Windows
Analysis Report
041025.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
041025.exe (PID: 7288 cmdline:
"C:\Users\ user\Deskt op\041025. exe" MD5: 61E4F067963C7DBD7547E1C8AD1C74A6) 041025.exe (PID: 7400 cmdline:
"C:\Users\ user\Deskt op\041025. exe" MD5: 61E4F067963C7DBD7547E1C8AD1C74A6) 041025.exe (PID: 7408 cmdline:
"C:\Users\ user\Deskt op\041025. exe" MD5: 61E4F067963C7DBD7547E1C8AD1C74A6)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{
"Host:Port:Password": [
"vtrow.ydns.eu:2404:1"
],
"Assigned name": "ServerT",
"Connect interval": "1",
"Install flag": "Disable",
"Setup HKCU\\Run": "Enable",
"Setup HKLM\\Run": "Enable",
"Install path": "Application path",
"Copy file": "conhost.exe",
"Startup value": "Edge",
"Hide file": "Enable",
"Mutex": "Rmc-OYYBQ1",
"Keylog flag": "1",
"Keylog path": "Application path",
"Keylog file": "logs.dat",
"Keylog crypt": "Disable",
"Hide keylog file": "Disable",
"Screenshot flag": "Disable",
"Screenshot time": "1",
"Take Screenshot option": "Disable",
"Take screenshot title": "",
"Take screenshot time": "5",
"Screenshot path": "AppData",
"Screenshot file": "Screenshots",
"Screenshot crypt": "Disable",
"Mouse option": "Disable",
"Delete file": "Disable",
"Audio record time": "5",
"Audio folder": "MicRecords",
"Connect delay": "0",
"Copy folder": "Microsoft",
"Keylog folder": "remcos",
"Keylog file max size": "100"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer | detects Windows exceutables potentially bypassing UAC using eventvwr.exe | ditekSHen |
| |
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Click to see the 17 entries |
Stealing of Sensitive Information |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-10T08:35:16.178684+0200 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49687 | 188.93.233.42 | 2404 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-10T08:35:17.862422+0200 | 2803304 | 3 | Unknown Traffic | 192.168.2.6 | 49688 | 178.237.33.50 | 80 | TCP |
- • AV Detection
- • Cryptography
- • Compliance
- • Spreading
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • E-Banking Fraud
- • Spam, unwanted Advertisements and Ransom Demands
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Neural Call Log Analysis: |
Source: | Code function: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Networking |
---|
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | Code function: |
Source: | Windows user hook set: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Spam, unwanted Advertisements and Ransom Demands |
---|
Source: | Code function: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | File opened: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | Code function: |
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: |
Source: | Code function: |
Source: | Thread delayed: |
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | API coverage: |
Source: | Thread sleep time: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: |
Source: | Process information queried: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Process token adjusted: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Memory allocated: |
Source: | Code function: |
Source: | Code function: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Key value queried: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Remote Access Functionality |
---|
Source: | Mutex created: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 1 OS Credential Dumping | 2 System Time Discovery | Remote Services | 11 Archive Collected Data | 12 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 12 Command and Scripting Interpreter | 1 Windows Service | 1 Access Token Manipulation | 1 Deobfuscate/Decode Files or Information | 211 Input Capture | 1 Account Discovery | Remote Desktop Protocol | 211 Input Capture | 2 Encrypted Channel | Exfiltration Over Bluetooth | 1 Defacement |
Email Addresses | DNS Server | Domain Accounts | 2 Service Execution | Logon Script (Windows) | 1 Windows Service | 3 Obfuscated Files or Information | 2 Credentials In Files | 1 System Service Discovery | SMB/Windows Admin Shares | 3 Clipboard Data | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 22 Process Injection | 12 Software Packing | NTDS | 2 File and Directory Discovery | Distributed Component Object Model | Input Capture | 1 Remote Access Software | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Timestomp | LSA Secrets | 33 System Information Discovery | SSH | Keylogging | 2 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 21 Security Software Discovery | VNC | GUI Input Capture | 12 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Masquerading | DCSync | 31 Virtualization/Sandbox Evasion | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 31 Virtualization/Sandbox Evasion | Proc Filesystem | 3 Process Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 Access Token Manipulation | /etc/passwd and /etc/shadow | 1 Application Window Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
IP Addresses | Compromise Infrastructure | Supply Chain Compromise | PowerShell | Cron | Cron | 22 Process Injection | Network Sniffing | 1 System Owner/User Discovery | Shared Webroot | Local Data Staging | File Transfer Protocols | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | External Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
31% | Virustotal | Browse | ||
39% | ReversingLabs | |||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
geoplugin.net | 178.237.33.50 | true | false | high | |
vtrow.ydns.eu | 188.93.233.42 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.93.233.42 | vtrow.ydns.eu | Portugal | 47674 | NETSOLUTIONSNL | true | |
178.237.33.50 | geoplugin.net | Netherlands | 8455 | ATOM86-ASATOM86NL | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1661512 |
Start date and time: | 2025-04-10 08:34:12 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 041025.exe |
Detection: | MAL |
Classification: | mal100.rans.troj.spyw.evad.winEXE@5/3@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, sppsvc.exe, WMIADA P.exe, SIHClient.exe, SgrmBrok er.exe, conhost.exe, svchost.e xe - Excluded IPs from analysis (wh
itelisted): 184.31.69.3, 20.10 9.210.53 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , ctldl.windowsupdate.com, c.p ki.goog, fe3cr.delivery.mp.mic rosoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
02:35:13 | API Interceptor |
Process: | C:\Users\user\Desktop\041025.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 144 |
Entropy (8bit): | 3.365630494294252 |
Encrypted: | false |
SSDEEP: | 3:rglRKfVlPWlQlNUlR65JWRal2Jl+7R0DAlBG45klovDl6v:MlR62lQ8W5YcIeeDAlOWAv |
MD5: | BDEE7BD5A61F135EDB0F5A70683BCDD4 |
SHA1: | 381993955B2B4494856B4EA4BA70D3DB5332F8C8 |
SHA-256: | 74BB5432EEB5FD42048C2BFE05F18BA66DDD693721689EBA83D04777998FEF3A |
SHA-512: | 7789102A1083AB6148A8AAFEBA208A7C97528469BC6BC4532617B52F7D29CE428BA367DDDF8C1CA70EE1410095103B36B234BFD70CC792DBF8274D5F87414170 |
Malicious: | true |
Yara Hits: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\041025.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84qXKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3ogvitHo6hAHKzea |
MD5: | E193AFF55D4BDD9951CB4287A7D79653 |
SHA1: | F94AD920B9E0EB43B5005D74552AB84EAA38E985 |
SHA-256: | 08DD5825B4EDCC256AEB08525DCBCDA342252A9C9746BE23FBC70A801F5A596E |
SHA-512: | 86F6ECDB47C1A7FFA460F3BC6038ACAFC9D4DED4D1E8D1FB7B8FE9145D9D384AB4EE7A7C3BE959A25B265AFEDB8FD31BA10073EC116B65BFE3326EF2C53394E6 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\041025.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 975 |
Entropy (8bit): | 5.00635384400645 |
Encrypted: | false |
SSDEEP: | 12:tkGSh+nd6CsGkMyGWKyGXPVGArwY3fosGIaWHHGIG2IArpv/mOAaNO+ao9W7iN56:qBhydRNuKyGX85iDvXhNlT3/7wcJWrZ |
MD5: | 6D3945F9944878AEF3AABC087DE12E2A |
SHA1: | 839E3953827F9F4A573AAA7DC9A8165C580422C6 |
SHA-256: | 2DBB16CF907E690862716CDB4A2DCE865F5A0F2025CEAA06DA800DF7A940D3F6 |
SHA-512: | FFF612097268770E26E419C597E9AF4867A325C9CD9B870CAFBCF32FBC04EE80FE93A5B558B4B606FE8B2CE1819330AB22484DF2940586753597C8E5964F16D5 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 7.895435282986037 |
TrID: |
|
File name: | 041025.exe |
File size: | 908'800 bytes |
MD5: | 61e4f067963c7dbd7547e1c8ad1c74a6 |
SHA1: | 2792be80df914df9c1f3ae21a2c4cde29f96529c |
SHA256: | f8984264632a0aba48bcd90967988aa1d2c10f9381d00abc08456431ea46d208 |
SHA512: | 97f94ea2425a99ba5f33e0b211a60457b98f12960a44e4b58ad7839d62ee8b9dd34d92cb0ac4889c06e1ca386bd80039a2ded18c008d1c0ff103e57bc1765e67 |
SSDEEP: | 24576:E5aGoULXPM6JyI3R3QrtgcIbUKMQgXkOjK:E5aPUjPZ3JctzSrMQYksK |
TLSH: | 58151304611AC823D5925FB44D23C2B85B789E9D3917C343AFD9BEDFB4BB20D2684396 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. .......................@............`................................ |
Icon Hash: | 161741490761690f |
Entrypoint: | 0x4de302 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xAE11ECA4 [Tue Jul 18 01:04:36 2062 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
bound eax, dword ptr [eax] |
add byte ptr [eax], al |
push edi |
add byte ptr [eax], al |
add byte ptr [eax+eax+00h], bl |
add byte ptr [edi+00h], bl |
add byte ptr [eax], al |
pop eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xde2b0 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe0000 | 0x1510 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe2000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xde294 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xdc320 | 0xdc400 | d430164bf08b169dd2b6cef97669e415 | False | 0.9539519189841089 | data | 7.901414926678369 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe0000 | 0x1510 | 0x1600 | 4dee1b8f0e8b97e24db37753b587f097 | False | 0.73046875 | data | 6.841711959073226 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe2000 | 0xc | 0x200 | 441106e27142393e400324fc481c049e | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xe0100 | 0xeb5 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.8942895086321381 | ||
RT_GROUP_ICON | 0xe0fc8 | 0x14 | data | 1.05 | ||
RT_VERSION | 0xe0fec | 0x324 | data | 0.4228855721393035 | ||
RT_MANIFEST | 0xe1320 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
Comments | |
CompanyName | |
FileDescription | CommonPractice |
FileVersion | 1.0.0.0 |
InternalName | mmRF.exe |
LegalCopyright | Copyright 2020 |
LegalTrademarks | |
OriginalFilename | mmRF.exe |
ProductName | CommonPractice |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-10T08:35:16.178684+0200 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.6 | 49687 | 188.93.233.42 | 2404 | TCP |
2025-04-10T08:35:17.862422+0200 | 2803304 | ETPRO MALWARE Common Downloader Header Pattern HCa | 3 | 192.168.2.6 | 49688 | 178.237.33.50 | 80 | TCP |
- Total Packets: 30
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 10, 2025 08:35:15.412461042 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:15.585067034 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:15.585155010 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:15.590441942 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:15.849140882 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:16.134504080 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:16.178683996 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:16.349941969 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:16.354525089 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:16.651575089 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:16.651654005 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:16.954319954 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:16.966955900 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:16.969125032 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:17.153740883 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:17.194319963 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:17.521987915 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:35:17.689774990 CEST | 80 | 49688 | 178.237.33.50 | 192.168.2.6 |
Apr 10, 2025 08:35:17.689862013 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:35:17.690171957 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:35:17.862339020 CEST | 80 | 49688 | 178.237.33.50 | 192.168.2.6 |
Apr 10, 2025 08:35:17.862421989 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:35:17.921936989 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:18.161545992 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:18.862983942 CEST | 80 | 49688 | 178.237.33.50 | 192.168.2.6 |
Apr 10, 2025 08:35:18.863082886 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:35:56.350506067 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:35:56.360460043 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:35:56.661458969 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:36:36.236046076 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:36:36.244177103 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:36:36.553971052 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:37:07.306554079 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:37:07.819385052 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:37:08.710141897 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:37:10.460969925 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:37:14.022617102 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:37:15.083479881 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:37:15.087785959 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:37:15.361160994 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:37:21.022547007 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:37:34.819430113 CEST | 49688 | 80 | 192.168.2.6 | 178.237.33.50 |
Apr 10, 2025 08:37:53.494527102 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:37:53.496088028 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:37:54.022562981 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:37:54.205435038 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:38:33.343393087 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:38:33.348747015 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:38:33.654670954 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:39:13.306893110 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Apr 10, 2025 08:39:13.311414003 CEST | 49687 | 2404 | 192.168.2.6 | 188.93.233.42 |
Apr 10, 2025 08:39:13.571367979 CEST | 2404 | 49687 | 188.93.233.42 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 10, 2025 08:35:15.201746941 CEST | 58249 | 53 | 192.168.2.6 | 1.1.1.1 |
Apr 10, 2025 08:35:15.391652107 CEST | 53 | 58249 | 1.1.1.1 | 192.168.2.6 |
Apr 10, 2025 08:35:17.309334040 CEST | 52182 | 53 | 192.168.2.6 | 1.1.1.1 |
Apr 10, 2025 08:35:17.413151979 CEST | 53 | 52182 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 10, 2025 08:35:15.201746941 CEST | 192.168.2.6 | 1.1.1.1 | 0x9776 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 10, 2025 08:35:17.309334040 CEST | 192.168.2.6 | 1.1.1.1 | 0xcf70 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 10, 2025 08:35:15.391652107 CEST | 1.1.1.1 | 192.168.2.6 | 0x9776 | No error (0) | 188.93.233.42 | A (IP address) | IN (0x0001) | false | ||
Apr 10, 2025 08:35:17.413151979 CEST | 1.1.1.1 | 192.168.2.6 | 0xcf70 | No error (0) | 178.237.33.50 | A (IP address) | IN (0x0001) | false |
|
Click to jump to process
Target ID: | 0 |
Start time: | 02:35:12 |
Start date: | 10/04/2025 |
Path: | C:\Users\user\Desktop\041025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc20000 |
File size: | 908'800 bytes |
MD5 hash: | 61E4F067963C7DBD7547E1C8AD1C74A6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 02:35:14 |
Start date: | 10/04/2025 |
Path: | C:\Users\user\Desktop\041025.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x370000 |
File size: | 908'800 bytes |
MD5 hash: | 61E4F067963C7DBD7547E1C8AD1C74A6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 02:35:14 |
Start date: | 10/04/2025 |
Path: | C:\Users\user\Desktop\041025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 908'800 bytes |
MD5 hash: | 61E4F067963C7DBD7547E1C8AD1C74A6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |