273305893 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:25.274774075 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:25.553881884 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:25.838253021 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:25.883225918 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Dec 18, 2024 12:09:26.029426098 CET | 8848 | 49739 | 51.89.44.68 | 192.168.2.4 |
Dec 18, 2024 12:09:26.070363045 CET | 49739 | 8848 | 192.168.2.4 | 51.89.44.68 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 12:07:20.791562080 CET | 53991 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 18, 2024 12:07:20.929658890 CET | 53 | 53991 | 1.1.1.1 | 192.168.2.4 |
Dec 18, 2024 12:07:23.146152973 CET | 52196 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 18, 2024 12:07:23.284399033 CET | 53 | 52196 | 1.1.1.1 | 192.168.2.4 |
Dec 18, 2024 12:07:23.296003103 CET | 63504 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 18, 2024 12:07:23.435605049 CET | 53 | 63504 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 12:07:20.791562080 CET | 192.168.2.4 | 1.1.1.1 | 0xb809 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 12:07:23.146152973 CET | 192.168.2.4 | 1.1.1.1 | 0x264f | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false | |
Dec 18, 2024 12:07:23.296003103 CET | 192.168.2.4 | 1.1.1.1 | 0x75fa | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 12:07:20.929658890 CET | 1.1.1.1 | 192.168.2.4 | 0xb809 | No error (0) | 185.199.108.133 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:07:20.929658890 CET | 1.1.1.1 | 192.168.2.4 | 0xb809 | No error (0) | 185.199.110.133 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:07:20.929658890 CET | 1.1.1.1 | 192.168.2.4 | 0xb809 | No error (0) | 185.199.111.133 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:07:20.929658890 CET | 1.1.1.1 | 192.168.2.4 | 0xb809 | No error (0) | 185.199.109.133 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:07:23.284399033 CET | 1.1.1.1 | 192.168.2.4 | 0x264f | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false | |
Dec 18, 2024 12:07:23.435605049 CET | 1.1.1.1 | 192.168.2.4 | 0x75fa | No error (0) | 20.233.83.145 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:07:32.514070034 CET | 1.1.1.1 | 192.168.2.4 | 0x6322 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 12:07:32.514070034 CET | 1.1.1.1 | 192.168.2.4 | 0x6322 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49732 | 185.199.108.133 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:22 UTC | 128 | OUT | |
2024-12-18 11:07:23 UTC | 900 | IN | |
2024-12-18 11:07:23 UTC | 1275 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49734 | 185.199.108.133 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:22 UTC | 119 | OUT | |
2024-12-18 11:07:23 UTC | 900 | IN | |
2024-12-18 11:07:23 UTC | 1378 | IN | |
2024-12-18 11:07:23 UTC | 1378 | IN | |
2024-12-18 11:07:23 UTC | 97 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49735 | 185.199.108.133 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:22 UTC | 123 | OUT | |
2024-12-18 11:07:23 UTC | 900 | IN | |
2024-12-18 11:07:23 UTC | 1110 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 185.199.108.133 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:22 UTC | 124 | OUT | |
2024-12-18 11:07:22 UTC | 899 | IN | |
2024-12-18 11:07:22 UTC | 1378 | IN | |
2024-12-18 11:07:22 UTC | 1378 | IN | |
2024-12-18 11:07:22 UTC | 389 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49731 | 185.199.108.133 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:22 UTC | 120 | OUT | |
2024-12-18 11:07:23 UTC | 900 | IN | |
2024-12-18 11:07:23 UTC | 1246 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49730 | 185.199.108.133 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:22 UTC | 126 | OUT | |
2024-12-18 11:07:23 UTC | 898 | IN | |
2024-12-18 11:07:23 UTC | 31 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49736 | 20.233.83.145 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:25 UTC | 105 | OUT | |
2024-12-18 11:07:25 UTC | 556 | IN | |
2024-12-18 11:07:25 UTC | 3380 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49737 | 185.199.108.133 | 443 | 6768 | C:\Users\user\Desktop\Lu4421.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 11:07:27 UTC | 92 | OUT | |
2024-12-18 11:07:27 UTC | 899 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN | |
2024-12-18 11:07:27 UTC | 1378 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 06:07:17 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\Lu4421.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb50000 |
File size: | 5'865'472 bytes |
MD5 hash: | E5358FCA58C0E1B1E29EB195FB0F4675 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 06:07:27 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xdd0000 |
File size: | 65'024 bytes |
MD5 hash: | 67CA41C73D556CC4CFC67FC5B425BBBD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 06:07:27 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff783d80000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 14.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 23% |
Total number of Nodes: | 87 |
Total number of Limit Nodes: | 4 |
Graph
Function 00007FFD9B7FAB70 Relevance: .8, Instructions: 828COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F7DA6 Relevance: .5, Instructions: 468COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F8B52 Relevance: .5, Instructions: 454COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011A736A Relevance: 3.1, APIs: 2, Instructions: 128timeCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011A740C Relevance: 3.1, APIs: 2, Instructions: 102timeCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011ABE1B Relevance: 3.1, APIs: 2, Instructions: 78COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FBAE2 Relevance: .3, Instructions: 336COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F8766 Relevance: .3, Instructions: 327COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F9AD3 Relevance: .3, Instructions: 296COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F29F9 Relevance: .2, Instructions: 247COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800BFB Relevance: .2, Instructions: 223COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FE819 Relevance: .2, Instructions: 207COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FB6B9 Relevance: .2, Instructions: 205COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FC0A8 Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F528C Relevance: .2, Instructions: 191COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FFE99 Relevance: .2, Instructions: 190COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FD22D Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F3F3A Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FC4EB Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FAB90 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FBE3D Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F3F7E Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F08A9 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FFBFC Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800CE0 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FC326 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FFF15 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F92B0 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FAC90 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FABE8 Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FF7E9 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F0788 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FC29A Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FFB9C Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F0860 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F104D Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F0F29 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B801190 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FF42A Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FBAAD Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FE15D Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F3F15 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FF6CD Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F0FAA Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FBA07 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F3E00 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F3D5B Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FE0B7 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7FFEF3 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800579 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011AF5A5 Relevance: 12.5, APIs: 6, Strings: 1, Instructions: 283threadCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011AC333 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 197threadinjectionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 22.9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 15.1% |
Total number of Nodes: | 53 |
Total number of Limit Nodes: | 5 |
Graph
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|