Analysis Report icom32.exe
Overview
General Information
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Startup |
---|
|
Malware Configuration |
---|
Threatname: Metasploit |
---|
{"Headers": "Accept-Encoding: binary\r\nHost: outlook.office.com\r\nUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MATM)\r\n", "Type": "Metasploit Download", "URL": "http://adsec.pro/ssl/verify.crl"}
Yara Overview |
---|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MetasploitPayload_3 | Yara detected Metasploit Payload | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Found malware configuration | Show sources |
Source: | Malware Configuration Extractor: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Networking: |
---|
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) | Show sources |
Source: | Snort IDS: | ||
Source: | Snort IDS: |
C2 URLs / IPs found in malware configuration | Show sources |
Source: | URLs: |
Contains functionality to check if Internet connection is working | Show sources |
Source: | Code function: | 0_2_00401010 |
Source: | ASN Name: |
Source: | Code function: | 0_2_00401010 |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_007000D7 | |
Source: | Code function: | 0_2_007000BA |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | Code function: | 0_2_004092B0 |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_004092B0 |
Source: | Code function: | 0_2_004097B0 |
Source: | Code function: | 0_2_00406600 |
Source: | Code function: | 0_2_00406CE0 |
Remote Access Functionality: |
---|
Yara detected Metasploit Payload | Show sources |
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Native API1 | Path Interception | Path Interception | Virtualization/Sandbox Evasion11 | Input Capture1 | System Time Discovery1 | Remote Services | Input Capture1 | Exfiltration Over Other Network Medium | Encrypted Channel12 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Security Software Discovery1 | Remote Desktop Protocol | Archive Collected Data1 | Exfiltration Over Bluetooth | Non-Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Virtualization/Sandbox Evasion11 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol12 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Information Discovery2 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Ingress Tool Transfer1 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Remote System Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | System Network Connections Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
57% | Virustotal | Browse | ||
30% | Metadefender | Browse | ||
76% | ReversingLabs | Win32.Trojan.Tiny |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
adsec.pro | 163.172.159.210 | true | true | unknown |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
163.172.159.210 | adsec.pro | United Kingdom | 12876 | OnlineSASFR | true |
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 399805 |
Start date: | 29.04.2021 |
Start time: | 09:43:59 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 3m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | icom32.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal80.troj.winEXE@1/0@1/1 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
No simulations |
---|
Joe Sandbox View / Context |
---|
IPs |
---|
No context |
---|
Domains |
---|
No context |
---|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
OnlineSASFR | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 5.858901157309694 |
TrID: |
|
File name: | icom32.exe |
File size: | 62464 |
MD5: | d1f66d78808b8cbd18804812f1a457a5 |
SHA1: | c99ee5407d446e9c0647e7749f307762d25e0143 |
SHA256: | 7793c2fd34248236e83206fdd01b547436e966bcb6cae21adcbf61550b62daea |
SHA512: | f0eaa9dffc896828dbaa9cca42d6993a5778eb30997804e35ee68ac41ff01218b668c2997456032930bc68fe9565bb3feefa7115de4be7ac7887bdb93cf343a5 |
SSDEEP: | 768:1TrDPve1+1sx5RLyu4mc1MZg1skv2PWvXdMW6:13DPv2+1sx5Rv7+ekvRk |
File Content Preview: | MZ......................@...............................................!..L.!This is a Windows NT windowed executable..$.......PE..L...F$R`............................hY............@..........................0....................... ..................... |
File Icon |
---|
Icon Hash: | 93132d27232587c1 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x405968 |
Entrypoint Section: | AUTO |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE |
DLL Characteristics: | |
Time Stamp: | 0x60522446 [Wed Mar 17 15:46:14 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 1 |
OS Version Minor: | 11 |
File Version Major: | 1 |
File Version Minor: | 11 |
Subsystem Version Major: | 1 |
Subsystem Version Minor: | 11 |
Import Hash: | 3909bf4a070f081062accde80126238a |
Entrypoint Preview |
---|
Instruction |
---|
jmp 00007FBBEC588678h |
add edx, dword ptr [eax] |
inc eax |
add byte ptr [edi+70h], cl |
outsb |
and byte ptr [edi+61h], dl |
je 00007FBBEC586CF5h |
outsd |
insd |
and byte ptr [ebx+2Fh], al |
inc ebx |
sub ebp, dword ptr [ebx] |
xor esi, dword ptr [edx] |
and byte ptr [edx+75h], dl |
outsb |
sub eax, 656D6954h |
and byte ptr [ebx+79h], dh |
jnc 00007FBBEC586D06h |
insd |
and byte ptr [eax+6Fh], dl |
jc 00007FBBEC586D06h |
imul ebp, dword ptr [edi+6Eh], 6F432073h |
jo 00007FBBEC586D0Bh |
jc 00007FBBEC586CFBh |
push 43282074h |
sub dword ptr [eax], esp |
push ebx |
jns 00007FBBEC586CF4h |
popad |
jnc 00007FBBEC586CF7h |
sub al, 20h |
dec ecx |
outsb |
arpl word ptr [esi], bp |
and byte ptr [ecx], dh |
cmp dword ptr [eax], edi |
cmp byte ptr [32303032h], ch |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
ret |
ret |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
push ecx |
mov ecx, eax |
mov eax, edx |
mov edx, dword ptr [ecx] |
call 00007FBBEC588A59h |
inc dword ptr [ecx+10h] |
pop ecx |
ret |
lea eax, dword ptr [eax+00000000h] |
lea edx, dword ptr [edx+00000000h] |
lea eax, dword ptr [eax+00h] |
push ecx |
push esi |
push edi |
push ebp |
mov esi, eax |
mov eax, dword ptr [eax+10h] |
call dword ptr [0040F518h] |
mov eax, dword ptr [esi+08h] |
mov ecx, dword ptr [eax+0Ch] |
cmp ecx, 01h |
je 00007FBBEC586CA1h |
test ecx, ecx |
jne 00007FBBEC586D17h |
mov dword ptr [eax+0Ch], 00000001h |
mov ebp, dword ptr [esi+0Ch] |
mov eax, dword ptr [esi+08h] |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xe000 | 0x553 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x12000 | 0x800 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x11000 | 0x700 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
AUTO | 0x1000 | 0xcfa6 | 0xd000 | False | 0.439584585337 | data | 5.85502460574 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.idata | 0xe000 | 0x553 | 0x600 | False | 0.432942708333 | data | 4.54022455633 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
DGROUP | 0xf000 | 0x1780 | 0xa00 | False | 0.397265625 | PDP-11 UNIX/RT ldp | 3.81458751198 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.reloc | 0x11000 | 0x0 | 0x800 | False | 0.779296875 | data | 6.21951327485 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x12000 | 0x0 | 0x800 | False | 0.31005859375 | data | 3.23020644226 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x120fc | 0x2e8 | data | ||
RT_GROUP_ICON | 0x123e4 | 0x14 | data | ||
RT_VERSION | 0x123f8 | 0x2e8 | data |
Imports |
---|
DLL | Import |
---|---|
KERNEL32.DLL | CloseHandle, CreateEventA, CreateFileA, ExitProcess, FlushFileBuffers, FreeEnvironmentStringsA, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetCurrentThreadId, GetEnvironmentStringsA, GetFileType, GetLastError, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetOEMCP, GetProcAddress, GetStdHandle, GetTimeZoneInformation, GetVersion, LoadLibraryA, MultiByteToWideChar, SetConsoleCtrlHandler, SetEnvironmentVariableA, SetEnvironmentVariableW, SetFilePointer, SetStdHandle, SetUnhandledExceptionFilter, Sleep, UnhandledExceptionFilter, VirtualAlloc, VirtualFree, VirtualQuery, WideCharToMultiByte, WriteFile |
USER32.DLL | CharUpperA, MessageBoxA |
WS2_32.DLL | WSACleanup, WSAGetLastError, WSAStartup, closesocket, connect, gethostbyname, htons, recv, send, socket |
Version Infos |
---|
Description | Data |
---|---|
LegalCopyright | Portions Copyright 2002 Sybase, Inc. |
InternalName | ff_dd |
FileVersion | 1.90 |
CompanyName | openwatcom.org |
ProductName | Open Watcom |
ProductVersion | 1.90 |
FileDescription | Open Watcom Dialog Editor |
OriginalFilename | ff_dd.exe |
Translation | 0x0409 0x04b0 |
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
04/29/21-09:39:47.568436 | TCP | 2032785 | ET TROJAN Cobalt Strike Stager Time Check M2 | 49710 | 80 | 192.168.2.3 | 172.217.20.14 |
04/29/21-09:39:47.906566 | TCP | 2032785 | ET TROJAN Cobalt Strike Stager Time Check M2 | 49711 | 80 | 192.168.2.3 | 172.217.20.14 |
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 29, 2021 09:45:17.506817102 CEST | 49751 | 443 | 192.168.2.4 | 163.172.159.210 |
Apr 29, 2021 09:45:17.561675072 CEST | 443 | 49751 | 163.172.159.210 | 192.168.2.4 |
Apr 29, 2021 09:45:17.562963009 CEST | 49751 | 443 | 192.168.2.4 | 163.172.159.210 |
Apr 29, 2021 09:45:17.602128983 CEST | 49751 | 443 | 192.168.2.4 | 163.172.159.210 |
Apr 29, 2021 09:45:17.657506943 CEST | 443 | 49751 | 163.172.159.210 | 192.168.2.4 |
Apr 29, 2021 09:45:49.966147900 CEST | 49751 | 443 | 192.168.2.4 | 163.172.159.210 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 29, 2021 09:44:39.849407911 CEST | 58028 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:39.898358107 CEST | 53 | 58028 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:40.127150059 CEST | 53097 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:40.175745010 CEST | 53 | 53097 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:40.238815069 CEST | 49257 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:40.287410021 CEST | 53 | 49257 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:40.463089943 CEST | 62389 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:40.511663914 CEST | 53 | 62389 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:42.284430981 CEST | 49910 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:42.336164951 CEST | 53 | 49910 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:43.230581999 CEST | 55854 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:43.282201052 CEST | 53 | 55854 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:44.722270012 CEST | 64549 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:44.771003008 CEST | 53 | 64549 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:46.606694937 CEST | 63153 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:46.671905994 CEST | 53 | 63153 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:46.782677889 CEST | 52991 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:46.834234953 CEST | 53 | 52991 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:44:48.069870949 CEST | 53700 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:44:48.120404959 CEST | 53 | 53700 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:05.267213106 CEST | 51726 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:05.318824053 CEST | 53 | 51726 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:06.322359085 CEST | 56794 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:06.371273041 CEST | 53 | 56794 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:07.260894060 CEST | 56534 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:07.309762001 CEST | 53 | 56534 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:08.172406912 CEST | 56627 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:08.224104881 CEST | 53 | 56627 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:09.299187899 CEST | 56621 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:09.347901106 CEST | 53 | 56621 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:09.953521967 CEST | 63116 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:10.002288103 CEST | 53 | 63116 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:10.229990959 CEST | 64078 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:10.278759956 CEST | 53 | 64078 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:11.293641090 CEST | 64801 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:11.345155001 CEST | 53 | 64801 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:12.270354033 CEST | 61721 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:12.319127083 CEST | 53 | 61721 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:13.210309029 CEST | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:13.262125969 CEST | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:14.089761019 CEST | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:14.157269955 CEST | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:16.664444923 CEST | 52337 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:16.713857889 CEST | 53 | 52337 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:16.874193907 CEST | 55046 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:16.936476946 CEST | 53 | 55046 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:17.269332886 CEST | 49612 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:17.487935066 CEST | 53 | 49612 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:21.577204943 CEST | 49285 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:21.629272938 CEST | 53 | 49285 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:22.661989927 CEST | 50601 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:22.713489056 CEST | 53 | 50601 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:27.527753115 CEST | 60875 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:27.653892994 CEST | 53 | 60875 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:28.183489084 CEST | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:28.302719116 CEST | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:28.829015017 CEST | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:28.886357069 CEST | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:29.120815039 CEST | 62420 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:29.200084925 CEST | 53 | 62420 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:29.292609930 CEST | 60579 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:29.341743946 CEST | 53 | 60579 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:29.909874916 CEST | 50183 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:29.970298052 CEST | 53 | 50183 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:30.488544941 CEST | 61531 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:30.545706034 CEST | 53 | 61531 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:30.965362072 CEST | 49228 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:31.027667046 CEST | 53 | 49228 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:31.757571936 CEST | 59794 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:31.806217909 CEST | 53 | 59794 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:32.605614901 CEST | 55916 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:32.667706013 CEST | 53 | 55916 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:33.159276009 CEST | 52752 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:33.216245890 CEST | 53 | 52752 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:34.498581886 CEST | 60542 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:34.549938917 CEST | 53 | 60542 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:35.695833921 CEST | 60689 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:35.760629892 CEST | 53 | 60689 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:45.860032082 CEST | 64206 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:45.911448956 CEST | 53 | 64206 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:46.114226103 CEST | 50904 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:46.184962988 CEST | 53 | 50904 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:45:48.779553890 CEST | 57525 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:45:48.838181019 CEST | 53 | 57525 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:46:20.465852976 CEST | 53814 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:46:20.515151978 CEST | 53 | 53814 | 8.8.8.8 | 192.168.2.4 |
Apr 29, 2021 09:46:22.035170078 CEST | 53418 | 53 | 192.168.2.4 | 8.8.8.8 |
Apr 29, 2021 09:46:22.092725992 CEST | 53 | 53418 | 8.8.8.8 | 192.168.2.4 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Apr 29, 2021 09:45:17.269332886 CEST | 192.168.2.4 | 8.8.8.8 | 0x63fc | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Apr 29, 2021 09:45:17.487935066 CEST | 8.8.8.8 | 192.168.2.4 | 0x63fc | No error (0) | 163.172.159.210 | A (IP address) | IN (0x0001) |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
System Behavior |
---|
General |
---|
Start time: | 09:44:45 |
Start date: | 29/04/2021 |
Path: | C:\Users\user\Desktop\icom32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 62464 bytes |
MD5 hash: | D1F66D78808B8CBD18804812F1A457A5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|
Execution Graph |
---|
Execution Coverage: | 6.6% |
Dynamic/Decrypted Code Coverage: | 1.8% |
Signature Coverage: | 9.6% |
Total number of Nodes: | 561 |
Total number of Limit Nodes: | 6 |
Graph
Executed Functions |
---|
Function 00401010, Relevance: 40.5, APIs: 12, Strings: 11, Instructions: 231networkCOMMON
Control-flow Graph |
---|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 007000D7, Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 296networkCOMMON
Control-flow Graph |
---|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 007000BA, Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 203networkCOMMON
Control-flow Graph |
---|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406600, Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 123timeCOMMON
Control-flow Graph |
---|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004097B0, Relevance: 3.0, APIs: 2, Instructions: 14COMMON
Control-flow Graph |
---|
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004013E0, Relevance: 2.6, APIs: 2, Instructions: 60sleepCOMMON
Control-flow Graph |
---|
C-Code - Quality: 88% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040A660, Relevance: 1.5, APIs: 1, Instructions: 17COMMON
Control-flow Graph |
---|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0070008F, Relevance: 1.5, APIs: 1, Instructions: 7libraryCOMMON
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004072A0, Relevance: 1.3, APIs: 1, Instructions: 51memoryCOMMON
Control-flow Graph |
---|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Function 004092B0, Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 30libraryloaderCOMMON
C-Code - Quality: 100% |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00409360, Relevance: 80.8, APIs: 8, Strings: 38, Instructions: 291fileCOMMON
Control-flow Graph |
---|
C-Code - Quality: 96% |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040AA60, Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 37fileCOMMON
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040A500, Relevance: 6.1, APIs: 4, Instructions: 79fileCOMMON
C-Code - Quality: 61% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040A45E, Relevance: 6.1, APIs: 4, Instructions: 75COMMON
C-Code - Quality: 41% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00409FB0, Relevance: 6.0, APIs: 4, Instructions: 35fileCOMMON
C-Code - Quality: 75% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004013B0, Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 23windowCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |