Windows
Analysis Report
inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe (PID: 4372 cmdline:
"C:\Users\ user\Deskt op\inward_ payment_co nfirmation _reference _Z17660535 41_notific ations.bat .exe" MD5: 25EEC63EDF7C0EB8628A89712B5CB363) - inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe (PID: 5888 cmdline:
"C:\Users\ user\Deskt op\inward_ payment_co nfirmation _reference _Z17660535 41_notific ations.bat .exe" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
{"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Stealing of Sensitive Information |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:35:30.624887+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49977 | 109.99.162.14 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_004069DF | |
Source: | Code function: | 0_2_00405D8E | |
Source: | Code function: | 0_2_00402910 |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | Windows user hook set: | Jump to behavior |
Source: | Code function: | 0_2_00405846 |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Static PE information: |
Source: | Process Stats: |
Source: | Code function: | 0_2_00403645 |
Source: | Code function: | 0_2_00406DA0 | |
Source: | Code function: | 0_2_6E311BFF |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00403645 |
Source: | Code function: | 0_2_00404AF2 |
Source: | Code function: | 0_2_004021AF |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: |
Source: | Code function: | 0_2_6E311BFF |
Source: | Code function: | 0_2_6E3130EE |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File opened: | Jump to behavior |
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior |
Source: | Code function: | 0_2_004069DF | |
Source: | Code function: | 0_2_00405D8E | |
Source: | Code function: | 0_2_00402910 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-4395 | ||
Source: | API call chain: | graph_0-4400 |
Source: | Code function: | 0_2_00403645 |
Source: | Code function: | 0_2_6E311BFF |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00403645 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | Mutex created: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | 11 Masquerading | 11 Input Capture | 31 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 12 Process Injection | 12 Virtualization/Sandbox Evasion | LSASS Memory | 12 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Remote Access Software | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | 1 Clipboard Data | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 12 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 3 File and Directory Discovery | SSH | Keylogging | 113 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 23 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
35% | Virustotal | Browse | ||
26% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | ReversingLabs | |||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
linktreewealth.zapto.org | 0.0.0.0 | true | true | unknown | |
teldrum.ro | 109.99.162.14 | true | false | unknown | |
linktreewealthy.zapto.org | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
109.99.162.14 | teldrum.ro | Romania | 9050 | RTDBucharestRomaniaRO | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1590830 |
Start date and time: | 2025-01-14 16:31:56 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/10@20/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtDeviceIoControlFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:36:07 | API Interceptor | |
16:35:27 | Autostart | |
16:35:35 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
109.99.162.14 | Get hash | malicious | Remcos, GuLoader | Browse | ||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos, GuLoader | Browse | |||
Get hash | malicious | Remcos, GuLoader | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
linktreewealth.zapto.org | Get hash | malicious | Remcos, GuLoader | Browse |
| |
teldrum.ro | Get hash | malicious | Remcos, GuLoader | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
RTDBucharestRomaniaRO | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DanaBot, Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dll | Get hash | malicious | Remcos, GuLoader | Browse | ||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 3.3898151468438855 |
Encrypted: | false |
SSDEEP: | 3:rglsKlENzlNWlwfU5JWRal2Jl+7R0DAlBG4moojklovDl6v:Mls5Nz+x5YcIeeDAlS1gWAv |
MD5: | 600D3381E61A54CF5C53093AC19FF10C |
SHA1: | 3735B172E4B504751811F942BE362E6D961A7443 |
SHA-256: | 98929F38F05FBCB77BD78442EEF50C0BAC29B26D07C2C5F3C7C2B15E3D0273FF |
SHA-512: | 2642DDF0A078D3D27134C4C5622D45FCD2A9C7FD9D1A7A35DC1C7DFE472AFEB6A4033265363AF689A248D021E06849C0B84AAEE11D53DF135F2137C04A87ACD6 |
Malicious: | true |
Yara Hits: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25 |
Entropy (8bit): | 4.0536606896881855 |
Encrypted: | false |
SSDEEP: | 3:8+dB4WYiTNvn:8AbYiTNvn |
MD5: | 08CA75DA54EB4810D18796C97F510A55 |
SHA1: | 3D9B020193D16E7D0F5392EF7693A6C5C6D2531D |
SHA-256: | E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E |
SHA-512: | 46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 550217 |
Entropy (8bit): | 7.712228071105721 |
Encrypted: | false |
SSDEEP: | 6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+ |
MD5: | 25EEC63EDF7C0EB8628A89712B5CB363 |
SHA1: | 4E8D586A950492C30147B7D56BCFAD49CD577966 |
SHA-256: | E075807417590255DE4D395FA3DFBC336E88C96BBAB8AFCA1D5E5D5ABBAC0237 |
SHA-512: | 086FEB119E2A02F2FD7AFC45C422F9B472F049EB2E79F83769F25254D88A84086275D2CFF1E891D360EA57978292CD0CAF958E4000CD659AC532165E1F881DFB |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1091527 |
Entropy (8bit): | 3.7883797592579986 |
Encrypted: | false |
SSDEEP: | 12288:qvZYo2Z5DAmaghhFm2YqtP4lIxgBVLpadBoS9CR:8YdJagOWP4EeVLeOF |
MD5: | 714AB9E19CCDB0A431DB45B3EFD1D462 |
SHA1: | C61D1E403FDF00B6FC47481D1C56BE7368A496E7 |
SHA-256: | 2B9B7C3E4EA530F8AE338734ED61B365F0A124687EE88BEAE57E07259B0DCE66 |
SHA-512: | A6E108B4787A8EA44BC6187960FBEC6B5C7954ED6695060C4BE8A88B579928CA31E4E30501374F9F896DEF92438EE1A04C2DBDA6CD4255E24587DE4741595F0B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 5.805604762622714 |
