Windows
Analysis Report
task1.exe
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
task1.exe (PID: 7604 cmdline:
"C:\Users\ user\Deskt op\task1.e xe" MD5: 2BA73D2D47CF2D388446B781613B7EFF) Phoneutil.exe (PID: 7648 cmdline:
"C:\Window s\SysWOW64 \mfc110enu \Phoneutil .exe" MD5: 2BA73D2D47CF2D388446B781613B7EFF)
svchost.exe (PID: 7744 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 7932 cmdline:
C:\Windows \System32\ svchost.ex e -k Netwo rkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
SgrmBroker.exe (PID: 7968 cmdline:
C:\Windows \system32\ SgrmBroker .exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
svchost.exe (PID: 8008 cmdline:
C:\Windows \system32\ svchost.ex e -k Unist ackSvcGrou p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 8044 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 8080 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A) MpCmdRun.exe (PID: 5324 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: B3676839B2EE96983F9ED735CD044159) conhost.exe (PID: 1436 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Emotet | While Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021. |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Emotet_5528b3b0 | unknown | unknown |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Windows_Trojan_Emotet_5528b3b0 | unknown | unknown |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Windows_Trojan_Emotet_5528b3b0 | unknown | unknown |
| |
Click to see the 6 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-21T18:38:20.277675+0100 | 2030868 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 194.187.133.160 | 443 | TCP |
- • AV Detection
- • Compliance
- • Networking
- • E-Banking Fraud
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
- • Stealing of Sensitive Information
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Persistence and Installation Behavior |
---|
Source: | Executable created and started: | Jump to behavior |
Source: | PE file moved: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | File opened / queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | Key value created or modified: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 12 Masquerading | OS Credential Dumping | 41 Security Software Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 3 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 3 Virtualization/Sandbox Evasion | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Process Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 12 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Hidden Files and Directories | LSA Secrets | 23 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 File Deletion | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
93% | Virustotal | Browse | ||
87% | ReversingLabs | Win32.Trojan.Emotet | ||
100% | Avira | HEUR/AGEN.1344145 |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | unknown | |||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
74.208.45.104 | unknown | United States | 8560 | ONEANDONE-ASBrauerstrasse48DE | false | |
104.156.59.7 | unknown | United States | 29802 | HVC-ASUS | false | |
104.236.246.93 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | false | |
120.138.30.150 | unknown | New Zealand | 45179 | SITEHOST-AS-APSiteHostNewZealandNZ | false | |
78.187.156.31 | unknown | Turkey | 9121 | TTNETTR | false | |
74.219.172.26 | unknown | United States | 5787 | SNAPONSBSUS | false | |
194.187.133.160 | unknown | Bulgaria | 13124 | IBGCBG | true | |
134.209.36.254 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1645426 |
Start date and time: | 2025-03-21 18:37:29 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 25s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | task1.exe |
Detection: | MAL |
Classification: | mal96.troj.evad.winEXE@12/6@0/9 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): WMIADAP.exe, SI HClient.exe - Excluded IPs from analysis (wh
itelisted): 184.31.69.3, 4.245 .163.56 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , ctldl.windowsupdate.com, pro d.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edg ekey.net, fs-wildcard.microsof t.com.edgekey.net.globalredir. akadns.net, e16604.dscf.akamai edge.net, fe3cr.delivery.mp.mi crosoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
74.208.45.104 | Get hash | malicious | Emotet | Browse |
| |
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Bdaejec, Emotet | Browse |
| ||
104.156.59.7 | Get hash | malicious | Emotet | Browse |
| |
104.236.246.93 | Get hash | malicious | Emotet | Browse |
| |
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ONEANDONE-ASBrauerstrasse48DE | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
HVC-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Batch Injector | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Batch Injector, XWorm | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
DIGITALOCEAN-ASNUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Poseidon | Browse |
| ||
Get hash | malicious | Poseidon | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
TTNETTR | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
SITEHOST-AS-APSiteHostNewZealandNZ | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8192 |
Entropy (8bit): | 0.363788168458258 |
Encrypted: | false |
SSDEEP: | 6:6xPoaaD0JOCEfMuaaD0JOCEfMKQmDNOxPoaaD0JOCEfMuaaD0JOCEfMKQmDN:1aaD0JcaaD0JwQQbaaD0JcaaD0JwQQ |
MD5: | 0E72F896C84F1457C62C0E20338FAC0D |
SHA1: | 9C071CC3D15E5BD8BF603391AE447202BD9F8537 |
SHA-256: | 686DC879EA8690C42D3D5D10D0148AE7110FA4D8DCCBF957FB8E41EE3D4A42B3 |
SHA-512: | AAA5BE088708DABC2EC9A7A6632BDF5700BE719D3F72B732BD2DFD1A3CFDD5C8884BFA4951DB0C499AF423EC30B14A49A30FBB831D1B0A880FE10053043A4251 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 1.3108010974877788 |
Encrypted: | false |
SSDEEP: | 3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrb:KooCEYhgYEL0In |
MD5: | 38AB81BA5F250686ABD1F5EF6D62C761 |
SHA1: | 572C24B55135257284021551389DAD9582FA0FA1 |
SHA-256: | 38F7210CCA6CE3D7C063849F9CF9DF36681EB211D8B21BCA448A6D1DA477E0EA |
SHA-512: | 008EAE656738E2DB46FB52636569C5A48D5623E464FE921C7A36491167C340C39B1900E28250470C2DA67C4D68AB8F8FE142AF376B47134CF0EFCC21C30155ED |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 0.42221816916691596 |
Encrypted: | false |
SSDEEP: | 1536:3SB2ESB2SSjlK/uedMrSU0OrsJzvqYkr3g16f2UPkLk+ku4/Iw4KKazAkUk1k2DO:3azag03A2UrzJDO |
MD5: | B69FF28EAA750526543C4E559ECEB993 |
SHA1: | BACEBF6F2C14571840B4525C7EE1BEB4C2FD363C |
SHA-256: | E34D2765E38E5C56F2AB0F1B72A3EDD284F5C912333239126CBD8771FFD6786C |
SHA-512: | F170DF8D0E04F5E08F1A948A2DFD6A47C3A6DB7867B0CE446498F095B8A8E2E15842789E5A412DB9FA2EBFF4C7E201C53B2D493D663CE757202E4214896AB5BE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.07973565865984586 |
Encrypted: | false |
SSDEEP: | 3:WzPmlltOetYeOtmTwmRl//WJoYSjVZbT/Z/l/UOJIl//ollOE/tlnl+/rTc:Wjm1rzaI+JoxZbLBlDYApMP |
MD5: | 04D21411F2C7F924FD37A9FA7271D3C6 |
SHA1: | C06C5936B86D6BA5D1B5630C1C083CB2021EFB0C |
SHA-256: | A914EB156013FB766A517DA4A476E7212FFD69A3F04D00A71F96553EFD45DA99 |
SHA-512: | D9073DEF0461C656E616468AB44874FC5CDEC3F0D46733CFEACAC4A1CF1E28F23C76FAC75704FC6765FDBC1E685D0F04AE54295DA8F9B2716A50C156076264AD |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55 |
Entropy (8bit): | 4.306461250274409 |
Encrypted: | false |
SSDEEP: | 3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y |
MD5: | DCA83F08D448911A14C22EBCACC5AD57 |
SHA1: | 91270525521B7FE0D986DB19747F47D34B6318AD |
SHA-256: | 2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9 |
SHA-512: | 96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Windows Defender\MpCmdRun.exe |
File Type: | |
Category: | modified |
Size (bytes): | 7388 |
Entropy (8bit): | 3.241685106263244 |
Encrypted: | false |
SSDEEP: | 96:cEi+AAsoJjykzEJ+AAsoJjykHEz+AAsoJjykJ:cN+SoJbO+SoJvo+SoJB |
MD5: | B8692765CEAEC2D313ADA3C3BF526249 |
SHA1: | 725651D048A77B09E59444A4EAD746E23E8CBCD0 |
SHA-256: | CF21137069F03E61E202666665C4A20E13CA2C9FD2B6BD32F8CA93A5E97FC094 |
SHA-512: | 1C5E4FC34D3EF0BCFF579D19A36E2B29DD9309C2E7005044BA9374D976D6D1CD637E389659359224E9645C9B1D7CCE6D5B12A0BF12273C4D70C6CB43768D21CB |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.618160178953395 |
TrID: |
|
File name: | task1.exe |
File size: | 192'512 bytes |
MD5: | 2ba73d2d47cf2d388446b781613b7eff |
SHA1: | c75c7eb4814835388881d1b4c2db67e64a023e1e |
SHA256: | 06c6442d5bb110140ac1cdbcf1be52388441b9a0750d59b743acc6b52d19582b |
SHA512: | 667ddc16765d8c3c3596bb734174862db1f2ac24037c361a2e37ec9824c35a8926728400025d62c62c361b1b1e1a9d1e3b4c38c2c5989eee832e083481e50caa |
SSDEEP: | 3072:0O7Mn+0UNzRqN7GZDA62KrcNaQV/7T9kSjkltZJmHcPz6HEJE:kUGJeD8HVOSqBmHbk |
TLSH: | 9F14AE85F9D641F5D63A223204AF77729635ED7A4F21C7D7A394EE2D183608098333AE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N..P/m.P/m.P/m.20~.^/m..3c.Q/m..0g.[/m.P/l.7-m..3o.A/m.P/m._/m..0f.D/m..)k.Q/m..0i.W/m.RichP/m.........................PE..L.. |
Icon Hash: | 0715150763697373 |
Entrypoint: | 0x412496 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x5F61EF7F [Wed Sep 16 10:57:03 2020 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 83979e8c69e0e822b76e7d828bc42612 |
Instruction |
---|
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 00416028h |
push 00412628h |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 68h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
xor ebx, ebx |
mov dword ptr [ebp-04h], ebx |
push 00000002h |
call dword ptr [004147BCh] |
pop ecx |
or dword ptr [0041BF48h], FFFFFFFFh |
or dword ptr [0041BF4Ch], FFFFFFFFh |
call dword ptr [004147B8h] |
mov ecx, dword ptr [0041BF3Ch] |
mov dword ptr [eax], ecx |
call dword ptr [004147B4h] |
mov ecx, dword ptr [0041BF38h] |
mov dword ptr [eax], ecx |
mov eax, dword ptr [004147B0h] |
mov eax, dword ptr [eax] |
mov dword ptr [0041BF44h], eax |
call 00007F00107C4E07h |
cmp dword ptr [0041AD18h], ebx |
jne 00007F00107C4CEEh |
push 00412624h |
call dword ptr [004147ACh] |
pop ecx |
call 00007F00107C4DD9h |
push 0041A070h |
push 0041A06Ch |
call 00007F00107C4DC4h |
mov eax, dword ptr [0041BF34h] |
mov dword ptr [ebp-6Ch], eax |
lea eax, dword ptr [ebp-6Ch] |
push eax |
push dword ptr [0041BF30h] |
lea eax, dword ptr [ebp-64h] |
push eax |
lea eax, dword ptr [ebp-70h] |
push eax |
lea eax, dword ptr [ebp-60h] |
push eax |
call dword ptr [004147A4h] |
push 0041A068h |
push 0041A000h |
call 00007F00107C4D91h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x192b0 | 0x66 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x17990 | 0x104 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1c000 | 0x13468 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x14000 | 0x97c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1296e | 0x13000 | a73251b14c77d36acc984f7722d13962 | False | 0.4713584498355263 | data | 6.12418782292168 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x14000 | 0x5316 | 0x6000 | 08df296ba9360e6b1157f62ebf300dfe | False | 0.2734375 | data | 4.480454858815612 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x1a000 | 0x1f50 | 0x1000 | 34551e1bb3e87ed33fbb0e8be9c11f26 | False | 0.43798828125 | data | 4.799428408814517 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x1c000 | 0x13468 | 0x14000 | 4b417cb278888c776d192562038260ae | False | 0.81585693359375 | data | 7.263495041839065 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_BITMAP | 0x2ca78 | 0x1d0 | Device independent bitmap graphic, 48 x 15 x 4, image size 360 | English | United States | 0.44612068965517243 |
RT_ICON | 0x1c8d0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | 0.31989247311827956 | ||
RT_ICON | 0x1cbd0 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | 0.3208092485549133 | ||
RT_ICON | 0x1d150 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | 0.3872832369942196 | ||
RT_ICON | 0x2c208 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.31989247311827956 |
RT_ICON | 0x2c4f0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.5135135135135135 |
RT_ICON | 0x2c640 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.2540322580645161 |
RT_ICON | 0x2c928 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.4560810810810811 |
RT_ICON | 0x2d1f0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | French | France | 0.5295698924731183 |
RT_ICON | 0x2d800 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152 | Italian | Italy | 0.3312274368231047 |
RT_MENU | 0x2cc58 | 0xd0 | data | English | United States | 0.6826923076923077 |
RT_MENU | 0x2d4f0 | 0x4e | data | French | France | 0.9230769230769231 |
RT_DIALOG | 0x2cd98 | 0x13e | data | English | United States | 0.6194968553459119 |
RT_DIALOG | 0x2d540 | 0x2bc | data | French | France | 0.48857142857142855 |
RT_STRING | 0x2e1d8 | 0x34 | data | English | United States | 0.5769230769230769 |
RT_STRING | 0x2e0c0 | 0x112 | data | English | United States | 0.48175182481751827 |
RT_STRING | 0x2f308 | 0xd6 | data | English | United States | 0.5 |
RT_STRING | 0x2f3e0 | 0x84 | data | French | France | 0.5 |
RT_STRING | 0x2e210 | 0x40 | data | English | United States | 0.671875 |
RT_STRING | 0x2e298 | 0x296 | data | English | United States | 0.3323262839879154 |
RT_STRING | 0x2e638 | 0x260 | data | English | United States | 0.0805921052631579 |
RT_STRING | 0x2e9e8 | 0x328 | data | English | United States | 0.34405940594059403 |
RT_STRING | 0x2e978 | 0x70 | data | English | United States | 0.625 |
RT_STRING | 0x2e530 | 0x106 | data | English | United States | 0.5763358778625954 |
RT_STRING | 0x2e898 | 0xda | data | English | United States | 0.43119266055045874 |
RT_STRING | 0x2e250 | 0x46 | data | English | United States | 0.7428571428571429 |
RT_STRING | 0x2ed10 | 0xf6 | data | English | United States | 0.47560975609756095 |
RT_STRING | 0x2f0f8 | 0x210 | data | English | United States | 0.3977272727272727 |
RT_STRING | 0x2ee08 | 0x1f8 | data | English | United States | 0.36706349206349204 |
RT_STRING | 0x2f000 | 0x86 | data | English | United States | 0.6567164179104478 |
RT_STRING | 0x2f088 | 0x6e | data | English | United States | 0.6181818181818182 |
RT_ACCELERATOR | 0x2cd28 | 0x70 | data | English | United States | 0.6785714285714286 |
RT_GROUP_ICON | 0x2c618 | 0x22 | data | English | United States | 1.0294117647058822 |
RT_GROUP_ICON | 0x2ca50 | 0x22 | data | English | United States | 1.0588235294117647 |
RT_GROUP_ICON | 0x2d4d8 | 0x14 | data | French | France | 1.25 |
RT_GROUP_ICON | 0x2e0a8 | 0x14 | data | Italian | Italy | 1.25 |
RT_GROUP_ICON | 0x1cbb8 | 0x14 | data | 1.2 | ||
RT_GROUP_ICON | 0x1d6b8 | 0x14 | data | 1.25 | ||
RT_GROUP_ICON | 0x1d138 | 0x14 | data | 1.25 | ||
RT_VERSION | 0x2ced8 | 0x314 | data | English | United States | 0.44543147208121825 |
None | 0x1d6d0 | 0xeb33 | data | 1.0004318147846738 | ||
None | 0x2cc48 | 0xe | data | English | United States | 1.5714285714285714 |
DLL | Import |
---|---|
ODBC32.dll | |
MFC42.DLL | |
MSVCRT.dll | _onexit, _exit, _XcptFilter, exit, _acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _except_handler3, _setmbcp, __dllonexit, sprintf, _access, __CxxFrameHandler, malloc, atoi, strrchr, free, _mbsstr, _mbscmp, memmove, wcslen, _ftol, sscanf, _CxxThrowException, _EH_prolog, ??1type_info@@UAE@XZ, _controlfp |
KERNEL32.dll | GetModuleHandleA, GetSystemDirectoryA, CreateFileA, GetFileSize, CloseHandle, MoveFileExA, LocalAlloc, LocalLock, LocalUnlock, GetModuleHandleW, GetLocalTime, GetProcAddress, LoadLibraryA, FreeLibrary, lstrcpynA, MultiByteToWideChar, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, GetCurrentThreadId, SetLastError, FindResourceA, LoadResource, LockResource, MulDiv, GetLastError, FormatMessageA, LocalFree, GetVersion, GetVersionExA, GetModuleFileNameA, FreeConsole, CopyFileA, GetStartupInfoA |
USER32.dll | IsWindow, SendMessageA, TrackPopupMenu, PostMessageA, SetMenuDefaultItem, KillTimer, SetTimer, CallNextHookEx, GetClassNameA, SetPropA, GetDCEx, GetPropA, RemovePropA, UnhookWindowsHookEx, SetWindowsHookExA, GetParent, GetWindowDC, ReleaseDC, IntersectRect, IsRectEmpty, DestroyIcon, DrawMenuBar, GetMenuState, wsprintfA, CallWindowProcA, GetCursorPos, GetMenuStringA, CreateMenu, CreatePopupMenu, GetDesktopWindow, LoadBitmapA, ModifyMenuA, InsertMenuA, LoadIconA, EnableWindow, GetClientRect, SetWindowLongA, AppendMenuA, DrawEdge, SetRect, FillRect, DrawFocusRect, GetMessagePos, DrawStateA, GetSystemMetrics, InflateRect, GetSysColor, GetMenuItemCount, GetSubMenu, GetMenuItemID, GetMenuItemInfoA, IsMenu, GetMenu, WindowFromDC, CopyRect, OffsetRect, SystemParametersInfoA, MessageBoxA, GetWindowRect, GetClassInfoA, RemoveMenu, UpdateWindow, ShowWindow, FindWindowA, SetForegroundWindow, GetWindowLongA, GetSystemMenu |
GDI32.dll | BitBlt, GetPixel, CreateCompatibleDC, CreateCompatibleBitmap, SetPixel, Rectangle, CreateFontIndirectA, CreateSolidBrush, CreateFontA, GetTextExtentPoint32A, RoundRect |
ADVAPI32.dll | RegCreateKeyA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA, RegCloseKey, CryptAcquireContextA, RegConnectRegistryA, QueryServiceStatus, OpenSCManagerA, OpenServiceA, CloseServiceHandle |
SHELL32.dll | SHGetMalloc, Shell_NotifyIconA |
COMCTL32.dll | ImageList_Draw, ImageList_GetIconSize, ImageList_GetIcon, ImageList_AddMasked, ImageList_SetBkColor, ImageList_ReplaceIcon |
ole32.dll | CoUninitialize, CoInitialize, CoCreateInstance |
MSVCP60.dll | ??1_Winit@std@@QAE@XZ, ??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, ?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z, ??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB, ??0_Winit@std@@QAE@XZ, ?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB, ??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z, ?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z, ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z, ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z, ?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z, ??0Init@ios_base@std@@QAE@XZ, ??1Init@ios_base@std@@QAE@XZ |
MSIMG32.dll | GradientFill |
Name | Ordinal | Address |
---|---|---|
SDASQFddefgshdSSSgfdtEghfIITFDSSSSS | 1 | 0x403660 |
Description | Data |
---|---|
CompanyName | |
FileDescription | Dialupwatch MFC Application |
FileVersion | 1, 0, 0, 1 |
InternalName | Dialupwatch |
LegalCopyright | Copyright (C) 2002 |
LegalTrademarks | |
OriginalFilename | Dialupwatch.EXE |
ProductName | Dialupwatch Application |
ProductVersion | 1, 0, 0, 1 |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
French | France | |
Italian | Italy |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-21T18:38:20.277675+0100 | 2030868 | ET MALWARE Win32/Emotet CnC Activity (POST) M10 | 1 | 192.168.2.4 | 49735 | 194.187.133.160 | 443 | TCP |
- Total Packets: 39
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 21, 2025 18:38:43.554848909 CET | 49728 | 80 | 192.168.2.4 | 74.219.172.26 |
Mar 21, 2025 18:38:44.558902979 CET | 49728 | 80 | 192.168.2.4 | 74.219.172.26 |
Mar 21, 2025 18:38:46.558944941 CET | 49728 | 80 | 192.168.2.4 | 74.219.172.26 |
Mar 21, 2025 18:38:50.574570894 CET | 49728 | 80 | 192.168.2.4 | 74.219.172.26 |
Mar 21, 2025 18:38:58.590194941 CET | 49728 | 80 | 192.168.2.4 | 74.219.172.26 |
Mar 21, 2025 18:39:08.529316902 CET | 49729 | 8080 | 192.168.2.4 | 134.209.36.254 |
Mar 21, 2025 18:39:09.527702093 CET | 49729 | 8080 | 192.168.2.4 | 134.209.36.254 |
Mar 21, 2025 18:39:11.527950048 CET | 49729 | 8080 | 192.168.2.4 | 134.209.36.254 |
Mar 21, 2025 18:39:15.527832031 CET | 49729 | 8080 | 192.168.2.4 | 134.209.36.254 |
Mar 21, 2025 18:39:23.527738094 CET | 49729 | 8080 | 192.168.2.4 | 134.209.36.254 |
Mar 21, 2025 18:39:32.520080090 CET | 49732 | 8080 | 192.168.2.4 | 104.156.59.7 |
Mar 21, 2025 18:39:33.527879000 CET | 49732 | 8080 | 192.168.2.4 | 104.156.59.7 |
Mar 21, 2025 18:39:35.527998924 CET | 49732 | 8080 | 192.168.2.4 | 104.156.59.7 |
Mar 21, 2025 18:39:39.527822018 CET | 49732 | 8080 | 192.168.2.4 | 104.156.59.7 |
Mar 21, 2025 18:39:47.543437958 CET | 49732 | 8080 | 192.168.2.4 | 104.156.59.7 |
Mar 21, 2025 18:39:56.591527939 CET | 49734 | 8080 | 192.168.2.4 | 120.138.30.150 |
Mar 21, 2025 18:39:57.590361118 CET | 49734 | 8080 | 192.168.2.4 | 120.138.30.150 |
Mar 21, 2025 18:39:59.606004953 CET | 49734 | 8080 | 192.168.2.4 | 120.138.30.150 |
Mar 21, 2025 18:40:03.605967045 CET | 49734 | 8080 | 192.168.2.4 | 120.138.30.150 |
Mar 21, 2025 18:40:11.605880022 CET | 49734 | 8080 | 192.168.2.4 | 120.138.30.150 |
Mar 21, 2025 18:40:20.732009888 CET | 49735 | 443 | 192.168.2.4 | 194.187.133.160 |
Mar 21, 2025 18:40:20.732109070 CET | 443 | 49735 | 194.187.133.160 | 192.168.2.4 |
Mar 21, 2025 18:40:20.732214928 CET | 49735 | 443 | 192.168.2.4 | 194.187.133.160 |
Mar 21, 2025 18:40:20.734124899 CET | 49735 | 443 | 192.168.2.4 | 194.187.133.160 |
Mar 21, 2025 18:40:20.734162092 CET | 443 | 49735 | 194.187.133.160 | 192.168.2.4 |
Mar 21, 2025 18:40:20.734210014 CET | 49735 | 443 | 192.168.2.4 | 194.187.133.160 |
Mar 21, 2025 18:40:20.734227896 CET | 443 | 49735 | 194.187.133.160 | 192.168.2.4 |
Mar 21, 2025 18:40:20.734263897 CET | 443 | 49735 | 194.187.133.160 | 192.168.2.4 |
Mar 21, 2025 18:40:24.756270885 CET | 49736 | 8080 | 192.168.2.4 | 104.236.246.93 |
Mar 21, 2025 18:40:25.762115002 CET | 49736 | 8080 | 192.168.2.4 | 104.236.246.93 |
Mar 21, 2025 18:40:27.762051105 CET | 49736 | 8080 | 192.168.2.4 | 104.236.246.93 |
Mar 21, 2025 18:40:31.762007952 CET | 49736 | 8080 | 192.168.2.4 | 104.236.246.93 |
Mar 21, 2025 18:40:39.761979103 CET | 49736 | 8080 | 192.168.2.4 | 104.236.246.93 |
Mar 21, 2025 18:40:48.989140987 CET | 49737 | 8080 | 192.168.2.4 | 74.208.45.104 |
Mar 21, 2025 18:40:49.996191978 CET | 49737 | 8080 | 192.168.2.4 | 74.208.45.104 |
Mar 21, 2025 18:40:52.011794090 CET | 49737 | 8080 | 192.168.2.4 | 74.208.45.104 |
Mar 21, 2025 18:40:56.027335882 CET | 49737 | 8080 | 192.168.2.4 | 74.208.45.104 |
Mar 21, 2025 18:41:04.042933941 CET | 49737 | 8080 | 192.168.2.4 | 74.208.45.104 |
Mar 21, 2025 18:41:13.469537973 CET | 49738 | 80 | 192.168.2.4 | 78.187.156.31 |
Mar 21, 2025 18:41:14.480412006 CET | 49738 | 80 | 192.168.2.4 | 78.187.156.31 |
Mar 21, 2025 18:41:16.480343103 CET | 49738 | 80 | 192.168.2.4 | 78.187.156.31 |
Mar 21, 2025 18:41:20.480381012 CET | 49738 | 80 | 192.168.2.4 | 78.187.156.31 |
Mar 21, 2025 18:41:28.495866060 CET | 49738 | 80 | 192.168.2.4 | 78.187.156.31 |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49735 | 194.187.133.160 | 443 | 7648 | C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 21, 2025 18:40:20.734124899 CET | 494 | OUT |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 13:38:24 |
Start date: | 21/03/2025 |
Path: | C:\Users\user\Desktop\task1.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 192'512 bytes |
MD5 hash: | 2BA73D2D47CF2D388446B781613B7EFF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:38:25 |
Start date: | 21/03/2025 |
Path: | C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 192'512 bytes |
MD5 hash: | 2BA73D2D47CF2D388446B781613B7EFF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 13:38:28 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:38:34 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 13:38:34 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\SgrmBroker.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6976d0000 |
File size: | 329'504 bytes |
MD5 hash: | 3BA1A18A0DC30A0545E7765CB97D8E63 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 5 |
Start time: | 13:38:34 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 6 |
Start time: | 13:38:34 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 7 |
Start time: | 13:38:35 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ca680000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 9 |
Start time: | 13:39:35 |
Start date: | 21/03/2025 |
Path: | C:\Program Files\Windows Defender\MpCmdRun.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d5ba0000 |
File size: | 468'120 bytes |
MD5 hash: | B3676839B2EE96983F9ED735CD044159 |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 13:39:35 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |