Analysis Report http://torpig-sinkhole.org
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
Source: | File opened: | Jump to behavior |
Networking: |
---|
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) |
Source: | Snort IDS: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Non-Application Layer Protocol3 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Application Layer Protocol3 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Ingress Tool Transfer3 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
torpig-sinkhole.org | 87.106.18.122 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
87.106.18.122 | torpig-sinkhole.org | Germany | 8560 | ONEANDONE-ASBrauerstrasse48DE | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 381785 |
Start date: | 05.04.2021 |
Start time: | 03:43:15 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://torpig-sinkhole.org |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@3/14@1/1 |
Cookbook Comments: |
|
Warnings: | Show All
|
Errors: |
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30296 |
Entropy (8bit): | 1.8601663852646546 |
Encrypted: | false |
SSDEEP: | 96:rbZAZ20n220sTW20s2G1t20s2Gs0Df20s2GsH0JdM20s2GcHHR20s2GcmHjY20sR:rbZAZ/2wWAt4fkdMDtWf6sX |
MD5: | 7D3A7498E6D3A77A7F77B41EA001DA72 |
SHA1: | CDDCE540C5D4AC97857D2F391248A01AA7A6D3CF |
SHA-256: | EA9CDB373FCCBD11D39E15AA5FCF06EAABD06D87729B930FFA1D64E0C383D718 |
SHA-512: | 0C9D6D0A7E484F765B24F596D23974FE92088F588677B018DE8CF71379D1DCADD7801038400FA4B6FCE30D512BC3E3994D1EC03AB53B1E843642D71FE227E80B |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24164 |
Entropy (8bit): | 1.6280145780594188 |
Encrypted: | false |
SSDEEP: | 48:IwMcGcpraxhGwpaVG4pQ1GrapbSqGQpB2GHHpcvTGUp8ZGzYpmMiGopSKuGmXpm:rMAZaxQH6lBSSj125W3ML4rg |
MD5: | C9CEA3E6B0E7C276113A7355DED7D15A |
SHA1: | 69A73418535B1A56E7BC532A95DFA76E901155AE |
SHA-256: | 4A13C9CD0FF1FCB47180F345EB2CACA6C733498CBFA5E82E8E0186663D3D22B0 |
SHA-512: | 0D02E1A0EDE164EDCED1E4CDE90B0AD997DA168639B2101CCF3C02437FD1F8DC2B2705A0613C7B920E85772D2B8427F954C514C33E36476F16BDA8A3121FBDA9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16984 |
Entropy (8bit): | 1.5659019637473253 |
Encrypted: | false |
SSDEEP: | 48:Iw9qGcpriGwpavG4pQ3GrapbS8GQpK1G7HpRFTGIpG:rIZKQh6LBSUAkTTA |
MD5: | 27FED712265BAF7DBBB8626DCCEF41E2 |
SHA1: | 6F8AAC346F3CC07ECC07026D62B9B06B015E735A |
SHA-256: | C8A7A2ECC4E2EC093F355A6C4A90936F16BE2DDF73F82AB60375CFBAC3F03208 |
SHA-512: | 37CCF964A4034FFFA101F89F5691BA76B3BF80F8E5F248221D8B3B9429E51D4CA578814CA989E2DAC4319A5AC49DC3695FBC8473585A34C17AA200E5884368A2 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 748 |
Entropy (8bit): | 7.249606135668305 |
Encrypted: | false |
SSDEEP: | 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE |
MD5: | C4F558C4C8B56858F15C09037CD6625A |
SHA1: | EE497CC061D6A7A59BB66DEFEA65F9A8145BA240 |
SHA-256: | 39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781 |
SHA-512: | D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/down.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4720 |
Entropy (8bit): | 5.164796203267696 |
Encrypted: | false |
SSDEEP: | 96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk |
MD5: | D65EC06F21C379C87040B83CC1ABAC6B |
SHA1: | 208D0A0BB775661758394BE7E4AFB18357E46C8B |
SHA-256: | A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F |
SHA-512: | 8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/errorPageStrings.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2168 |
Entropy (8bit): | 5.207912016937144 |
Encrypted: | false |
SSDEEP: | 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6 |
MD5: | F4FE1CB77E758E1BA56B8A8EC20417C5 |
SHA1: | F4EDA06901EDB98633A686B11D02F4925F827BF0 |
SHA-256: | 8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F |
SHA-512: | 62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/ErrorPageTemplate.css |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 447 |
Entropy (8bit): | 7.304718288205936 |
Encrypted: | false |
SSDEEP: | 12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R |
MD5: | 26F971D87CA00E23BD2D064524AEF838 |
SHA1: | 7440BEFF2F4F8FABC9315608A13BF26CABAD27D9 |
SHA-256: | 1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D |
SHA-512: | C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/bullet.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 453 |
Entropy (8bit): | 5.019973044227213 |
Encrypted: | false |
SSDEEP: | 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi |
MD5: | 20F0110ED5E4E0D5384A496E4880139B |
SHA1: | 51F5FC61D8BF19100DF0F8AADAA57FCD9C086255 |
SHA-256: | 1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B |
SHA-512: | 5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/background_gradient.jpg |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 12105 |
Entropy (8bit): | 5.451485481468043 |
Encrypted: | false |
SSDEEP: | 192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f |
MD5: | 9234071287E637F85D721463C488704C |
SHA1: | CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152 |
SHA-256: | 65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649 |
SHA-512: | 87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/httpErrorPagesScripts.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6495 |
Entropy (8bit): | 3.8998802417135856 |
Encrypted: | false |
SSDEEP: | 48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM |
MD5: | F65C729DC2D457B7A1093813F1253192 |
SHA1: | 5006C9B50108CF582BE308411B157574E5A893FC |
SHA-256: | B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F |
SHA-512: | 717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/http_404.htm |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4113 |
Entropy (8bit): | 7.9370830126943375 |
Encrypted: | false |
SSDEEP: | 96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL |
MD5: | 5565250FCC163AA3A79F0B746416CE69 |
SHA1: | B97CC66471FCDEE07D0EE36C7FB03F342C231F8F |
SHA-256: | 51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859 |
SHA-512: | E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/info_48.png |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25441 |
Entropy (8bit): | 0.2885111250006736 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA0:kBqoxxJhHWSVSEab0 |
MD5: | C2790107F0B8509FACD9199A5C1B1E7E |
SHA1: | 28465E8B1627FD603E1BCCE67FEFD0FA4EE8E998 |
SHA-256: | 22BEF87DE5AADA3071C0A6778451C7935E7C29162A30F974497C564EA46B963E |
SHA-512: | 5E89BC7279C7210F8C6D1781796150D9070FD58937C8C0D2D1D730EBCA38F6CCDC36E041A491B4D2FBB9590DBB3B71EC3B61175B0197CEE89A729BC4B2A89FA3 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13029 |
Entropy (8bit): | 0.4804693838507338 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lo20DF9lo20J9lW20Yx2GsH2GccbnGcryAHA2:kBqoI20S20M20Yx2GsH2GcOnGcmAHA2 |
MD5: | 6DE121E3241E0942E5BA0DDC7CD85EB6 |
SHA1: | 4227AE86C7FB2BE6CAB54301A088045871A8C7AD |
SHA-256: | D6F884EDD7241DAA865064E3C895789E2A5B092D64D43A05EF8A5EFD03253200 |
SHA-512: | 91231D2839189F12E6725FA904D5C5D742CA5C5ABC55C8702042176207E415EE4E43A011C7EF212A3051738D002E9981BE8993619065238D48BDE9CCCED62709 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34357 |
Entropy (8bit): | 0.34912511677180924 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwq9lwn69l2Od9l2Od9v:kBqoxKAuvScS+9DhAMIMsKhY |
MD5: | BE118EB85213FB3C959C8C325BAAEBE1 |
SHA1: | 2DAD5C9BB5F1D331B3BC179DBADA57228E695979 |
SHA-256: | E83F1A03A3F54CD3877E14D0E0D71BAC0D15020570B23E537E0F92E14A8AD723 |
SHA-512: | 8D466DEDC6D3AEFD1338B8DC10E3415FFC2C9FBA4059B2243BD81D518EB1BDFAF518DFAFF53C47B3D5A09E7914D70CF6170442CF06100027A5FAC04FC6577F95 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
No static file info |
---|
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
04/05/21-03:44:01.704073 | UDP | 2015813 | ET TROJAN DNS Query Sinkhole Domain Various Families (Possible Infected Host) | 63492 | 53 | 192.168.2.3 | 8.8.8.8 |
Network Port Distribution |
---|
- Total Packets: 26
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 5, 2021 03:44:01.825244904 CEST | 49712 | 80 | 192.168.2.3 | 87.106.18.122 |
Apr 5, 2021 03:44:01.825413942 CEST | 49713 | 80 | 192.168.2.3 | 87.106.18.122 |
Apr 5, 2021 03:44:01.867840052 CEST | 80 | 49712 | 87.106.18.122 | 192.168.2.3 |
Apr 5, 2021 03:44:01.867995024 CEST | 49712 | 80 | 192.168.2.3 | 87.106.18.122 |
Apr 5, 2021 03:44:01.868602037 CEST | 49712 | 80 | 192.168.2.3 | 87.106.18.122 |
Apr 5, 2021 03:44:01.869725943 CEST | 80 | 49713 | 87.106.18.122 | 192.168.2.3 |
Apr 5, 2021 03:44:01.869899035 CEST | 49713 | 80 | 192.168.2.3 | 87.106.18.122 |
Apr 5, 2021 03:44:01.910718918 CEST | 80 | 49712 | 87.106.18.122 | 192.168.2.3 |
Apr 5, 2021 03:44:01.911189079 CEST | 80 | 49712 | 87.106.18.122 | 192.168.2.3 |
Apr 5, 2021 03:44:01.911299944 CEST | 49712 | 80 | 192.168.2.3 | 87.106.18.122 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 5, 2021 03:43:54.049621105 CEST | 50620 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:43:54.104187012 CEST | 53 | 50620 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:43:56.082256079 CEST | 64938 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:43:56.140618086 CEST | 53 | 64938 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:43:57.036355019 CEST | 60152 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:43:57.082353115 CEST | 53 | 60152 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:43:57.817724943 CEST | 57544 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:43:57.873593092 CEST | 53 | 57544 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:43:58.879528999 CEST | 55984 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:43:58.928560019 CEST | 53 | 55984 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:43:59.685482025 CEST | 64185 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:43:59.733675003 CEST | 53 | 64185 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:00.654109955 CEST | 65110 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:00.710040092 CEST | 53 | 65110 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:00.881083012 CEST | 58361 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:00.928158045 CEST | 53 | 58361 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:01.704072952 CEST | 63492 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:01.808159113 CEST | 53 | 63492 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:02.325992107 CEST | 60831 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:02.383641005 CEST | 53 | 60831 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:03.268105984 CEST | 60100 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:03.323987961 CEST | 53 | 60100 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:06.999126911 CEST | 53195 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:07.050622940 CEST | 53 | 53195 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:08.258164883 CEST | 50141 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:08.309263945 CEST | 53 | 50141 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:10.786550045 CEST | 53023 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:10.835403919 CEST | 53 | 53023 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:11.621444941 CEST | 49563 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:11.678200960 CEST | 53 | 49563 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:13.096106052 CEST | 51352 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:13.154882908 CEST | 53 | 51352 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:14.039916039 CEST | 59349 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:14.085983992 CEST | 53 | 59349 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:17.584471941 CEST | 57084 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:17.630629063 CEST | 53 | 57084 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:19.839092016 CEST | 58823 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:19.888073921 CEST | 53 | 58823 | 8.8.8.8 | 192.168.2.3 |
Apr 5, 2021 03:44:20.760742903 CEST | 57568 | 53 | 192.168.2.3 | 8.8.8.8 |
Apr 5, 2021 03:44:20.806921959 CEST | 53 | 57568 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Apr 5, 2021 03:44:01.704072952 CEST | 192.168.2.3 | 8.8.8.8 | 0x2c7b | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Apr 5, 2021 03:44:01.808159113 CEST | 8.8.8.8 | 192.168.2.3 | 0x2c7b | No error (0) | 87.106.18.122 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49712 | 87.106.18.122 | 80 | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Apr 5, 2021 03:44:01.868602037 CEST | 1077 | OUT | |
Apr 5, 2021 03:44:01.911189079 CEST | 1078 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 03:44:00 |
Start date: | 05/04/2021 |
Path: | C:\Program Files\internet explorer\iexplore.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff628c90000 |
File size: | 823560 bytes |
MD5 hash: | 6465CB92B25A7BC1DF8E01D8AC5E7596 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 03:44:00 |
Start date: | 05/04/2021 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd00000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|