Windows
Analysis Report
8DiSW8IPEF.exe
Overview
General Information
Sample name: | 8DiSW8IPEF.exerenamed because original name is a hash value |
Original sample name: | f40324b0b7698fa26e5f6ac1b96aca4a037c0ce92739bef46184e25fce617444.exe |
Analysis ID: | 1579074 |
MD5: | ad71876f6dfb18657b7ee257084b6c8b |
SHA1: | 02af6c56f55066b24e85e91f8eb97a954fc545fd |
SHA256: | f40324b0b7698fa26e5f6ac1b96aca4a037c0ce92739bef46184e25fce617444 |
Tags: | exeuser-Chainskilabs |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 8DiSW8IPEF.exe (PID: 5972 cmdline:
"C:\Users\ user\Deskt op\8DiSW8I PEF.exe" MD5: AD71876F6DFB18657B7EE257084B6C8B) - powershell.exe (PID: 6392 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nPath 'C:\ Users\user \Desktop\8 DiSW8IPEF. exe' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4760 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nProcess ' 8DiSW8IPEF .exe' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["below-judge.gl.at.ply.gg"], "Port": 36197, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T19:13:51.515432+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49993 | 147.185.221.24 | 36197 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | DNS query: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_2_00007FF848F216F1 | |
Source: | Code function: | 0_2_00007FF848F265E2 | |
Source: | Code function: | 0_2_00007FF848F25836 | |
Source: | Code function: | 0_2_00007FF848F2352D | |
Source: | Code function: | 0_2_00007FF848F25035 | |
Source: | Code function: | 2_2_00007FF848FD30E9 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 2_2_00007FF848DED2A6 | |
Source: | Code function: | 2_2_00007FF848FD231B | |
Source: | Code function: | 5_2_00007FF848E0D2A6 | |
Source: | Code function: | 5_2_00007FF848F219E9 | |
Source: | Code function: | 5_2_00007FF848FF231B |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | HTTP traffic detected: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Code function: | 0_2_00007FF848F26DE1 |
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Process created: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 11 Disable or Modify Tools | OS Credential Dumping | 441 Security Software Discovery | Remote Services | 11 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 151 Virtualization/Sandbox Evasion | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 151 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Obfuscated Files or Information | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | 12 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 23 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
79% | ReversingLabs | Win32.Exploit.Xworm | ||
100% | Avira | TR/Spy.Gen | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
below-judge.gl.at.ply.gg | 147.185.221.24 | true | true | unknown | |
ip-api.com | 208.95.112.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
147.185.221.24 | below-judge.gl.at.ply.gg | United States | 12087 | SALSGIVERUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579074 |
Start date and time: | 2024-12-20 19:10:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 8DiSW8IPEF.exerenamed because original name is a hash value |
Original Sample Name: | f40324b0b7698fa26e5f6ac1b96aca4a037c0ce92739bef46184e25fce617444.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@7/9@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 4760 because it is empty
- Execution Graph export aborted for target powershell.exe, PID 6392 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: 8DiSW8IPEF.exe
Time | Type | Description |
---|---|---|
13:11:07 | API Interceptor | |
13:11:26 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
208.95.112.1 | Get hash | malicious | AsyncRAT, XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Go Stealer, Skuld Stealer | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Python Stealer, Monster Stealer | Browse |
| ||
Get hash | malicious | Python Stealer, Monster Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ip-api.com | Get hash | malicious | AsyncRAT, XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Go Stealer, Skuld Stealer | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Python Stealer, Monster Stealer | Browse |
| ||
Get hash | malicious | Python Stealer, Monster Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TUT-ASUS | Get hash | malicious | AsyncRAT, XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | NetSupport RAT, LummaC, Amadey, Blank Grabber, LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Go Stealer, Skuld Stealer | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Python Stealer, Monster Stealer | Browse |
| ||
SALSGIVERUS | Get hash | malicious | AsyncRAT, XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, Xmrig | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 0.34726597513537405 |
Encrypted: | false |
SSDEEP: | 3:Nlll:Nll |
MD5: | 446DD1CF97EABA21CF14D03AEBC79F27 |
SHA1: | 36E4CC7367E0C7B40F4A8ACE272941EA46373799 |
SHA-256: | A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF |
SHA-512: | A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.8778689612041255 |
TrID: |
|
File name: | 8DiSW8IPEF.exe |
File size: | 66'560 bytes |
MD5: | ad71876f6dfb18657b7ee257084b6c8b |
SHA1: | 02af6c56f55066b24e85e91f8eb97a954fc545fd |
SHA256: | f40324b0b7698fa26e5f6ac1b96aca4a037c0ce92739bef46184e25fce617444 |
SHA512: | f57a95a15de16f3ded4979aeb93f820222d40da6ca63b515ec73211deb09b8be23a6fe21b76ee89cc3583fb5ce3d348e16c467fc1bb493308366a19a89f3f24a |
SSDEEP: | 1536:zZ+dcvTkbb4zx+C3HkL9jcz+lzbTfpBPKbu63SOJj9QAVyS+:VdQwzR0L9gzcb7pYbSOJKAVg |
TLSH: | 47534B2877F14515F1FFAFF06DF27122C776B6235902E65F2498428A0723A88CE166F9 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.dg................................. ... ....@.. .......................`............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x41181e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6764B232 [Thu Dec 19 23:54:26 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x117cc | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x12000 | 0x4ce | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x14000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xf824 | 0xfa00 | 8a436995219a4bca5a71cdc12a823849 | False | 0.59365625 | data | 5.959257057430584 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x12000 | 0x4ce | 0x600 | d31e83d571e4a0c2c24ce1a115352655 | False | 0.373046875 | data | 3.7069016765347786 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x14000 | 0xc | 0x200 | 72a3c8f9a8c07c217f62ec51bb94d9a5 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x120a0 | 0x244 | data | 0.4706896551724138 | ||
RT_MANIFEST | 0x122e4 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T19:12:32.301021+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.5 | 49870 | 147.185.221.24 | 36197 | TCP |
2024-12-20T19:13:51.515432+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.5 | 49993 | 147.185.221.24 | 36197 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 20, 2024 19:11:06.183303118 CET | 49704 | 80 | 192.168.2.5 | 208.95.112.1 |
Dec 20, 2024 19:11:06.304714918 CET | 80 | 49704 | 208.95.112.1 | 192.168.2.5 |
Dec 20, 2024 19:11:06.304932117 CET | 49704 | 80 | 192.168.2.5 | 208.95.112.1 |
Dec 20, 2024 19:11:06.305644035 CET | 49704 | 80 | 192.168.2.5 | 208.95.112.1 |
Dec 20, 2024 19:11:06.425225973 CET | 80 | 49704 | 208.95.112.1 | 192.168.2.5 |
Dec 20, 2024 19:11:07.457724094 CET | 80 | 49704 | 208.95.112.1 | 192.168.2.5 |
Dec 20, 2024 19:11:07.499345064 CET | 49704 | 80 | 192.168.2.5 | 208.95.112.1 |
Dec 20, 2024 19:11:27.338417053 CET | 49721 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:27.457990885 CET | 36197 | 49721 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:27.458153963 CET | 49721 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:27.522846937 CET | 49721 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:27.642606974 CET | 36197 | 49721 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:32.882323980 CET | 36197 | 49721 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:32.882396936 CET | 49721 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:34.311916113 CET | 49721 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:34.314064980 CET | 49740 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:34.431649923 CET | 36197 | 49721 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:34.433793068 CET | 36197 | 49740 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:34.433902025 CET | 49740 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:34.452821016 CET | 49740 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:34.572506905 CET | 36197 | 49740 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:39.971576929 CET | 36197 | 49740 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:39.971719980 CET | 49740 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:43.687083960 CET | 49740 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:43.690502882 CET | 49762 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:43.806875944 CET | 36197 | 49740 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:43.810152054 CET | 36197 | 49762 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:43.810278893 CET | 49762 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:43.828644991 CET | 49762 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:43.948412895 CET | 36197 | 49762 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:49.205214977 CET | 36197 | 49762 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:49.205646992 CET | 49762 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:52.358947039 CET | 49762 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:52.360449076 CET | 49783 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:52.478650093 CET | 36197 | 49762 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:52.480036020 CET | 36197 | 49783 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:52.480158091 CET | 49783 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:52.499195099 CET | 49783 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:11:52.619384050 CET | 36197 | 49783 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:58.009124041 CET | 36197 | 49783 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:11:58.009228945 CET | 49783 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:01.827698946 CET | 49783 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:01.832505941 CET | 49805 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:01.947371960 CET | 36197 | 49783 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:01.952068090 CET | 36197 | 49805 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:01.955770016 CET | 49805 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:01.972126961 CET | 49805 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:02.091701984 CET | 36197 | 49805 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:08.127938986 CET | 36197 | 49805 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:08.128038883 CET | 49805 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:08.999484062 CET | 49805 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:09.001307964 CET | 49822 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:09.119410992 CET | 36197 | 49805 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:09.121155024 CET | 36197 | 49822 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:09.121278048 CET | 49822 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:09.139004946 CET | 49822 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:09.258712053 CET | 36197 | 49822 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:12.330498934 CET | 80 | 49704 | 208.95.112.1 | 192.168.2.5 |
Dec 20, 2024 19:12:12.330605030 CET | 49704 | 80 | 192.168.2.5 | 208.95.112.1 |
Dec 20, 2024 19:12:14.472623110 CET | 36197 | 49822 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:14.472729921 CET | 49822 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:15.328810930 CET | 49822 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:15.331105947 CET | 49838 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:15.449266911 CET | 36197 | 49822 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:15.451893091 CET | 36197 | 49838 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:15.451992989 CET | 49838 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:15.495932102 CET | 49838 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:15.615776062 CET | 36197 | 49838 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:23.139962912 CET | 36197 | 49838 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:23.140086889 CET | 49838 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:23.281239033 CET | 49838 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:23.335834980 CET | 49858 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:23.401199102 CET | 36197 | 49838 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:23.455497026 CET | 36197 | 49858 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:23.455581903 CET | 49858 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:23.474983931 CET | 49858 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:23.594618082 CET | 36197 | 49858 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:28.833039999 CET | 36197 | 49858 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:28.833134890 CET | 49858 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:28.843441963 CET | 49858 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:28.846702099 CET | 49870 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:28.963128090 CET | 36197 | 49858 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:28.966291904 CET | 36197 | 49870 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:28.966373920 CET | 49870 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:28.984941959 CET | 49870 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:29.104686022 CET | 36197 | 49870 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:32.301021099 CET | 49870 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:32.420464993 CET | 36197 | 49870 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:33.422852039 CET | 49870 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:33.542356014 CET | 36197 | 49870 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:34.329360008 CET | 36197 | 49870 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:34.329426050 CET | 49870 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:36.343127966 CET | 49870 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:36.345622063 CET | 49890 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:36.462873936 CET | 36197 | 49870 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:36.465286016 CET | 36197 | 49890 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:36.465451956 CET | 49890 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:36.503561974 CET | 49890 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:36.623202085 CET | 36197 | 49890 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:36.623266935 CET | 49890 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:36.743061066 CET | 36197 | 49890 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:40.939409018 CET | 49890 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:41.059073925 CET | 36197 | 49890 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:43.145589113 CET | 36197 | 49890 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:43.145683050 CET | 49890 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:46.655611992 CET | 49890 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:46.658468008 CET | 49916 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:46.775173903 CET | 36197 | 49890 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:46.778059006 CET | 36197 | 49916 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:46.778243065 CET | 49916 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:46.814785957 CET | 49916 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:46.934279919 CET | 36197 | 49916 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:47.470581055 CET | 49704 | 80 | 192.168.2.5 | 208.95.112.1 |
Dec 20, 2024 19:12:47.590034008 CET | 80 | 49704 | 208.95.112.1 | 192.168.2.5 |
Dec 20, 2024 19:12:52.166882992 CET | 36197 | 49916 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:52.166979074 CET | 49916 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:57.046348095 CET | 49916 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:57.049083948 CET | 49937 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:57.165977001 CET | 36197 | 49916 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:57.169029951 CET | 36197 | 49937 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:57.169161081 CET | 49937 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:57.239936113 CET | 49937 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:57.359565973 CET | 36197 | 49937 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:12:57.359658957 CET | 49937 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:12:57.479286909 CET | 36197 | 49937 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:02.540095091 CET | 36197 | 49937 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:02.540160894 CET | 49937 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:02.611244917 CET | 49937 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:02.614809990 CET | 49951 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:02.730799913 CET | 36197 | 49937 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:02.734342098 CET | 36197 | 49951 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:02.734471083 CET | 49951 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:02.780217886 CET | 49951 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:02.900044918 CET | 36197 | 49951 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:02.903750896 CET | 49951 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:03.023332119 CET | 36197 | 49951 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:08.212374926 CET | 36197 | 49951 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:08.212450981 CET | 49951 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:08.390048981 CET | 49951 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:08.392541885 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:08.509630919 CET | 36197 | 49951 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:08.512093067 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:08.512196064 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:08.561696053 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:08.681274891 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:11.032305956 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:11.151896000 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:12.624584913 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:12.746364117 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:13.906099081 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.025777102 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.025840044 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.118191004 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.118264914 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.118324995 CET | 49967 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.120425940 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.145379066 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.237798929 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.237812996 CET | 36197 | 49967 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.240051031 CET | 36197 | 49979 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.240130901 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.276878119 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.396506071 CET | 36197 | 49979 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.396578074 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.516253948 CET | 36197 | 49979 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:14.516319990 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:14.635891914 CET | 36197 | 49979 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:16.140362978 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:16.260039091 CET | 36197 | 49979 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:20.010083914 CET | 36197 | 49979 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:20.010557890 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:24.813692093 CET | 49979 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:24.814835072 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:24.933132887 CET | 36197 | 49979 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:24.935123920 CET | 36197 | 49991 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:24.935210943 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:24.974458933 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:25.094010115 CET | 36197 | 49991 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:25.094068050 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:25.214462042 CET | 36197 | 49991 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:25.214534998 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:25.334094048 CET | 36197 | 49991 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:27.218547106 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:27.338027000 CET | 36197 | 49991 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:30.462976933 CET | 36197 | 49991 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:30.463078976 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:35.405636072 CET | 49991 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:35.409270048 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:35.525842905 CET | 36197 | 49991 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:35.529591084 CET | 36197 | 49992 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:35.529665947 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:35.572382927 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:35.691848040 CET | 36197 | 49992 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:35.691976070 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:35.811728954 CET | 36197 | 49992 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:35.812525034 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:35.932188034 CET | 36197 | 49992 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:35.937087059 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:36.056647062 CET | 36197 | 49992 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:40.908977032 CET | 36197 | 49992 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:40.909044027 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:40.986145973 CET | 49992 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:40.989095926 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:41.105937004 