Play interactive tourEdit tour

Analysis Report https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5

Overview

General Information

Sample URL:https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5
Analysis ID:403290
Infos:

Most interesting Screenshot:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 4908 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5' > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 3360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 4864 cmdline: wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5' MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 74.125.34.46:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: unknownDNS traffic detected: queries for: www.virustotal.com
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt0
Source: wget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpString found in binary or memory: http://cdp.rapidssl.com/RapidSSLRSACA2018.crl
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://cdp.rapidssl.com/RapidSSLRSACA2018.crl0L
Source: wget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpString found in binary or memory: http://cdp.rapidssl.com/RapidSSLRSACA2018.crlV
Source: wget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl
Source: wget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crlM?~P
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0c
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl9
Source: wget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0B
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: http://status.rapidssl.com0=
Source: wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: wget.exe, 00000002.00000002.203175425.00000000012D6000.00000004.00000040.sdmp, cmdline.out.2.drString found in binary or memory: https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 74.125.34.46:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: classification engineClassification label: clean0.win@4/1@1/1
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3360:120:WilError_01
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5' > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5' Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingSystem Information Discovery2Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryRemote System Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 403290 URL: https://www.virustotal.com/... Startdate: 04/05/2021 Architecture: WINDOWS Score: 0 5 cmd.exe 2 2->5         started        process3 7 wget.exe 1 5->7         started        10 conhost.exe 5->10         started        dnsIp4 12 ghs-svc-https-c46.ghs-ssl.googlehosted.com 74.125.34.46, 443, 49708 GOOGLEUS United States 7->12 14 www.virustotal.com 7->14

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d50%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://status.rapidssl.com0=0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
ghs-svc-https-c46.ghs-ssl.googlehosted.com
74.125.34.46
truefalse
    unknown
    www.virustotal.com
    unknown
    unknownfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://cdp.rapidssl.com/RapidSSLRSACA2018.crlwget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpfalse
        high
        http://status.rapidssl.com0=wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        low
        https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3wget.exe, 00000002.00000002.203175425.00000000012D6000.00000004.00000040.sdmp, cmdline.out.2.drfalse
          high
          http://cdp.rapidssl.com/RapidSSLRSACA2018.crl0Lwget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpfalse
            high
            http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt0wget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpfalse
              high
              http://cacerts.rapidssl.com/RapidSSLRSACA2018.crtwget.exe, 00000002.00000003.202851772.0000000002C79000.00000004.00000001.sdmpfalse
                high
                http://cdp.rapidssl.com/RapidSSLRSACA2018.crlVwget.exe, 00000002.00000003.202914680.0000000002C39000.00000004.00000001.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  74.125.34.46
                  ghs-svc-https-c46.ghs-ssl.googlehosted.comUnited States
                  15169GOOGLEUSfalse

                  General Information

                  Joe Sandbox Version:32.0.0 Black Diamond
                  Analysis ID:403290
                  Start date:04.05.2021
                  Start time:01:21:03
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 1m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:urldownload.jbs
                  Sample URL:https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:CLEAN
                  Classification:clean0.win@4/1@1/1
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Unable to download file
                  Warnings:
                  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 20.82.209.183, 204.79.197.200, 13.107.21.200, 93.184.220.29, 92.122.145.220, 104.43.193.48, 104.43.139.144
                  • Excluded domains from analysis (whitelisted): www.bing.com, skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, cs9.wac.phicdn.net, dual-a-0001.a-msedge.net, store-images.s-microsoft.com-c.edgekey.net, skypedataprdcolcus16.cloudapp.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, e12564.dspb.akamaiedge.net, a-0001.a-afdentry.net.trafficmanager.net, ocsp.digicert.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  C:\Users\user\Desktop\cmdline.out
                  Process:C:\Windows\SysWOW64\wget.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):659
                  Entropy (8bit):5.273512253479094
                  Encrypted:false
                  SSDEEP:12:HZjGZI9kTxmBgdOvEW28FBsDzOMSEs5SETT1De5RheL8JjG6iBK7NmBgdOvEW28M:+ggdfSBs2dEsUEPxePEolE8NggdfSBst
                  MD5:559CADB86B8BD6F83A015C5568D558AB
                  SHA1:E0FB7DA5AF5B169AB4FE3245F8BE8FC20C43C778
                  SHA-256:C08F793D4982937F3888A22386862DBB74218408871CB2E335AEF9FDB1F79540
                  SHA-512:87768D9DDD524FBF5EDBDA4F46CD5966FE4FB882D87DB7706CDD29A632BB9D58009A25D3A45AF40F7512E21835E98C6812BD8923AC108F9F6EEAEDA91C37E9F5
                  Malicious:false
                  Reputation:low
                  Preview: --2021-05-04 01:21:51-- https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5..Resolving www.virustotal.com (www.virustotal.com)... 74.125.34.46..Connecting to www.virustotal.com (www.virustotal.com)|74.125.34.46|:443... connected...HTTP request sent, awaiting response... 204 No Content..2021-05-04 01:21:51 (0.00 B/s) - 'C:/Users/user/Desktop/download/download@apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5' saved [0]....

                  Static File Info

                  No static file info

                  Network Behavior

                  Download Network PCAP: filteredfull

                  Network Port Distribution

                  • Total Packets: 24
                  • 443 (HTTPS)
                  • 53 (DNS)
                  TimestampSource PortDest PortSource IPDest IP
                  May 4, 2021 01:21:51.652892113 CEST49708443192.168.2.374.125.34.46
                  May 4, 2021 01:21:51.717448950 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:51.717541933 CEST49708443192.168.2.374.125.34.46
                  May 4, 2021 01:21:51.721509933 CEST49708443192.168.2.374.125.34.46
                  May 4, 2021 01:21:51.786699057 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:51.787863970 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:51.787909031 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:51.787939072 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:51.788038969 CEST49708443192.168.2.374.125.34.46
                  May 4, 2021 01:21:51.791861057 CEST49708443192.168.2.374.125.34.46
                  May 4, 2021 01:21:51.857202053 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:51.860887051 CEST49708443192.168.2.374.125.34.46
                  May 4, 2021 01:21:51.931353092 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:52.046283007 CEST4434970874.125.34.46192.168.2.3
                  May 4, 2021 01:21:52.093894958 CEST49708443192.168.2.374.125.34.46
                  May 4, 2021 01:21:52.412627935 CEST49708443192.168.2.374.125.34.46
                  TimestampSource PortDest PortSource IPDest IP
                  May 4, 2021 01:21:43.411420107 CEST6098553192.168.2.38.8.8.8
                  May 4, 2021 01:21:43.474158049 CEST53609858.8.8.8192.168.2.3
                  May 4, 2021 01:21:43.952603102 CEST5020053192.168.2.38.8.8.8
                  May 4, 2021 01:21:43.985683918 CEST5128153192.168.2.38.8.8.8
                  May 4, 2021 01:21:44.002233982 CEST53502008.8.8.8192.168.2.3
                  May 4, 2021 01:21:44.044445038 CEST53512818.8.8.8192.168.2.3
                  May 4, 2021 01:21:44.173460960 CEST4919953192.168.2.38.8.8.8
                  May 4, 2021 01:21:44.224689960 CEST53491998.8.8.8192.168.2.3
                  May 4, 2021 01:21:44.583843946 CEST5062053192.168.2.38.8.8.8
                  May 4, 2021 01:21:44.636137962 CEST53506208.8.8.8192.168.2.3
                  May 4, 2021 01:21:45.658260107 CEST6493853192.168.2.38.8.8.8
                  May 4, 2021 01:21:45.711148977 CEST53649388.8.8.8192.168.2.3
                  May 4, 2021 01:21:46.442677975 CEST6015253192.168.2.38.8.8.8
                  May 4, 2021 01:21:46.502993107 CEST53601528.8.8.8192.168.2.3
                  May 4, 2021 01:21:46.913229942 CEST5754453192.168.2.38.8.8.8
                  May 4, 2021 01:21:46.965992928 CEST53575448.8.8.8192.168.2.3
                  May 4, 2021 01:21:47.899871111 CEST5598453192.168.2.38.8.8.8
                  May 4, 2021 01:21:47.951819897 CEST53559848.8.8.8192.168.2.3
                  May 4, 2021 01:21:49.307832956 CEST6418553192.168.2.38.8.8.8
                  May 4, 2021 01:21:49.365091085 CEST53641858.8.8.8192.168.2.3
                  May 4, 2021 01:21:51.298907042 CEST6511053192.168.2.38.8.8.8
                  May 4, 2021 01:21:51.349848986 CEST53651108.8.8.8192.168.2.3
                  May 4, 2021 01:21:51.579921961 CEST5836153192.168.2.38.8.8.8
                  May 4, 2021 01:21:51.646532059 CEST53583618.8.8.8192.168.2.3
                  May 4, 2021 01:21:52.309874058 CEST6349253192.168.2.38.8.8.8
                  May 4, 2021 01:21:52.361375093 CEST53634928.8.8.8192.168.2.3
                  May 4, 2021 01:21:53.186487913 CEST6083153192.168.2.38.8.8.8
                  May 4, 2021 01:21:53.235126019 CEST53608318.8.8.8192.168.2.3
                  May 4, 2021 01:21:54.646931887 CEST6010053192.168.2.38.8.8.8
                  May 4, 2021 01:21:54.698494911 CEST53601008.8.8.8192.168.2.3
                  May 4, 2021 01:21:55.669594049 CEST5319553192.168.2.38.8.8.8
                  May 4, 2021 01:21:55.721616983 CEST53531958.8.8.8192.168.2.3
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  May 4, 2021 01:21:51.579921961 CEST192.168.2.38.8.8.80x2713Standard query (0)www.virustotal.comA (IP address)IN (0x0001)
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  May 4, 2021 01:21:51.646532059 CEST8.8.8.8192.168.2.30x2713No error (0)www.virustotal.comghs-svc-https-c46.ghs-ssl.googlehosted.comCNAME (Canonical name)IN (0x0001)
                  May 4, 2021 01:21:51.646532059 CEST8.8.8.8192.168.2.30x2713No error (0)ghs-svc-https-c46.ghs-ssl.googlehosted.com74.125.34.46A (IP address)IN (0x0001)
                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                  May 4, 2021 01:21:51.787939072 CEST74.125.34.46443192.168.2.349708CN=*.virustotal.com CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=USCN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=USWed Jan 22 01:00:00 CET 2020 Mon Nov 06 13:23:33 CET 2017Wed Feb 02 13:00:00 CET 2022 Sat Nov 06 13:23:33 CET 2027771,49196-49200-159-52393-52392-52394-49195-49199-158-49188-49192-107-49187-49191-103-49162-49172-57-49161-49171-51-157-156-61-60-53-47-255,0-11-10-35-22-23-13,29-23-25-24,0-1-2807fca46d9d0cf63adf4e5e80e414bbe
                  CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=USMon Nov 06 13:23:33 CET 2017Sat Nov 06 13:23:33 CET 2027

                  Code Manipulations

                  Statistics

                  CPU Usage

                  0246810s020406080100

                  Click to jump to process

                  Memory Usage

                  Click to jump to process

                  High Level Behavior Distribution

                  • File
                  • Network

                  Click to dive into process behavior distribution

                  Behavior

                  Click to jump to process

                  System Behavior

                  Start time:01:21:49
                  Start date:04/05/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5' > cmdline.out 2>&1
                  Imagebase:0xbd0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Start time:01:21:50
                  Start date:04/05/2021
                  Path:C:\Windows\SysWOW64\wget.exe
                  Wow64 process (32bit):true
                  Commandline:wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://www.virustotal.com/vtapi/v2/file/download?apikey=bc2c21d3811ca7c91a0ecaf91d44485a8114658f3f3cd61aff614cc17559b41b&hash=66c057a0f4d4df62ac4407c33141d7d6e5983668ae8b374bd24f60def9dc05d5'
                  Imagebase:0x400000
                  File size:3895184 bytes
                  MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Disassembly

                  Code Analysis