Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tftpd64.exe

Overview

General Information

Sample name:tftpd64.exe
Analysis ID:1579526
MD5:3c1e3215acc69f06f044802ed4695333
SHA1:ea34a6bad04bc5a1fcb494668347cd302557f327
SHA256:34de53b43c32e3ed5231a57683103acad1aebeef08309cf8e770c27acc90e4e7
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info

Classification

  • System is w11x64_office
  • tftpd64.exe (PID: 1292 cmdline: "C:\Users\user\Desktop\tftpd64.exe" MD5: 3C1E3215ACC69F06F044802ED4695333)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: tftpd64.exeVirustotal: Detection: 6%Perma Link
Source: tftpd64.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: res.public.onecdn.static.microsoft
Source: tftpd64.exeString found in binary or memory: http://tftpd32.jounin.net
Source: tftpd64.exe, 00000001.00000000.11800683059.00007FF748EC7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNametftpd32. vs tftpd64.exe
Source: tftpd64.exeBinary or memory string: OriginalFileNametftpd32. vs tftpd64.exe
Source: classification engineClassification label: mal48.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\tftpd64.exeMutant created: NULL
Source: C:\Users\user\Desktop\tftpd64.exeMutant created: \Sessions\1\BaseNamedObjects\<Tftpd32> by Ph. Jounin MutEx
Source: tftpd64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\tftpd64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: tftpd64.exeVirustotal: Detection: 6%
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: nlansp_c.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeWindow found: window name: SysTabControl32Jump to behavior
Source: C:\Users\user\Desktop\tftpd64.exeWindow detected: Number of UI elements: 25
Source: tftpd64.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: tftpd64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: tftpd64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: tftpd64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: tftpd64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: tftpd64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: tftpd64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: tftpd64.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: tftpd64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: tftpd64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: tftpd64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: tftpd64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: tftpd64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: tftpd64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: tftpd64.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\tftpd64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: tftpd64.exe, 00000001.00000002.12113517503.000001B7390C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWbl%SystemRoot%\system32\mswsock.dllSystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windowsj
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
tftpd64.exe8%ReversingLabs
tftpd64.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
sni1gl.wpc.sigmacdn.net
152.199.21.175
truefalse
    high
    res.public.onecdn.static.microsoft
    unknown
    unknownfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://tftpd32.jounin.nettftpd64.exefalse
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        IP
        127.0.0.1
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1579526
        Start date and time:2024-12-22 21:03:59 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 34s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
        Run name:Potential for more IOCs and behavior
        Number of analysed new started processes analysed:11
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:tftpd64.exe
        Detection:MAL
        Classification:mal48.winEXE@1/0@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, backgroundTaskHost.exe
        • Excluded IPs from analysis (whitelisted): 104.18.38.233, 172.64.149.23, 104.126.113.243, 4.175.87.197, 20.223.35.26
        • Excluded domains from analysis (whitelisted): res-ocdi-public.trafficmanager.net, cdn-office.azureedge.net, crt.comodoca.com.cdn.cloudflare.net, slscr.update.microsoft.com, store-images.s-microsoft.com, fd.api.iris.microsoft.com, cdn-office.ec.azureedge.net, crt.comodoca.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        sni1gl.wpc.sigmacdn.netSWIFT.xlsGet hashmaliciousUnknownBrowse
        • 152.199.21.175
        invoice.docmGet hashmaliciousMetasploitBrowse
        • 152.199.21.175
        Ball - Temp.data for GCMs.docGet hashmaliciousHTMLPhisherBrowse
        • 152.199.21.175
        Order_948575494759.xlsGet hashmaliciousUnknownBrowse
        • 152.199.21.175
        index.html.docxGet hashmaliciousUnknownBrowse
        • 152.199.21.175
        https://syndiclair-my.sharepoint.com/:o:/g/personal/ml_syndiclair_fr/En8EbZMYpZ5CodZQ05mt4IMBGZHEHcSylnIeMh0DoULmZw?e=UkXb4YGet hashmaliciousUnknownBrowse
        • 152.199.21.175
        https://1drv.ms/w/c/17cc1e7b64547fa0/ER4uyAUCto9GkfZ_Sw-4_NAB9TeJj_jWV9oRzb3kdQINFQ?e=4%3aaVtPRh&sharingv2=true&fromShare=true&at=9Get hashmaliciousUnknownBrowse
        • 152.199.21.175
        174 Power Global_Enrollment_.docx.docGet hashmaliciousUnknownBrowse
        • 152.199.21.175
        https://mailustabucaedu-my.sharepoint.com/:u:/g/personal/stella_pabon_ustabuca_edu_co/EWCk8BqICKBBrExz32n-PvYBCVoLK4PToNCGKPT0vElGYg?e=w0tQWEGet hashmaliciousUnknownBrowse
        • 152.199.21.175
        wayneenterprisesbatcave-6.0.1901-windows-installer.msiGet hashmaliciousScreenConnect ToolBrowse
        • 152.199.21.175
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (GUI) x86-64, for MS Windows
        Entropy (8bit):6.13463524328579
        TrID:
        • Win64 Executable GUI (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:tftpd64.exe
        File size:392'704 bytes
        MD5:3c1e3215acc69f06f044802ed4695333
        SHA1:ea34a6bad04bc5a1fcb494668347cd302557f327
        SHA256:34de53b43c32e3ed5231a57683103acad1aebeef08309cf8e770c27acc90e4e7
        SHA512:82ed2edbb7286aac00b946f7f4c79e59079994fe8385e961abd1291440fdf26e14c724943eaabebb517e921ece4b384b9d50905898d71f2efaa427be7082d2d0
        SSDEEP:3072:2UANSGQV9/2Q2ZE1nEDBRjDds0FmgMUIpipKfHEZji+jbqLvInpmU9tqx2sFnU59:QsqE1nEDPlTFmkpckZW8qbIZpsX9
        TLSH:6D844956B396C8E9DC6E81388853C616D6717C140BB18AEB63B0B75EBF33261CD39B11
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............j`..j`..j`...d..j`...c..j`...e.4j`.2.e..j`.2.d..j`.2.c..j`.=.d..j`...a..j`..ja..k`.=.h..j`.=....j`..j...j`.=.b..j`.Rich.j`
        Icon Hash:060935cc23261860
        Entrypoint:0x140019f08
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x5C76800E [Wed Feb 27 12:18:22 2019 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:2
        File Version Major:5
        File Version Minor:2
        Subsystem Version Major:5
        Subsystem Version Minor:2
        Import Hash:cd339696c8e5d1a47aa69598eea5f5d8
        Instruction
        dec eax
        sub esp, 28h
        call 00007FD0109C0574h
        dec eax
        add esp, 28h
        jmp 00007FD0109C00DFh
        int3
        int3
        dec eax
        sub esp, 28h
        dec ebp
        mov eax, dword ptr [ecx+38h]
        dec eax
        mov ecx, edx
        dec ecx
        mov edx, ecx
        call 00007FD0109C0272h
        mov eax, 00000001h
        dec eax
        add esp, 28h
        ret
        int3
        int3
        int3
        inc eax
        push ebx
        inc ebp
        mov ebx, dword ptr [eax]
        dec eax
        mov ebx, edx
        inc ecx
        and ebx, FFFFFFF8h
        dec esp
        mov ecx, ecx
        inc ecx
        test byte ptr [eax], 00000004h
        dec esp
        mov edx, ecx
        je 00007FD0109C0275h
        inc ecx
        mov eax, dword ptr [eax+08h]
        dec ebp
        arpl word ptr [eax+04h], dx
        neg eax
        dec esp
        add edx, ecx
        dec eax
        arpl ax, cx
        dec esp
        and edx, ecx
        dec ecx
        arpl bx, ax
        dec edx
        mov edx, dword ptr [eax+edx]
        dec eax
        mov eax, dword ptr [ebx+10h]
        mov ecx, dword ptr [eax+08h]
        dec eax
        mov eax, dword ptr [ebx+08h]
        test byte ptr [ecx+eax+03h], 0000000Fh
        je 00007FD0109C026Dh
        movzx eax, byte ptr [ecx+eax+03h]
        and eax, FFFFFFF0h
        dec esp
        add ecx, eax
        dec esp
        xor ecx, edx
        dec ecx
        mov ecx, ecx
        pop ebx
        jmp 00007FD0109BFCBEh
        int3
        dec eax
        sub esp, 28h
        call 00007FD0109C0A1Ch
        test eax, eax
        je 00007FD0109C0283h
        dec eax
        mov eax, dword ptr [00000030h]
        dec eax
        mov ecx, dword ptr [eax+08h]
        jmp 00007FD0109C0267h
        dec eax
        cmp ecx, eax
        je 00007FD0109C0276h
        xor eax, eax
        dec eax
        cmpxchg dword ptr [00035994h], ecx
        jne 00007FD0109C0250h
        xor al, al
        dec eax
        add esp, 28h
        ret
        mov al, 01h
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x4a1580xc8.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b0000xf3b0.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x670000x25f8.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x824.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x473200x38.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x473600x108.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x3a0000x8b0.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x385f00x38600c270544398209a3a2d52f25a8946f67aFalse0.565449175443459zlib compressed data6.461654844462193IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x3a0000x11c0e0x11e00a7935c60e8d392de7929370d58fa7f70False0.4387428977272727data5.343771610036835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x4c0000x1a2800x300075c303ab6b320ce8f11c636d553deeccFalse0.23014322916666666data2.740224600122874IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x670000x25f80x260030f34053ba313bb5e23c39349a256ebdFalse0.4953741776315789data5.582322651430407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        _RDATA0x6a0000x940x20075333c9895ad9e4ebe1bc543ebf8e6beFalse0.2109375data1.4251822591191758IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x6b0000xf3b00xf40078706b718a05c67bc2e4476b1eefe403False0.13545402151639344data3.189242819964901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x7b0000x8240xa00faa181d89f44777d4011b833d0024d8aFalse0.52265625data4.943657624907388IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x6d7e80xa068Device independent bitmap graphic, 256 x 512 x 4, image size 32768, 16 important colorsEnglishUnited States0.060417884278199885
        RT_ICON0x778500xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048, 16 important colorsEnglishUnited States0.23123123123123124
        RT_ICON0x782b80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.3924731182795699
        RT_ICON0x785a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152, 16 important colorsEnglishUnited States0.29573170731707316
        RT_ICON0x78c080x4c8Device independent bitmap graphic, 40 x 80 x 4, image size 800, 16 important colorsEnglishUnited States0.3276143790849673
        RT_ICON0x791200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.09380863039399624
        RT_MENU0x7a1e00x2adataEnglishUnited States1.0952380952380953
        RT_MENU0x7a2100x1cdataEnglishUnited States1.1071428571428572
        RT_DIALOG0x6b6480x91cdataEnglishUnited States0.4009433962264151
        RT_DIALOG0x6bf680xd0dataEnglishUnited States0.7692307692307693
        RT_DIALOG0x6c0380x13d8dataEnglishUnited States0.3387795275590551
        RT_DIALOG0x6d4100xeedataEnglishUnited States0.6470588235294118
        RT_DIALOG0x6d5000x106dataEnglishUnited States0.6870229007633588
        RT_DIALOG0x6d6080x11adataEnglishUnited States0.6524822695035462
        RT_DIALOG0x6d7280xbedataEnglishUnited States0.6631578947368421
        RT_GROUP_ICON0x790d00x4cdataEnglishUnited States0.7894736842105263
        RT_GROUP_ICON0x7a1c80x14dataEnglishUnited States1.2
        RT_VERSION0x6b4300x214dataEnglishUnited States0.5582706766917294
        RT_MANIFEST0x7a2300x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
        DLLImport
        SHELL32.dllSHBrowseForFolderA, DragQueryFileA, DragFinish, DragAcceptFiles, ShellExecuteA, SHGetPathFromIDListA, Shell_NotifyIconA
        WS2_32.dlllisten, accept, select, getsockname, ntohs, WSACloseEvent, WSACreateEvent, WSAEventSelect, gethostbyname, bind, WSAIoctl, ntohl, inet_ntoa, getservbyname, gethostname, htonl, setsockopt, WSACleanup, WSAStartup, getaddrinfo, socket, connect, recvfrom, recv, freeaddrinfo, sendto, WSAGetLastError, closesocket, WSAAsyncSelect, getpeername, getnameinfo, inet_addr, send, htons, WSASetLastError
        COMCTL32.dllInitCommonControlsEx
        IPHLPAPI.DLLGetIpNetTable, SendARP, GetAdaptersAddresses, DeleteIpNetEntry
        KERNEL32.dllMultiByteToWideChar, GetFullPathNameW, GetCurrentDirectoryW, HeapReAlloc, OutputDebugStringW, SetStdHandle, LCMapStringW, CompareStringW, GetCommandLineA, GetCommandLineW, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetModuleFileNameA, lstrlenA, lstrcatA, lstrcpyA, lstrcmpiA, lstrcpynA, OutputDebugStringA, GetEnvironmentVariableA, lstrcmpA, SetLastError, GetCurrentProcess, CreateMutexA, ReleaseMutex, Sleep, GetLastError, CloseHandle, SetProcessWorkingSetSize, GetFullPathNameA, GetVersion, GetLocalTime, CreateProcessA, ReadFile, ReleaseSemaphore, WriteFile, WaitForSingleObject, GetCurrentDirectoryA, SetCurrentDirectoryA, GetFileAttributesA, CreateFileA, DeleteFileA, GetFileSize, CreateSemaphoreA, SetEnvironmentVariableA, SetThreadPriority, SetFilePointer, GetCurrentThread, WideCharToMultiByte, FlushFileBuffers, GetCurrentThreadId, GetTickCount, ResetEvent, GetSystemTime, WaitForMultipleObjects, SetEvent, CreateEventA, CreateThread, SetFilePointerEx, GlobalAlloc, GlobalUnlock, GlobalLock, LocalFree, FormatMessageA, GetSystemTimeAsFileTime, FileTimeToLocalFileTime, FindClose, FindFirstFileA, FindNextFileA, FileTimeToSystemTime, GetDateFormatA, GetPrivateProfileStringA, WritePrivateProfileStringA, GetCPInfo, HeapFree, HeapAlloc, GetTimeZoneInformation, ExitProcess, SystemTimeToTzSpecificLocalTime, PeekNamedPipe, GetFileInformationByHandle, GetDriveTypeW, CreateFileW, FreeLibraryAndExitThread, ResumeThread, ExitThread, WriteConsoleW, GetModuleHandleExW, GetModuleFileNameW, GetFileType, GetStdHandle, RaiseException, LoadLibraryExW, GetProcAddress, FreeLibrary, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, RtlUnwindEx, GetEnvironmentStringsW, GetModuleHandleW, GetStartupInfoW, IsDebuggerPresent, InitializeSListHead, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetStringTypeW, GetProcessHeap, GetConsoleCP, GetConsoleMode, GetFileSizeEx, HeapSize, ReadConsoleW, SetEndOfFile, GetThreadPriority
        USER32.dllGetFocus, GetWindowLongA, SetWindowLongA, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, DialogBoxParamA, GetClassInfoA, RegisterClassA, GetDesktopWindow, GetClassLongPtrA, DrawIcon, SetFocus, DialogBoxIndirectParamA, CreateWindowExA, SystemParametersInfoA, MessageBeep, wvsprintfA, RedrawWindow, MoveWindow, MapDialogRect, InvalidateRect, GetWindow, GetSystemMetrics, SetDlgItemTextA, SetWindowTextA, IsWindow, SetTimer, DestroyIcon, CallWindowProcA, GetWindowTextA, SetClassLongPtrA, MessageBoxA, GetSysColor, DefWindowProcA, SendDlgItemMessageA, LoadIconA, CheckMenuItem, UnregisterClassA, SetWindowLongPtrA, FindWindowA, SetForegroundWindow, ChildWindowFromPoint, EnableWindow, GetDC, ReleaseDC, GetSystemMenu, GetWindowRect, DestroyWindow, IsWindowVisible, SetWindowPos, ShowWindow, GetTopWindow, GetDialogBaseUnits, CreateDialogParamA, AppendMenuA, GetClientRect, PostMessageA, GetDlgItemTextA, GetDlgItemInt, SetDlgItemInt, LoadMenuA, TrackPopupMenu, wsprintfA, GetSubMenu, DestroyMenu, GetDlgItem, GetWindowLongPtrA, GetParent, GetCursorPos, SendMessageA, EndDialog, KillTimer
        GDI32.dllSetBkColor, SetTextColor, LPtoDP, GetTextExtentPoint32A, GetTextMetricsA, ExtTextOutA
        COMDLG32.dllGetOpenFileNameA
        ADVAPI32.dllRegOpenKeyExA, ReportEventA, RegisterEventSourceA, DeregisterEventSource, RegDeleteKeyA, RegCloseKey, RegSetValueExA, RegCreateKeyExA, RegQueryValueExA
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSource PortDest PortSource IPDest IP
        Dec 22, 2024 21:05:33.826863050 CET6542853192.168.2.241.1.1.1
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Dec 22, 2024 21:05:33.826863050 CET192.168.2.241.1.1.10x3549Standard query (0)res.public.onecdn.static.microsoftA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 22, 2024 21:05:33.964329958 CET1.1.1.1192.168.2.240x3549No error (0)res.public.onecdn.static.microsoftres-ocdi-public.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
        Dec 22, 2024 21:05:33.964329958 CET1.1.1.1192.168.2.240x3549No error (0)res-2.public.onecdn.static.microsoftcdn-office.azureedge.netCNAME (Canonical name)IN (0x0001)false
        Dec 22, 2024 21:05:33.964329958 CET1.1.1.1192.168.2.240x3549No error (0)scdn1cc4b.wpc.9aea3.sigmacdn.netsni1gl.wpc.sigmacdn.netCNAME (Canonical name)IN (0x0001)false
        Dec 22, 2024 21:05:33.964329958 CET1.1.1.1192.168.2.240x3549No error (0)sni1gl.wpc.sigmacdn.net152.199.21.175A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:1
        Start time:15:05:01
        Start date:22/12/2024
        Path:C:\Users\user\Desktop\tftpd64.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\tftpd64.exe"
        Imagebase:0x7ff748e60000
        File size:392'704 bytes
        MD5 hash:3C1E3215ACC69F06F044802ED4695333
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        No disassembly