CET | 36197 | 49992 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:41.108671904 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:41.108748913 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:41.150340080 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:41.270495892 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:41.270603895 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:41.390315056 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:42.672169924 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:42.791881084 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:43.749628067 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:43.869548082 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:48.269731998 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:48.389466047 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:51.515431881 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:51.635457039 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:57.405934095 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:57.526643991 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:13:57.526694059 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:13:57.646217108 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:07.093439102 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:07.093504906 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:07.452522993 CET | 49993 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:07.455269098 CET | 49994 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:07.572143078 CET | 36197 | 49993 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:07.575001955 CET | 36197 | 49994 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:07.575076103 CET | 49994 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:07.613483906 CET | 49994 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:07.733273029 CET | 36197 | 49994 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:07.733319044 CET | 49994 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:07.854990005 CET | 36197 | 49994 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:07.855149031 CET | 49994 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:07.977585077 CET | 36197 | 49994 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:12.905949116 CET | 36197 | 49994 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:12.906105995 CET | 49994 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:12.906510115 CET | 49994 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:12.908373117 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:13.026957035 CET | 36197 | 49994 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:13.028651953 CET | 36197 | 49995 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:13.028768063 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:13.063412905 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:13.183126926 CET | 36197 | 49995 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:13.202706099 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:13.322431087 CET | 36197 | 49995 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:13.703008890 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:13.822709084 CET | 36197 | 49995 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:16.173719883 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:16.293200970 CET | 36197 | 49995 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:18.433183908 CET | 36197 | 49995 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:18.433296919 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:23.374625921 CET | 49995 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:23.377099991 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:23.494062901 CET | 36197 | 49995 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:23.496609926 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:23.496704102 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:23.530968904 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:23.650635004 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:23.650696993 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:23.770196915 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:23.770245075 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:23.889767885 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:23.889894009 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:24.009442091 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:24.009630919 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:24.129416943 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:29.190546989 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:29.190700054 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:33.924462080 CET | 49996 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:33.927026033 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:34.044198990 CET | 36197 | 49996 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:34.046542883 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:34.046654940 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:34.147403955 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:34.266990900 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:36.515269995 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:36.634887934 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.265535116 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.385191917 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.385262012 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.428241014 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.428308010 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.428340912 CET | 49997 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.429857016 CET | 49998 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.504854918 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.548099041 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.548110962 CET | 36197 | 49997 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.549695015 CET | 36197 | 49998 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.549803019 CET | 49998 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.583112955 CET | 49998 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.702672005 CET | 36197 | 49998 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:39.702794075 CET | 49998 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:39.822597980 CET | 36197 | 49998 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:44.926407099 CET | 36197 | 49998 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:44.926501989 CET | 49998 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:49.874402046 CET | 49998 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:49.877007961 CET | 49999 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:49.994093895 CET | 36197 | 49998 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:49.996649981 CET | 36197 | 49999 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:49.996726036 CET | 49999 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:50.030890942 CET | 49999 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:50.150537014 CET | 36197 | 49999 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:55.354024887 CET | 36197 | 49999 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:55.354099035 CET | 49999 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:55.593229055 CET | 49999 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:55.596256971 CET | 50000 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:55.712829113 CET | 36197 | 49999 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:55.715789080 CET | 36197 | 50000 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:14:55.715910912 CET | 50000 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:55.751060963 CET | 50000 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:14:55.870637894 CET | 36197 | 50000 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:01.069931984 CET | 36197 | 50000 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:01.070266962 CET | 50000 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:05.798279047 CET | 50000 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:05.803668976 CET | 50001 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:05.919075012 CET | 36197 | 50000 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:05.925834894 CET | 36197 | 50001 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:05.925965071 CET | 50001 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:05.962979078 CET | 50001 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:06.086786032 CET | 36197 | 50001 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:06.782541037 CET | 50001 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:06.904359102 CET | 36197 | 50001 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:11.270129919 CET | 36197 | 50001 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:11.270209074 CET | 50001 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:16.859021902 CET | 50001 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:16.863636971 CET | 50002 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:16.978667021 CET | 36197 | 50001 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:16.983211040 CET | 36197 | 50002 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:16.983303070 CET | 50002 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:17.015274048 CET | 50002 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:17.134772062 CET | 36197 | 50002 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:22.365262032 CET | 36197 | 50002 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:22.365360022 CET | 50002 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:27.780750036 CET | 50002 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:27.781949997 CET | 50003 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:27.900901079 CET | 36197 | 50002 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:27.901797056 CET | 36197 | 50003 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:27.901964903 CET | 50003 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:27.919338942 CET | 50003 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:28.039052010 CET | 36197 | 50003 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:33.243294001 CET | 36197 | 50003 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:33.243386984 CET | 50003 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:34.030664921 CET | 50003 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:34.031879902 CET | 50004 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:34.150216103 CET | 36197 | 50003 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:34.151345015 CET | 36197 | 50004 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:34.151431084 CET | 50004 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:34.166912079 CET | 50004 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:34.286556005 CET | 36197 | 50004 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:39.500932932 CET | 36197 | 50004 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:39.501004934 CET | 50004 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:41.375586033 CET | 50004 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:41.376211882 CET | 50005 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:41.495644093 CET | 36197 | 50004 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:41.496148109 CET | 36197 | 50005 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 19:15:41.496314049 CET | 50005 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:41.508346081 CET | 50005 | 36197 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 19:15:41.628328085 CET | 36197 | 50005 | 147.185.221.24 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 20, 2024 19:11:06.036786079 CET | 57337 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 20, 2024 19:11:06.176503897 CET | 53 | 57337 | 1.1.1.1 | 192.168.2.5 |
Dec 20, 2024 19:11:27.059854984 CET | 57402 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 20, 2024 19:11:27.333313942 CET | 53 | 57402 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 20, 2024 19:11:06.036786079 CET | 192.168.2.5 | 1.1.1.1 | 0x16f4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 20, 2024 19:11:27.059854984 CET | 192.168.2.5 | 1.1.1.1 | 0x886e | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 20, 2024 19:11:06.176503897 CET | 1.1.1.1 | 192.168.2.5 | 0x16f4 | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 20, 2024 19:11:27.333313942 CET | 1.1.1.1 | 192.168.2.5 | 0x886e | No error (0) | 147.185.221.24 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 208.95.112.1 | 80 | 5972 | C:\Users\user\Desktop\8DiSW8IPEF.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 20, 2024 19:11:06.305644035 CET | 80 | OUT | |
Dec 20, 2024 19:11:07.457724094 CET | 175 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:11:01 |
Start date: | 20/12/2024 |
Path: | C:\Users\user\Desktop\8DiSW8IPEF.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x750000 |
File size: | 66'560 bytes |
MD5 hash: | AD71876F6DFB18657B7EE257084B6C8B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 13:11:06 |
Start date: | 20/12/2024 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7be880000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:11:06 |
Start date: | 20/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 13:11:13 |
Start date: | 20/12/2024 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7be880000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 13:11:13 |
Start date: | 20/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 20.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 21.4% |
Total number of Nodes: | 14 |
Total number of Limit Nodes: | 1 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F25836 Relevance: .5, Instructions: 470COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F265E2 Relevance: .5, Instructions: 456COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F216F1 Relevance: .4, Instructions: 388COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F2897D Relevance: 3.7, APIs: 1, Strings: 1, Instructions: 246COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F2352D Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F25035 Relevance: .3, Instructions: 322COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F0A042 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F09758 Relevance: .1, Instructions: 131COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848DEE620 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F0A62C Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F033B5 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848FD4400 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F29780 Relevance: .1, Instructions: 129COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F2A49C Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F233B5 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848F2A0FB Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848FF414D Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848FF4400 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848FF41D1 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|