Encrypted: | false |
SSDEEP: | 192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr |
MD5: | 4ADD245D4BA34B04F213409BFE504C07 |
SHA1: | EF756D6581D70E87D58CC4982E3F4D18E0EA5B09 |
SHA-256: | 9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706 |
SHA-512: | 1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 267655 |
Entropy (8bit): | 1.2559804952290619 |
Encrypted: | false |
SSDEEP: | 768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg |
MD5: | F6A4342C9271CFFEF29695EEA330941E |
SHA1: | 291ABCFA507BA730832511E5F47EAA2CB4DFABBD |
SHA-256: | 605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6 |
SHA-512: | D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114454 |
Entropy (8bit): | 1.2519787240577294 |
Encrypted: | false |
SSDEEP: | 768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h |
MD5: | F85E20AA1A28EEFFC89F744F6B6B67B3 |
SHA1: | B61AEF131017C5605647983CE2D55769914BB104 |
SHA-256: | C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED |
SHA-512: | EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 310550 |
Entropy (8bit): | 1.2527719188567612 |
Encrypted: | false |
SSDEEP: | 1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k |
MD5: | 72FA348549D0BD9CE66E5F3EBA54DF3A |
SHA1: | D5B4797D07374226CD8173964DF8753F4ABB9E6E |
SHA-256: | 7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9 |
SHA-512: | D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 83152 |
Entropy (8bit): | 4.590487128538397 |
Encrypted: | false |
SSDEEP: | 1536:mPpv9Hyk6GJxFF88oQTFd5xzmxgxAVH3r2gnnAOpuIg:mPpvdys0xQT/5m9SJEuIg |
MD5: | 3B9A97DDA581FFCEB29B192F228D66DF |
SHA1: | A11D7ADCC7A283B75D217A27724324F53FB91540 |
SHA-256: | F783B047374C53913141CAFDE79B94B7C0D3AEA69AE86EA4417D7C8EB7798529 |
SHA-512: | 13BD775B3FF31F2127C28D26942DE8235EFE96AF4E2A921DBD82C813B53167E7B3E331A7F45178A77E65C2EF9CDA0D25DEAD6C775FFEC0F0E8CAD45DCB0DDF7E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 295959 |
Entropy (8bit): | 7.608537202687179 |
Encrypted: | false |
SSDEEP: | 6144:WH4o5aBQ0lz5DJimagdvhT7lmfp8Fpzkc1PlKQl4ZPIxo4+V6GVS2paf:WYo2Z5DAmaghhFm2YqtP4lIxgBVLpaf |
MD5: | 5B2D5C7C1482936796C2699166B34424 |
SHA1: | 493E890B6548A54DDADB5D450797BBE68429502C |
SHA-256: | A7C9A3BE29FACF27782B90B0E6EE7D6B645CD7F827C6475BFD19A6480D0890EA |
SHA-512: | 3983BFC12B10AB6C26BF3D070CAA9960C6F6DF07D48BB27318C984BD2CA56CF310050E0ED40A8E11E284B70413B01773DF7F5178216953AF5A5E47E4F7A89368 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.712228071105721 |
TrID: |
|
File name: | inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
File size: | 550'217 bytes |
MD5: | 25eec63edf7c0eb8628a89712b5cb363 |
SHA1: | 4e8d586a950492c30147b7d56bcfad49cd577966 |
SHA256: | e075807417590255de4d395fa3dfbc336e88c96bbab8afca1d5e5d5abbac0237 |
SHA512: | 086feb119e2a02f2fd7afc45c422f9b472f049eb2e79f83769f25254d88a84086275d2cff1e891d360ea57978292cd0caf958e4000cd659ac532165e1f881dfb |
SSDEEP: | 6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+ |
TLSH: | D9C4F1E4E210C1A7E25F5D38DAB169F11D80BC38D1E1087B43507EA9F4B2A2599EF91F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h..."..... |
Icon Hash: | 4571753721719a8d |
Entrypoint: | 0x403645 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 9dda1a1d1f8a1d13ae0297b47046b26e |
Instruction |
---|
sub esp, 000003F8h |
push ebp |
push esi |
push edi |
push 00000020h |
pop edi |
xor ebp, ebp |
push 00008001h |
mov dword ptr [esp+20h], ebp |
mov dword ptr [esp+18h], 0040A230h |
mov dword ptr [esp+14h], ebp |
call dword ptr [004080A0h] |
mov esi, dword ptr [004080A4h] |
lea eax, dword ptr [esp+34h] |
push eax |
mov dword ptr [esp+4Ch], ebp |
mov dword ptr [esp+0000014Ch], ebp |
mov dword ptr [esp+00000150h], ebp |
mov dword ptr [esp+38h], 0000011Ch |
call esi |
test eax, eax |
jne 00007FA50493272Ah |
lea eax, dword ptr [esp+34h] |
mov dword ptr [esp+34h], 00000114h |
push eax |
call esi |
mov ax, word ptr [esp+48h] |
mov ecx, dword ptr [esp+62h] |
sub ax, 00000053h |
add ecx, FFFFFFD0h |
neg ax |
sbb eax, eax |
mov byte ptr [esp+0000014Eh], 00000004h |
not eax |
and eax, ecx |
mov word ptr [esp+00000148h], ax |
cmp dword ptr [esp+38h], 0Ah |
jnc 00007FA5049326F8h |
and word ptr [esp+42h], 0000h |
mov eax, dword ptr [esp+40h] |
movzx ecx, byte ptr [esp+3Ch] |
mov dword ptr [00429B18h], eax |
xor eax, eax |
mov ah, byte ptr [esp+38h] |
movzx eax, ax |
or eax, ecx |
xor ecx, ecx |
mov ch, byte ptr [esp+00000148h] |
movzx ecx, cx |
shl eax, 10h |
or eax, ecx |
movzx ecx, byte ptr [esp+0000004Eh] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x84fc | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4a000 | 0x18858 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2a8 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x66b7 | 0x6800 | e65344ac983813901119e185754ec24e | False | 0.6607196514423077 | data | 6.4378696011937135 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x1358 | 0x1400 | bd82d08a08da8783923a22b467699302 | False | 0.4431640625 | data | 5.103358601944578 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x1fb78 | 0x600 | caa377d001cfc3215a3edff6d7702132 | False | 0.5091145833333334 | data | 4.126209888385862 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x2a000 | 0x20000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x4a000 | 0x18858 | 0x18a00 | 73bbe3fdd1585fbd610b24874590b455 | False | 0.22416322969543148 | data | 5.2980000367452575 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x4a418 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | English | United States | 0.14908908079971608 |
RT_ICON | 0x5ac40 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.27520746887966807 |
RT_ICON | 0x5d1e8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.3553001876172608 |
RT_ICON | 0x5e290 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2688 | English | United States | 0.48667377398720685 |
RT_ICON | 0x5f138 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.43934426229508194 |
RT_ICON | 0x5fac0 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152 | English | United States | 0.569043321299639 |
RT_ICON | 0x60368 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 672 | English | United States | 0.5552995391705069 |
RT_ICON | 0x60a30 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 1536 | English | United States | 0.18841463414634146 |
RT_ICON | 0x61098 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | English | United States | 0.4869942196531792 |
RT_ICON | 0x61600 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.598404255319149 |
RT_ICON | 0x61a68 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.26344086021505375 |
RT_ICON | 0x61d50 | 0x1e8 | Device independent bitmap graphic, 24 x 48 x 4, image size 384 | English | United States | 0.3094262295081967 |
RT_ICON | 0x61f38 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.42905405405405406 |
RT_DIALOG | 0x62060 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x62160 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x62280 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x622e0 | 0xbc | data | English | United States | 0.601063829787234 |
RT_VERSION | 0x623a0 | 0x174 | data | English | United States | 0.5860215053763441 |
RT_MANIFEST | 0x62518 | 0x33e | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators | English | United States | 0.5542168674698795 |
DLL | Import |
---|---|
ADVAPI32.dll | RegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW |
SHELL32.dll | SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW |
ole32.dll | CoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree |
COMCTL32.dll | ImageList_Destroy, ImageList_AddMasked, ImageList_Create |
USER32.dll | MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics |
GDI32.dll | GetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor |
KERNEL32.dll | RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:35:30.624887+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.5 | 49977 | 109.99.162.14 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 16:35:29.082701921 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:29.082755089 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:29.082838058 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:29.097731113 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:29.097747087 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.028521061 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.029311895 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.394810915 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.394834995 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.395183086 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.395240068 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.398261070 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.439338923 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.624680996 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.624708891 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.624742031 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.624756098 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.624788046 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.624830008 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.743830919 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.743912935 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.744188070 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.744251966 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.745202065 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.745260000 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.746368885 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.746428013 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.863898039 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.863955021 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.863980055 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.863996983 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.864016056 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.864032984 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.864432096 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.864489079 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.865168095 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.865225077 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.865853071 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.865916967 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.866655111 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.866712093 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.867532015 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.867583990 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.983086109 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.983172894 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.983381033 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.983441114 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.983911991 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.983978987 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.984388113 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.984446049 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.984643936 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.984704971 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.985331059 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.985392094 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.985595942 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.985651970 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.985804081 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.985857964 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.986104965 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.986160994 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.986377954 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.986433029 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.987030029 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.987081051 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.987189054 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.987245083 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:30.987410069 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:30.987462044 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.073672056 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.073710918 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.073812962 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.073844910 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.073863029 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.077451944 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.102762938 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.102858067 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.103154898 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.103337049 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.103419065 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.103481054 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.103693962 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.103749037 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.103908062 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.103966951 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.104160070 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.104221106 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.104497910 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.104547977 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.108004093 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.108066082 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.108272076 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.108326912 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.108485937 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.108573914 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.111912966 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.111974001 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.112112045 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.112170935 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.112431049 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.112489939 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.112723112 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.112776995 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.112958908 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.113010883 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.164304018 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.164426088 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.164519072 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.164577007 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.193253994 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.193296909 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.193350077 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.193386078 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.193404913 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.193465948 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.193521976 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.193530083 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.193572044 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.193634033 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.193686962 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.193876028 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.193927050 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.194165945 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.194215059 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.194407940 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.194451094 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.194693089 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.194744110 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.194948912 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.194996119 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.195236921 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.195290089 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.195468903 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.195518970 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.195621967 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.195669889 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.222136974 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.222234011 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.222369909 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.222430944 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.222640038 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.222791910 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.254769087 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.254863024 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.254925966 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.255171061 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.283838987 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.283935070 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.283961058 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.284034967 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.287950039 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.287976980 CET | 443 | 49977 | 109.99.162.14 | 192.168.2.5 |
Jan 14, 2025 16:35:31.287991047 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Jan 14, 2025 16:35:31.288053989 CET | 49977 | 443 | 192.168.2.5 | 109.99.162.14 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 16:35:28.994465113 CET | 60904 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:35:29.076786995 CET | 53 | 60904 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:35:36.337263107 CET | 61071 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:35:36.346045971 CET | 53 | 61071 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:35:36.348856926 CET | 52512 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:35:36.357809067 CET | 53 | 52512 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:35:41.438180923 CET | 57405 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:35:41.447666883 CET | 53 | 57405 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:35:46.562529087 CET | 63043 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:35:46.571069002 CET | 53 | 63043 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:35:51.641431093 CET | 54249 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:35:51.650302887 CET | 53 | 54249 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:35:56.718673944 CET | 64762 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:35:56.727998018 CET | 53 | 64762 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:01.797347069 CET | 49288 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:01.807074070 CET | 53 | 49288 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:06.875241041 CET | 57747 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:06.957660913 CET | 53 | 57747 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:12.751087904 CET | 55810 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:12.759980917 CET | 53 | 55810 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:17.468861103 CET | 53885 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:17.478437901 CET | 53 | 53885 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:22.452796936 CET | 55152 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:22.462223053 CET | 53 | 55152 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:27.077752113 CET | 62643 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:27.086556911 CET | 53 | 62643 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:31.984945059 CET | 53649 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:31.994143009 CET | 53 | 53649 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:36.970072031 CET | 53726 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:36.983019114 CET | 53 | 53726 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:41.935609102 CET | 63907 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:41.945909023 CET | 53 | 63907 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:46.935774088 CET | 62432 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:46.944694042 CET | 53 | 62432 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:51.936969995 CET | 53544 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:51.946235895 CET | 53 | 53544 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:36:56.941637039 CET | 56340 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:36:56.950118065 CET | 53 | 56340 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 16:37:01.939055920 CET | 51298 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:37:01.948617935 CET | 53 | 51298 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 14, 2025 16:35:28.994465113 CET | 192.168.2.5 | 1.1.1.1 | 0x9132 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:35:36.337263107 CET | 192.168.2.5 | 1.1.1.1 | 0x94b8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:35:36.348856926 CET | 192.168.2.5 | 1.1.1.1 | 0x6f96 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:35:41.438180923 CET | 192.168.2.5 | 1.1.1.1 | 0xf81e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:35:46.562529087 CET | 192.168.2.5 | 1.1.1.1 | 0x7166 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:35:51.641431093 CET | 192.168.2.5 | 1.1.1.1 | 0x57a6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:35:56.718673944 CET | 192.168.2.5 | 1.1.1.1 | 0xd77e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:01.797347069 CET | 192.168.2.5 | 1.1.1.1 | 0xca9e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:06.875241041 CET | 192.168.2.5 | 1.1.1.1 | 0x6225 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:12.751087904 CET | 192.168.2.5 | 1.1.1.1 | 0x79da | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:17.468861103 CET | 192.168.2.5 | 1.1.1.1 | 0xe1d7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:22.452796936 CET | 192.168.2.5 | 1.1.1.1 | 0xd52 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:27.077752113 CET | 192.168.2.5 | 1.1.1.1 | 0x2997 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:31.984945059 CET | 192.168.2.5 | 1.1.1.1 | 0x77bb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:36.970072031 CET | 192.168.2.5 | 1.1.1.1 | 0x7a1e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:41.935609102 CET | 192.168.2.5 | 1.1.1.1 | 0x4449 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:46.935774088 CET | 192.168.2.5 | 1.1.1.1 | 0x2a78 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:51.936969995 CET | 192.168.2.5 | 1.1.1.1 | 0x4874 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:36:56.941637039 CET | 192.168.2.5 | 1.1.1.1 | 0x9c57 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 16:37:01.939055920 CET | 192.168.2.5 | 1.1.1.1 | 0x8574 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 14, 2025 16:35:29.076786995 CET | 1.1.1.1 | 192.168.2.5 | 0x9132 | No error (0) | 109.99.162.14 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 16:35:36.346045971 CET | 1.1.1.1 | 192.168.2.5 | 0x94b8 | No error (0) | 0.0.0.0 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49977 | 109.99.162.14 | 443 | 5888 | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:35:30 UTC | 173 | OUT | |
2025-01-14 15:35:30 UTC | 223 | IN | |
2025-01-14 15:35:30 UTC | 7969 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN | |
2025-01-14 15:35:30 UTC | 8000 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:32:57 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 550'217 bytes |
MD5 hash: | 25EEC63EDF7C0EB8628A89712B5CB363 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 10:35:15 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 550'217 bytes |
MD5 hash: | 25EEC63EDF7C0EB8628A89712B5CB363 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 15.9% |
Dynamic/Decrypted Code Coverage: | 13.4% |
Signature Coverage: | 15.9% |
Total number of Nodes: | 1608 |
Total number of Limit Nodes: | 35 |
Graph
Function 00403645 Relevance: 88.0, APIs: 32, Strings: 18, Instructions: 464stringfilecomCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405D8E Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 148filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406DA0 Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D54 Relevance: 47.5, APIs: 13, Strings: 14, Instructions: 215stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004030D5 Relevance: 28.2, APIs: 5, Strings: 11, Instructions: 204memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004066BF Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 204stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401774 Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 145stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004026F1 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 153fileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A06 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C48 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040248F Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 64registrystringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071D5 Relevance: 5.2, APIs: 4, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004073D6 Relevance: 5.2, APIs: 4, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004070EC Relevance: 5.2, APIs: 4, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406BF1 Relevance: 5.2, APIs: 4, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040703F Relevance: 5.2, APIs: 4, Instructions: 180COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040715D Relevance: 5.2, APIs: 4, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004070A9 Relevance: 5.2, APIs: 4, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040347E Relevance: 4.6, APIs: 3, Instructions: 101COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020DD Relevance: 4.6, APIs: 3, Instructions: 73libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401BA0 Relevance: 4.6, APIs: 2, Strings: 1, Instructions: 72memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403376 Relevance: 3.1, APIs: 2, Instructions: 88COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BD6 Relevance: 3.0, APIs: 2, Instructions: 26COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C65 Relevance: 3.0, APIs: 2, Instructions: 24processCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406172 Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402896 Relevance: 1.5, APIs: 1, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023B7 Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004061F5 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E312A7F Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F9 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004035FD Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E312B98 Relevance: 1.4, APIs: 1, Instructions: 143COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401FA9 Relevance: 1.3, APIs: 1, Instructions: 37COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E3112BB Relevance: 1.3, APIs: 1, Instructions: 6memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405846 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 284windowclipboardmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404AF2 Relevance: 26.5, APIs: 10, Strings: 5, Instructions: 275stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E311BFF Relevance: 20.1, APIs: 13, Instructions: 597stringlibrarymemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402910 Relevance: 1.5, APIs: 1, Instructions: 30fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040506E Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 489windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404102 Relevance: 61.6, APIs: 34, Strings: 1, Instructions: 357windowstringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004047C0 Relevance: 38.7, APIs: 19, Strings: 3, Instructions: 204windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062C8 Relevance: 26.4, APIs: 10, Strings: 5, Instructions: 130memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404668 Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404FBC Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402F98 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 36timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E312655 Relevance: 9.1, APIs: 6, Instructions: 109COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404EAE Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 84stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E311979 Relevance: 7.7, APIs: 5, Instructions: 194COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E312480 Relevance: 7.6, APIs: 5, Instructions: 135memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D86 Relevance: 7.6, APIs: 5, Instructions: 75windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401E53 Relevance: 7.5, APIs: 5, Instructions: 43COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E3116BD Relevance: 7.5, APIs: 5, Instructions: 41memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405F51 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6E3110E1 Relevance: 6.4, APIs: 5, Instructions: 145memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402643 Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 65stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406059 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 47stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040567B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406550 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44registryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405F9D Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060D7 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|