Windows
Analysis Report
g6lWBM64S4.msi
Overview
General Information
Sample name: | g6lWBM64S4.msirenamed because original name is a hash value |
Original sample name: | 60b60873d6cfa59a1b467931ffe7efdc0575b02255c549502de50ad05d8f3b89.msi |
Analysis ID: | 1592153 |
MD5: | 40e97f78a0784d68c57e746ee36a76e0 |
SHA1: | b8918d64b00b3b0e6b85800bba3a976860a1c3e3 |
SHA256: | 60b60873d6cfa59a1b467931ffe7efdc0575b02255c549502de50ad05d8f3b89 |
Tags: | bankerjanelaratlatammsisituacaonssprj-comtrojanuser-johnk3r |
Infos: | |
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- msiexec.exe (PID: 3320 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ g6lWBM64S4 .msi" MD5: E5DA170027542E25EDE42FC54C929077)
- msiexec.exe (PID: 1700 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 2316 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 196436D A6AF92AFC4 A38F9C5C8C AFD36 MD5: 9D09DC1EDA745A5F87553048E57620CF) - cmd.exe (PID: 6812 cmdline:
"C:\Window s\System32 \cmd.exe" /C start / MIN reg ad d HKCU\SOF TWARE\Micr osoft\Wind ows\Curren tVersion\R un /v kBiT rog /t reg _sz /d "C: \Users\use r\EGvKWow\ kBiTrog.ex e" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6984 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - reg.exe (PID: 3336 cmdline:
reg add HK CU\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Run / v kBiTrog /t reg_sz /d "C:\Use rs\user\EG vKWow\kBiT rog.exe" MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - conhost.exe (PID: 1880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - shutdown.exe (PID: 2640 cmdline:
"C:\Window s\SysWOW64 \shutdown. exe" /r /f /t 15 MD5: FCDE5AF99B82AE6137FB90C7571D40C3) - conhost.exe (PID: 3336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: frack113: |
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T20:44:02.007687+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 104.21.16.1 | 443 | TCP |
2025-01-15T20:44:02.721981+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 104.21.16.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Process created: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | LNK file: |
Source: | File written: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Replication Through Removable Media | Windows Management Instrumentation | 21 Registry Run Keys / Startup Folder | 11 Process Injection | 21 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 21 Registry Run Keys / Startup Folder | 1 Modify Registry | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 11 Peripheral Device Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 File Deletion | Cached Domain Credentials | 12 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
8% | Virustotal | Browse | ||
8% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
situacaonssprj.com | 104.21.16.1 | true | false | unknown | |
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false | high | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.16.1 | situacaonssprj.com | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1592153 |
Start date and time: | 2025-01-15 20:43:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | g6lWBM64S4.msirenamed because original name is a hash value |
Original Sample Name: | 60b60873d6cfa59a1b467931ffe7efdc0575b02255c549502de50ad05d8f3b89.msi |
Detection: | MAL |
Classification: | mal52.rans.winMSI@13/11@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 172.202.163.200, 2.23.77.188, 20.242.39.171, 13.95.31.18, 13.107.246.45
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, e3913.cd.akamaiedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, cac-ocsp.digicert.com.edgekey.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
14:43:59 | API Interceptor | |
19:44:12 | Autostart | |
19:44:25 | Autostart | |
19:44:34 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.16.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LiteHTTP Bot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
bg.microsoft.map.fastly.net | Get hash | malicious | Strela Downloader | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | DanaBot, PureLog Stealer, Vidar | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Windows\Installer\MSI1F90.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
C:\Users\user\AppData\Local\AdvinstAnalytics\67871a621816c20044ac2e86\1.0.0\tracking.ini
Download File
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11 |
Entropy (8bit): | 3.2776134368191165 |
Encrypted: | false |
SSDEEP: | 3:1EX:10 |
MD5: | EC3584F3DB838942EC3669DB02DC908E |
SHA1: | 8DCEB96874D5C6425EBB81BFEE587244C89416DA |
SHA-256: | 77C7C10B4C860D5DDF4E057E713383E61E9F21BCF0EC4CFBBC16193F2E28F340 |
SHA-512: | 35253883BB627A49918E7415A6BA6B765C86B516504D03A1F4FD05F80902F352A7A40E2A67A6D1B99A14B9B79DAB82F3AC7A67C512CCF6701256C13D0096855E |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\AdvinstAnalytics\67871a621816c20044ac2e86\1.0.0\{E3E53D21-CD36-4CDD-840F-84D7E898228C}.session
Download File
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 331 |
Entropy (8bit): | 5.264683242230275 |
Encrypted: | false |
SSDEEP: | 6:rIlUDoFsVnFCDjfpvgGD5gBGSbN7/FOPEfQcb7XjBWhj2UNOoHTUQ:ceDoWVFAjKG9yGSbJgPGfXjMhx |
MD5: | D3470F0F4F835329919E8942D131FED9 |
SHA1: | E947D1381593C29E9AC4F51DFCFDC71C0007EB43 |
SHA-256: | 1FEDE82C3B6DBD49E6B7DD8637B7267E152C31B6EBCBD93DA53530E282DF65CA |
SHA-512: | 06F488CE948FC00B9C189857B5C053037FB58407FB25CB2BCDC94C1D9012AD67B8DBE89BA7726B9A474F36DD08A1B936CD519E6CE87E4DA8A98B7EDEF5282C59 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6 |
Entropy (8bit): | 2.2516291673878226 |
Encrypted: | false |
SSDEEP: | 3:gpyn:g4n |
MD5: | A067F5EC97BA51B576825B69BC855E58 |
SHA1: | 907D296538A45D5B593512881D721C7D347B8E04 |
SHA-256: | CF3E339D25C3C023C9417FFC5D8E73F1DA828B18FEECAF14FDB9C24D04E49BA0 |
SHA-512: | F6058F37CF764E6CD807D9C0E9DE881849E4C94EC1D2E0C0EB504ABF77147E77CB09113B087E1C10E790C3EC45780E5986D29B2A84B364C5F697F884B1549F4D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EGvKWow.lnk
Download File
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 897 |
Entropy (8bit): | 5.05511548530761 |
Encrypted: | false |
SSDEEP: | 12:8mtRE4+G89RK/CgSHjAtJfEeREwuLoY44t2YZ/elFlSJmZmV:8mtzrCR8B+AjMeOIHqyFm |
MD5: | 7BE6248FC7180828FD31231887B88007 |
SHA1: | 04E0323B8367CE365CB531B1614EA48E26075396 |
SHA-256: | 142166B70590F7D7DC350394827A8E1B8CE25A17A6ED4DD6E498017EBCF8D435 |
SHA-512: | 26865AA599EDF70174BF9160DB07F1F708F6B570E990EF031AAA65255819E686CB0E2378A449EA9F675D0006F1410A4A113C71EA4D77DDE850EC7F059F867B73 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4520 |
Entropy (8bit): | 5.018104510047841 |
Encrypted: | false |
SSDEEP: | 96:1j9jwIjYj5jDK/D5DMF+C8k/ZqXKHvpIkdNArR89PaQxJbGD:1j9jhjYj9K/Vo+nk8aHvFdNAre9ieJGD |
MD5: | E3B668779426227199C1AA26CFD88198 |
SHA1: | CD2D0B0CF4A164732ECE2D9D13F0983FBEB55AD1 |
SHA-256: | 397DAAAE612398CB8160B42229464573C7AD5E15746F665A7E2918020EBC0A0C |
SHA-512: | AE79E981A2B0DCAF6B931CF02501EFA1437332384269DF15CF522EA8B038265B85FD3B1E61AB89DC64493B1154DF2ABFABE483D050FAD54035106F8070612241 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4520 |
Entropy (8bit): | 5.018104510047841 |
Encrypted: | false |
SSDEEP: | 96:1j9jwIjYj5jDK/D5DMF+C8k/ZqXKHvpIkdNArR89PaQxJbGD:1j9jhjYj9K/Vo+nk8aHvFdNAre9ieJGD |
MD5: | E3B668779426227199C1AA26CFD88198 |
SHA1: | CD2D0B0CF4A164732ECE2D9D13F0983FBEB55AD1 |
SHA-256: | 397DAAAE612398CB8160B42229464573C7AD5E15746F665A7E2918020EBC0A0C |
SHA-512: | AE79E981A2B0DCAF6B931CF02501EFA1437332384269DF15CF522EA8B038265B85FD3B1E61AB89DC64493B1154DF2ABFABE483D050FAD54035106F8070612241 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4520 |
Entropy (8bit): | 5.016755636852287 |
Encrypted: | false |
SSDEEP: | 96:1j9jwIjYj5jDK/D5DMF+C8k/ZqXKHvpIkdNCrR89PaQxJbGD:1j9jhjYj9K/Vo+nk8aHvFdNCre9ieJGD |
MD5: | FE8A4971275803E7A83234AE1C0F6FBB |
SHA1: | D837E8FC9E69BFBB42BB90CF6F05776C1A877FC7 |
SHA-256: | D566B2BAEE8AC6BE2140662F1CEE4A32547A28601CD3FCE39A62EA68B29D5B17 |
SHA-512: | BFF04BA9411C285D4E243E6ABE05DA5FE7234B55998682CFE0F5690F84B17D52F169B5A655B42B2A2AA9AA48828E8EB5E6094F2DBC2116BD2FA15039EDE96B6B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4520 |
Entropy (8bit): | 5.016755636852287 |
Encrypted: | false |
SSDEEP: | 96:1j9jwIjYj5jDK/D5DMF+C8k/ZqXKHvpIkdNCrR89PaQxJbGD:1j9jhjYj9K/Vo+nk8aHvFdNCre9ieJGD |
MD5: | FE8A4971275803E7A83234AE1C0F6FBB |
SHA1: | D837E8FC9E69BFBB42BB90CF6F05776C1A877FC7 |
SHA-256: | D566B2BAEE8AC6BE2140662F1CEE4A32547A28601CD3FCE39A62EA68B29D5B17 |
SHA-512: | BFF04BA9411C285D4E243E6ABE05DA5FE7234B55998682CFE0F5690F84B17D52F169B5A655B42B2A2AA9AA48828E8EB5E6094F2DBC2116BD2FA15039EDE96B6B |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2361856 |
Entropy (8bit): | 6.567035537407821 |
Encrypted: | false |
SSDEEP: | 49152:qqDxGSFVtaNDAJK8tKk5ojmrhCMz5vk3ukDln/hFRFNUEekBWWsRkn4frUMXjDt4:XxMDAtKknz5vqu+sRe4frUMXjcY |
MD5: | 40E97F78A0784D68C57E746EE36A76E0 |
SHA1: | B8918D64B00B3B0E6B85800BBA3A976860A1C3E3 |
