Analysis Report http://www.facebook.com/ajax/bnzai?__a=1&__beoa=0&__ccg=GOOD&__comet_req=1&__hsi=6923245573667911923-0&__pc=EXP2:comet_pkg&__req=am&__rev=1003240513&__s=:dkokxu:u9vl6u&__spin_b=trunk&__spin_r=1003240513&__spin_t=1611943723&__user=686000159&dpr=1&fb_dtsg=AQEu0OP1QKud:AQHoZW_QMXU6&jazoest=22005&ph=C3e
Overview
General Information
Sample URL: | http://www.facebook.com/ajax/bnzai?__a=1&__beoa=0&__ccg=GOOD&__comet_req=1&__hsi=6923245573667911923-0&__pc=EXP2:comet_pkg&__req=am&__rev=1003240513&__s=:dkokxu:u9vl6u&__spin_b=trunk&__spin_r=1003240513&__spin_t=1611943723&__user=686000159&dpr=1&fb_dtsg=AQEu0OP1QKud:AQHoZW_QMXU6&jazoest=22005&ph=C3e |
Analysis ID: | 346223 |
Most interesting Screenshot: |
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Compliance: |
---|
Uses new MSVCR Dlls |
Source: | File opened: | Jump to behavior |
Uses secure TLS version for HTTPS connections |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Encrypted Channel2 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
star-mini.c10r.facebook.com | 31.13.92.36 | true | false | high | |
www.facebook.com | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
31.13.92.36 | unknown | Ireland | 32934 | FACEBOOKUS | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 346223 |
Start date: | 29.01.2021 |
Start time: | 21:16:17 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://www.facebook.com/ajax/bnzai?__a=1&__beoa=0&__ccg=GOOD&__comet_req=1&__hsi=6923245573667911923-0&__pc=EXP2:comet_pkg&__req=am&__rev=1003240513&__s=:dkokxu:u9vl6u&__spin_b=trunk&__spin_r=1003240513&__spin_t=1611943723&__user=686000159&dpr=1&fb_dtsg=AQEu0OP1QKud:AQHoZW_QMXU6&jazoest=22005&ph=C3e |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@3/17@2/1 |
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30296 |
Entropy (8bit): | 1.8592430237211452 |
Encrypted: | false |
SSDEEP: | 96:rvZUZm2Z9WoStoPbfo/gnKMo5/qotlQo4xfoggu6X:rvZUZm2Z9WoStoTfo/xMoco0o2fog8X |
MD5: | ED3E0478C01C8467D1A3A096982766C4 |
SHA1: | 5EB0608CC3C45C6EE1B24CA13B9FA541451C5797 |
SHA-256: | 1D4F3AEE74A1117E9E733AEA1D7717DFF6FCEC09358A779681A9AE3D578B08C5 |
SHA-512: | 00D12AF64AC3E84FA2FDF752E6D8DB61DB48137A92A13265CEE614952A8B1521CDE8AF022B3ED234E570347B174578E9C0B1A3E0C4559B3DABB7417250D3F07E |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24712 |
Entropy (8bit): | 1.7397545234965146 |
Encrypted: | false |
SSDEEP: | 96:rRZSQG6oBSOFjx21akW1CM1FYBPj0o4abr4fHg:rRZSQG6okOFjx21akW1CM1FYBPjhBgg |
MD5: | 9C3C84417123EDFD89A699CA96269B25 |
SHA1: | E47BE888C49F0BC7735104D71475FDF607DD570E |
SHA-256: | 76B9AB1E10EC181AB508B64EE71C61C93A161D467F11E6C7BA345C4A3EA1F4BC |
SHA-512: | 03C125AC8DB29AB2C10623590C19B6FFF5DBF3B1FC882B34EBD95B7B3F7B9ADFD43F974814135FB2F430F24D5A10F3092C24ADFE170BBAFA3B4B1F8E12726B6C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16984 |
Entropy (8bit): | 1.5640937166004127 |
Encrypted: | false |
SSDEEP: | 48:Iw9Gcpr4Gwpa1G4pQGGrapbS1rGQpKbG7HpR8sTGIpG:rjZgQn6IBS1FAaT84A |
MD5: | 9D11C4AEAD3ABEDE23FF32FF6090BD8A |
SHA1: | 8BAEF6746F75BBC239A764BDCCC91B64C014F9FD |
SHA-256: | 4018EB9B511346E8525621D64CC2557FE4C3B588244905139D8ADCDB27E62B3B |
SHA-512: | FEFAED1506F5D7DD3067ABB5E0C22626D9A848F52E3E9A3F6110EEE6054BE5F16F840E6E012AB17F8740522633606EB3746C650430EF114BD1BA90036A5DD9A5 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 657 |
Entropy (8bit): | 5.07212600329416 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxOEuuTuonWimI002EtM3MHdNMNxOEuuTuonWimI00ONVbkEtMb:2d6NxOMqoSZHKd6NxOMqoSZ7Qb |
MD5: | 1DB11F3AAD54D8648ACD9CEFC2846232 |
SHA1: | 993542FC25939061135A1579CDC137023B6BE5A2 |
SHA-256: | DB297CE7F1E614AD6D4FB62E98A27ACA411D30C42E2ECBA7A9E14B4019A785CB |
SHA-512: | E2ACF7C4B9CB918E2FC80DAB03F1EB8AF16B4DC4891665AD95DFD0EB9FFD8D47ADB0E03848F9F34818CC99FEB66E8FCC8CEC18B360A51FDBE43E0FD0FB031DF3 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 654 |
Entropy (8bit): | 5.0948841167433 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxe2kvBhnWimI002EtM3MHdNMNxe2kvBhnWimI00ONkak6EtMb:2d6NxryBhSZHKd6NxryBhSZ72a7b |
MD5: | 5FA4F13AE302F045CA0F61785A2ECD53 |
SHA1: | 6FFF3DC73D00CA7CBA448CBACD751BD5D4E8144F |
SHA-256: | D0CC828BE951C1F049534EC2030FD3FA113E42C55450532F9D75C333E02A84D7 |
SHA-512: | DD5404CE52D79850B2BEB18CB5C4AD09785B4E84D8A448BA8538F4DD2915CFA7E3898B2E0968F346A0E98EE4B493036DBE3B7F3557A490B4E8F5CD25E9A4A11D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 663 |
Entropy (8bit): | 5.083014178847117 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxvL9nWimI002EtM3MHdNMNxvL9nWimI00ONmZEtMb:2d6NxvJSZHKd6NxvJSZ7Ub |
MD5: | 964B35B4846B6A6ACF5FAA4BB54F03D8 |
SHA1: | D15E20E72F251750A6B72F125E45D751D98E9DD2 |
SHA-256: | 02A4AD70268FC59F613171C5C0BE8198C30EFE5C00DF208CEFE4A4520D7065EB |
SHA-512: | 2DE47B057E9A8C9C25194D23F61AA0BF4D1836B298A241E1A2C7653D3B9CC69406A8463103F7257E42A06A9D67EA7C8B7A4A76747C4C70760CF501951F9814F8 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 648 |
Entropy (8bit): | 5.071036164220223 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxi0xbxonWimI002EtM3MHdNMNxi0xbxonWimI00ONd5EtMb:2d6NxfB+SZHKd6NxfB+SZ7njb |
MD5: | BC681CB60CC7B51E6729F7A127419D9B |
SHA1: | 4EB16ACD47065908DCDF9FD1E32EF50C41ADEA92 |
SHA-256: | 83ADEE0761A7485AA173ECDF6D59E876073275957ACDF4E929C5A82BC562ABB0 |
SHA-512: | D60C55C1DF73F554C5E3E080E654315CE98E9DA2ECD496138CD412C0A9F9C866BC8DD032769FAF4788BF01A363F1E417A739113D6330A82916FAC95F961989E1 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 657 |
Entropy (8bit): | 5.0991278075972675 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxhGw9nWimI002EtM3MHdNMNxhGw9nWimI00ON8K075EtMb:2d6NxQISZHKd6NxQISZ7uKajb |
MD5: | 265199DD1469BADEF1841269A6F3BE27 |
SHA1: | C59DD74F240FA0D0B02BE6CEE21DE4A633C156E0 |
SHA-256: | E8DC1DA532F9636B6E2BE09274CCE4200CE3761F0B5C9EA7D2BC181979A5AD79 |
SHA-512: | 2C8E931227528EC3BCB7F389F92C6A9F9984C08A895B235BFA3B982131EA689DC6E7DD3A0CDBAC6998463EE4DD9B7199021D49C2FCC9787FCE9FD3E6311563A7 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 654 |
Entropy (8bit): | 5.075772359320338 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNx0nuuTuonWimI002EtM3MHdNMNx0nuuTuonWimI00ONxEtMb:2d6Nx0BqoSZHKd6Nx0BqoSZ7Vb |
MD5: | E1AEE9A8A3E60091AD9F1DD3AE8957E1 |
SHA1: | 5EA99FDF523D5D71200B761B3A282D2BEBA88C78 |
SHA-256: | F36CB9E9823FECEF603103B33171C1ED4D43E4435220F965D4E2EC05E7770922 |
SHA-512: | CA4889461BC583718391A312EECB561179A0DDE132B753339917F81DD851F37B6B53093872E72D8432B53811A5D21E6655EEFE7514CCB1034328CE12F5D5F27A |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 657 |
Entropy (8bit): | 5.111700954951745 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxxuuTuonWimI002EtM3MHdNMNxxuuTuonWimI00ON6Kq5EtMb:2d6NxvqoSZHKd6NxvqoSZ7ub |
MD5: | E51FEFF218691AA0EA7615FDC85A5216 |
SHA1: | 01C114253BCCA323D8BB9AF1FE48B3FE25191967 |
SHA-256: | 032E47305051CD127CD714F6B5C8E2E61DBC90D438A76EF0D74EFDFA7A70BBF9 |
SHA-512: | 42C5F0D1996D41388A6BACDDD0E172A4E5DD95DA2487276088AC9D8415C483947E6E58BF327CCA6B8B7BEE96558BD6FAABDC3CCC265D0570352D3270E1101961 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 660 |
Entropy (8bit): | 5.072615260383952 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxc0xbxonWimI002EtM3MHdNMNxc0xbxonWimI00ONVEtMb:2d6NxBB+SZHKd6NxBB+SZ71b |
MD5: | 979CE5F3B3A5CCA71FEF64C89F5C36E8 |
SHA1: | AF5A9675C0308824D70829B2EF1EAFC8E9F966EE |
SHA-256: | DCCA7891E2AFDC4C8CFF0E30993DAB094AFE357C5087D754DFD0ADE69FC8BF88 |
SHA-512: | 7E51D1B4254ABFD8636F19E510D96677932B7740D366884C79B6B0E92D38F62F2FBFE62A0BDD5E89B73C725DEA33A0AF7A4A09B8627DD8F1F38F4EBA70699830 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 654 |
Entropy (8bit): | 5.056663683735949 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxfn0xbxonWimI002EtM3MHdNMNxfn0xbxonWimI00ONe5EtMb:2d6Nx8B+SZHKd6Nx8B+SZ7Ejb |
MD5: | E6F76EA7567E1422F58144047FD0A67B |
SHA1: | 8C127E789D99BE98D135342213338E84F382E4AC |
SHA-256: | 30B32C930210CCF376DF21BAF204C48120E52CD948CC5F6F7FD25EF2081902F3 |
SHA-512: | B90DD035BA88BBBEFC2AEF4538558DB8BF2E27280DA912A03607B4CE642850DD4A93745807F233EE59A22EDEC601E0E83E3B05BB73FA2E290406AE746AB14196 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | modified |
Size (bytes): | 1260 |
Entropy (8bit): | 3.298934685955963 |
Encrypted: | false |
SSDEEP: | 6:mYFMGuBicAMlGR2G6RjVChRj/tjRj/tjRj/tjRj/t9ZItjRc8tjROctjRIMtPCbo:HapplOgCrZvxRHtS5t |
MD5: | F24ED075BFEA86412792EC4A6E8FF38E |
SHA1: | 23A0AF42BE1371F9A6D544A73E27D4F0E3FD90AC |
SHA-256: | A7794DCE46366D0DB776EF637998EBE452DE4954552487CD9F7ABF6953459D0C |
SHA-512: | 49B74FD2E189E4CECF0ABBCA1BAC070BAEF8D0A57BAA07C40DA3619448E91132DCEF8E60B9908148FB1882851BD2846FC43AC6CDA66BBECE018FA883F36AD1BD |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1150 |
Entropy (8bit): | 3.096842379312471 |
Encrypted: | false |
SSDEEP: | 6:9G6RjVChRj/tjRj/tjRj/tjRj/t9ZItjRc8tjROctjRIMtPCbtHuOvt7H+tqt5bH:jCrZvxRHn |
MD5: | 7E765F1C4CB20568118ED55C0B6FFA91 |
SHA1: | F93262E997539B566510FF749C97CA8A4768D8C9 |
SHA-256: | 5678EE6A1F605D6ADA6230003A8D9C182869E1F40D02D414B368CC820C9A97B8 |
SHA-512: | 0072228254406F41CE31EA036A36FBCF0E01A2886AE07DDB93E89C9E69830C83FFD16475088ECE9CB0A3A3344B983141577749EE0C8E05C943AE67786F9F1ECB |
Malicious: | false |
Reputation: | low |
IE Cache URL: | https://www.facebook.com/favicon.ico |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25441 |
Entropy (8bit): | 0.27918767598683664 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab |
MD5: | AB889A32AB9ACD33E816C2422337C69A |
SHA1: | 1190C6B34DED2D295827C2A88310D10A8B90B59B |
SHA-256: | 4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA |
SHA-512: | BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13029 |
Entropy (8bit): | 0.4812253803031642 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9loST9loST9lWSHZjl0Zj0C0CzR0ZzRE:kBqoISUSKSHZjlAj0C0ClAlE |
MD5: | E8C2F01B6ED0A422C112D9FEAC193212 |
SHA1: | F9E567097090520FCB4A4EF4279D72C562182ECE |
SHA-256: | DC1635FF340D9B4BAD7104E4061EEB0F7E5EAB1C959FCD8C3D885D9935E3A299 |
SHA-512: | 4AA80902FA28FD3FAE70EA927E3C2501CE78B02AF3DD831D4A892B426C8E473E7E5BF917CCED2AF584FD4FC76C8CB04D623145687936DAA8C1B8F5F3CC68B4E5 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34905 |
Entropy (8bit): | 0.4438650500958105 |
Encrypted: | false |
SSDEEP: | 96:kBqoxKAuvScS+mg1A1h1K1DPj0o4abr4fO:kBqoxKAuqR+mg1A1h1K1DPjhBd |
MD5: | 96CF1BB0AD7B8760F29F6ED1CE8A9EBC |
SHA1: | E54828DB9F6393F333EAF2F4939FB3EDCA6271DE |
SHA-256: | 22B80B68116FF136F85D7599089CB92E717640159192F0C5F2C133D0AC0AF3CA |
SHA-512: | C3B5AE569DE3D5737A29F7F389E9B008633CC4118A169A989AFBE6313F478EB2B96549BEBD758E53EE733BCE7EB7A97D57B570FC7BD9D774C9B005993249CD79 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
No static file info |
---|
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 62
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 29, 2021 21:17:08.607692957 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.608632088 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.647797108 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.647993088 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.648369074 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.648449898 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.653548002 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.653564930 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.693473101 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.693938017 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.694181919 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.694224119 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.694248915 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.694282055 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.694288015 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.694323063 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.694334030 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.694339037 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.694348097 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.694360971 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.694381952 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.694400072 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.733381987 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.733486891 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.739300966 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.739371061 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.739463091 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.773281097 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.773344040 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.773464918 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.773477077 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.773561001 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.773633957 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.773663998 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.773703098 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.773720026 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.773778915 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.774688005 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.774768114 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.779228926 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.779249907 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.779371977 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.779387951 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.779401064 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.779441118 CET | 49723 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.779546022 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.779647112 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.779726028 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:08.854598045 CET | 443 | 49723 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.857219934 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.874695063 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:08.874842882 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:09.064620018 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:09.105551004 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:09.105576992 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:09.105910063 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:09.201278925 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:09.201428890 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:09.201478958 CET | 443 | 49722 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:09.201550007 CET | 49722 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.067066908 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.109169960 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.109325886 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.128354073 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.168292999 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.169001102 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.169047117 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.169078112 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.169086933 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.169116020 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.169131041 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.201261997 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.241473913 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.241542101 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.241631985 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.250866890 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Jan 29, 2021 21:17:25.290735960 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.392071962 CET | 443 | 49725 | 31.13.92.36 | 192.168.2.5 |
Jan 29, 2021 21:17:25.392184973 CET | 49725 | 443 | 192.168.2.5 | 31.13.92.36 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 29, 2021 21:17:02.086458921 CET | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:02.137259960 CET | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:03.049823999 CET | 63183 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:03.097990990 CET | 53 | 63183 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:04.019006968 CET | 60151 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:04.067162037 CET | 53 | 60151 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:04.972074986 CET | 56969 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:05.020090103 CET | 53 | 56969 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:07.397732973 CET | 55161 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:07.455259085 CET | 53 | 55161 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:08.540086985 CET | 54757 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:08.598112106 CET | 53 | 54757 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:25.003170013 CET | 49992 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:25.062213898 CET | 53 | 49992 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:27.194133043 CET | 60075 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:27.251593113 CET | 53 | 60075 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:29.206895113 CET | 55016 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:29.254760027 CET | 53 | 55016 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:37.409466982 CET | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:37.457647085 CET | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:38.114922047 CET | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:38.174447060 CET | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:38.406128883 CET | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:38.454150915 CET | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:39.124264956 CET | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:39.175045967 CET | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:39.420466900 CET | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:39.477210045 CET | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:39.546163082 CET | 54791 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:39.603600025 CET | 53 | 54791 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:40.139206886 CET | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:40.189946890 CET | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:41.420794964 CET | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:41.468982935 CET | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:42.139328957 CET | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:42.198407888 CET | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:45.436489105 CET | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:45.484390974 CET | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:46.155288935 CET | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:46.206090927 CET | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
Jan 29, 2021 21:17:51.308775902 CET | 50463 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 29, 2021 21:17:51.360008955 CET | 53 | 50463 | 8.8.8.8 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jan 29, 2021 21:17:08.540086985 CET | 192.168.2.5 | 8.8.8.8 | 0x8f34 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 29, 2021 21:17:25.003170013 CET | 192.168.2.5 | 8.8.8.8 | 0x53a5 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jan 29, 2021 21:17:08.598112106 CET | 8.8.8.8 | 192.168.2.5 | 0x8f34 | No error (0) | star-mini.c10r.facebook.com | CNAME (Canonical name) | IN (0x0001) | ||
Jan 29, 2021 21:17:08.598112106 CET | 8.8.8.8 | 192.168.2.5 | 0x8f34 | No error (0) | 31.13.92.36 | A (IP address) | IN (0x0001) | ||
Jan 29, 2021 21:17:25.062213898 CET | 8.8.8.8 | 192.168.2.5 | 0x53a5 | No error (0) | star-mini.c10r.facebook.com | CNAME (Canonical name) | IN (0x0001) | ||
Jan 29, 2021 21:17:25.062213898 CET | 8.8.8.8 | 192.168.2.5 | 0x53a5 | No error (0) | 31.13.92.36 | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
Jan 29, 2021 21:17:08.694248915 CET | 31.13.92.36 | 443 | 192.168.2.5 | 49723 | CN=*.facebook.com, O="Facebook, Inc.", L=Menlo Park, ST=California, C=US CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US | CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | Tue Dec 22 01:00:00 CET 2020 Tue Oct 22 14:00:00 CEST 2013 | Mon Mar 22 00:59:59 CET 2021 Sun Oct 22 14:00:00 CEST 2028 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,0 | 9e10692f1b7f78228b2d4e424db3a98c |
CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US | CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | Tue Oct 22 14:00:00 CEST 2013 | Sun Oct 22 14:00:00 CEST 2028 | |||||||
Jan 29, 2021 21:17:08.694348097 CET | 31.13.92.36 | 443 | 192.168.2.5 | 49722 | CN=*.facebook.com, O="Facebook, Inc.", L=Menlo Park, ST=California, C=US CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US | CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | Tue Dec 22 01:00:00 CET 2020 Tue Oct 22 14:00:00 CEST 2013 | Mon Mar 22 00:59:59 CET 2021 Sun Oct 22 14:00:00 CEST 2028 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,0 | 9e10692f1b7f78228b2d4e424db3a98c |
CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US | CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | Tue Oct 22 14:00:00 CEST 2013 | Sun Oct 22 14:00:00 CEST 2028 | |||||||
Jan 29, 2021 21:17:25.169078112 CET | 31.13.92.36 | 443 | 192.168.2.5 | 49725 | CN=*.facebook.com, O="Facebook, Inc.", L=Menlo Park, ST=California, C=US CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US | CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | Tue Dec 22 01:00:00 CET 2020 Tue Oct 22 14:00:00 CEST 2013 | Mon Mar 22 00:59:59 CET 2021 Sun Oct 22 14:00:00 CEST 2028 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,0 | 37f463bf4616ecd445d4a1937da06e19 |
CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US | CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | Tue Oct 22 14:00:00 CEST 2013 | Sun Oct 22 14:00:00 CEST 2028 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 21:17:06 |
Start date: | 29/01/2021 |
Path: | C:\Program Files\internet explorer\iexplore.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff73c2e0000 |
File size: | 823560 bytes |
MD5 hash: | 6465CB92B25A7BC1DF8E01D8AC5E7596 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 21:17:07 |
Start date: | 29/01/2021 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xeb0000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|