SHA-256: | 60B60873D6CFA59A1B467931FFE7EFDC0575B02255C549502DE50AD05D8F3B89 |
SHA-512: | 5D89D06C903E437F899BB8C1FE4EEAF2433C0AD897D1D591216213DCADD37328E28FD5746A72187D09FE29A746602F789A4DA6184AA7877D1F104788F3B4563D |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | modified |
Size (bytes): | 780768 |
Entropy (8bit): | 6.387720196228063 |
Encrypted: | false |
SSDEEP: | 12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa |
MD5: | 573F5E653258BF622AE1C0AD118880A2 |
SHA1: | E243C761983908D14BAF6C7C0879301C8437415D |
SHA-256: | 371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7 |
SHA-512: | DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 432221 |
Entropy (8bit): | 5.375158504760705 |
Encrypted: | false |
SSDEEP: | 1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauc:zTtbmkExhMJCIpErR |
MD5: | 7E3F4F06EA319FDD14458876126F6AD4 |
SHA1: | 8AB9DE03715F9639517ED7921E1118CD374ED6F3 |
SHA-256: | 504EE58BC4392D4A3B994B4FAD9D569564EA1D894ABE281596CE48466E846C1E |
SHA-512: | 20E156CC5CD0AF74D085F1CC50AD66176DF8D7E01F053A537D1806ECAD665543C983C92FD820AEEC624EF00E20705B78A2DE1B1F4207A1D0A0A529289D06B335 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.567035537407821 |
TrID: |
|
File name: | g6lWBM64S4.msi |
File size: | 2'361'856 bytes |
MD5: | 40e97f78a0784d68c57e746ee36a76e0 |
SHA1: | b8918d64b00b3b0e6b85800bba3a976860a1c3e3 |
SHA256: | 60b60873d6cfa59a1b467931ffe7efdc0575b02255c549502de50ad05d8f3b89 |
SHA512: | 5d89d06c903e437f899bb8c1fe4eeaf2433c0ad897d1d591216213dcadd37328e28fd5746a72187d09fe29a746602f789a4da6184aa7877d1f104788f3b4563d |
SSDEEP: | 49152:qqDxGSFVtaNDAJK8tKk5ojmrhCMz5vk3ukDln/hFRFNUEekBWWsRkn4frUMXjDt4:XxMDAtKknz5vqu+sRe4frUMXjcY |
TLSH: | 28B58D1275DA8736EA7E8134A5AAD73621FA3FE00BB154DF53C4593A0EB05C242B2F17 |
File Content Preview: | ........................>...................%...................................................................................................................J...K...L...M...N...O...P...Q...R...S...T...U.................................................. |
Icon Hash: | 2d2e3797b32b2b99 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T20:44:02.007687+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 104.21.16.1 | 443 | TCP |
2025-01-15T20:44:02.721981+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 104.21.16.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 20:44:01.538208008 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:01.538248062 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:01.538321972 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:01.541510105 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:01.541521072 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.007620096 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.007687092 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.011517048 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.011526108 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.011831045 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.055347919 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.099355936 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.157418966 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.157459021 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.157488108 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.157501936 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.157512903 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.157556057 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.157562017 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.157583952 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.157620907 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.159845114 CET | 49730 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.159852982 CET | 443 | 49730 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.242734909 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.242770910 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.242919922 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.243215084 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.243227005 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.721900940 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.721981049 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.723335028 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.723342896 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.723581076 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.724824905 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.767366886 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877383947 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877424002 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877450943 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877475023 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877504110 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.877518892 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877542019 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877563000 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.877578020 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.877752066 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.877765894 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Jan 15, 2025 20:44:02.877774954 CET | 49731 | 443 | 192.168.2.4 | 104.21.16.1 |
Jan 15, 2025 20:44:02.877780914 CET | 443 | 49731 | 104.21.16.1 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 20:44:01.362901926 CET | 53497 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 20:44:01.533077002 CET | 53 | 53497 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 20:44:01.362901926 CET | 192.168.2.4 | 1.1.1.1 | 0x5e9b | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 20:44:01.533077002 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9b | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:01.533077002 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9b | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:01.533077002 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9b | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:01.533077002 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9b | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:01.533077002 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9b | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:01.533077002 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9b | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:01.533077002 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9b | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:16.277858019 CET | 1.1.1.1 | 192.168.2.4 | 0xba5e | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:16.277858019 CET | 1.1.1.1 | 192.168.2.4 | 0xba5e | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:56.105959892 CET | 1.1.1.1 | 192.168.2.4 | 0x7941 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 15, 2025 20:44:56.105959892 CET | 1.1.1.1 | 192.168.2.4 | 0x7941 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.16.1 | 443 | 2316 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 19:44:02 UTC | 169 | OUT | |
2025-01-15 19:44:02 UTC | 904 | IN | |
2025-01-15 19:44:02 UTC | 465 | IN | |
2025-01-15 19:44:02 UTC | 1369 | IN | |
2025-01-15 19:44:02 UTC | 1369 | IN | |
2025-01-15 19:44:02 UTC | 1325 | IN | |
2025-01-15 19:44:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 104.21.16.1 | 443 | 2316 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 19:44:02 UTC | 168 | OUT | |
2025-01-15 19:44:02 UTC | 898 | IN | |
2025-01-15 19:44:02 UTC | 471 | IN | |
2025-01-15 19:44:02 UTC | 1369 | IN | |
2025-01-15 19:44:02 UTC | 1369 | IN | |
2025-01-15 19:44:02 UTC | 1319 | IN | |
2025-01-15 19:44:02 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:43:58 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d2f00000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 14:43:58 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d2f00000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 14:43:59 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 14:44:12 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 14:44:12 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 14:44:12 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\reg.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa0000 |
File size: | 59'392 bytes |
MD5 hash: | CDD462E86EC0F20DE2A1D781928B1B0C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 14:44:12 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 14:44:16 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\shutdown.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf50000 |
File size: | 23'552 bytes |
MD5 hash: | FCDE5AF99B82AE6137FB90C7571D40C3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 14:44:16 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |