Windows Analysis Report
Overview
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
Data Obfuscation: |
---|
Sigma detected: Mshta Download Pastebin |
Source: | Author: Joe Security: |
Jbx Signature Overview |
---|
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | HTTPS traffic detected: |
Networking: |
---|
Connects to a pastebin service (likely for C&C) |
Source: | DNS query: |
Source: | HTTP traffic detected: |
Source: | JA3 fingerprint: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Window detected: |
Data Obfuscation: |
---|
Source: | Code function: | 2_2_06D6E21B | |
Source: | Code function: | 2_2_06D6F784 |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection12 | Masquerading1 | OS Credential Dumping | Query Registry1 | Remote Services | Email Collection1 | Exfiltration Over Other Network Medium | Web Service1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection12 | LSASS Memory | Process Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Encrypted Channel2 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information1 | Security Account Manager | System Information Discovery12 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Non-Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | Remote System Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol13 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Ingress Tool Transfer1 | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
pastebin.com | 104.23.98.190 | true | false | high | |
clientconfig.passport.net | unknown | unknown | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.23.98.190 | pastebin.com | United States | 13335 | CLOUDFLARENETUS | false |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 470697 |
Start date: | 24.08.2021 |
Start time: | 15:19:11 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowscmdlinecookbook.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 27 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal52.troj.evad.win@4/1@2/1 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
104.23.98.190 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
pastebin.com | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
No context |
---|
Process: | C:\Windows\SysWOW64\mshta.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5 |
Entropy (8bit): | 1.5219280948873621 |
Encrypted: | false |
SSDEEP: | 3:hn:h |
MD5: | FDA44910DEB1A460BE4AC5D56D61D837 |
SHA1: | F6D0C643351580307B2EAA6A7560E76965496BC7 |
SHA-256: | 933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9 |
SHA-512: | 57DDA9AA7C29F960CD7948A4E4567844D3289FA729E9E388E7F4EDCBDF16BF6A94536598B4F9FF8942849F1F96BD3C00BC24A75E748A36FBF2A145F63BF904C1 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Static File Info |
---|
No static file info |
---|
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 30
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 24, 2021 15:20:06.332938910 CEST | 49706 | 80 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.349116087 CEST | 80 | 49706 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.349206924 CEST | 49706 | 80 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.349721909 CEST | 49706 | 80 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.365735054 CEST | 80 | 49706 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.374855042 CEST | 80 | 49706 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.374970913 CEST | 49706 | 80 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.382392883 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.398643970 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.398750067 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.421760082 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.439296961 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.443039894 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.443064928 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.443106890 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.443141937 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.504663944 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.521048069 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.521667957 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.521730900 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.534980059 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:20:06.551239967 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.794533014 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.794558048 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:20:06.794694901 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:21:56.019054890 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:21:56.019391060 CEST | 49706 | 80 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:21:56.035758018 CEST | 80 | 49706 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:21:56.035800934 CEST | 443 | 49707 | 104.23.98.190 | 192.168.2.3 |
Aug 24, 2021 15:21:56.035924911 CEST | 49706 | 80 | 192.168.2.3 | 104.23.98.190 |
Aug 24, 2021 15:21:56.035979033 CEST | 49707 | 443 | 192.168.2.3 | 104.23.98.190 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 24, 2021 15:19:57.599718094 CEST | 58643 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:19:57.635255098 CEST | 53 | 58643 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:19:58.993309975 CEST | 60985 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:19:59.034188986 CEST | 53 | 60985 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:19:59.059933901 CEST | 50200 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:19:59.096115112 CEST | 53 | 50200 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:20:01.370290995 CEST | 51281 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:20:01.404117107 CEST | 53 | 51281 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:20:06.280817986 CEST | 49199 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:20:06.318922997 CEST | 53 | 49199 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:20:29.097012043 CEST | 50620 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:20:29.137916088 CEST | 53 | 50620 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:20:32.789983988 CEST | 64938 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:20:32.825045109 CEST | 53 | 64938 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:20:50.564847946 CEST | 60152 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:20:50.611614943 CEST | 53 | 60152 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:20:53.179208994 CEST | 57544 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:20:53.223295927 CEST | 53 | 57544 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:21:07.340607882 CEST | 55984 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:21:07.376796007 CEST | 53 | 55984 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:21:10.140362978 CEST | 64185 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:21:10.177571058 CEST | 53 | 64185 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:21:44.867356062 CEST | 65110 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:21:44.899879932 CEST | 53 | 65110 | 8.8.8.8 | 192.168.2.3 |
Aug 24, 2021 15:21:47.522078037 CEST | 58361 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 24, 2021 15:21:47.558231115 CEST | 53 | 58361 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Aug 24, 2021 15:19:57.599718094 CEST | 192.168.2.3 | 8.8.8.8 | 0xe584 | Standard query (0) | A (IP address) | IN (0x0001) | |
Aug 24, 2021 15:20:06.280817986 CEST | 192.168.2.3 | 8.8.8.8 | 0x9d6f | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Aug 24, 2021 15:19:57.635255098 CEST | 8.8.8.8 | 192.168.2.3 | 0xe584 | No error (0) | authgfx.msa.akadns6.net | CNAME (Canonical name) | IN (0x0001) | ||
Aug 24, 2021 15:20:06.318922997 CEST | 8.8.8.8 | 192.168.2.3 | 0x9d6f | No error (0) | 104.23.98.190 | A (IP address) | IN (0x0001) | ||
Aug 24, 2021 15:20:06.318922997 CEST | 8.8.8.8 | 192.168.2.3 | 0x9d6f | No error (0) | 104.23.99.190 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49706 | 104.23.98.190 | 80 | C:\Windows\SysWOW64\mshta.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 24, 2021 15:20:06.349721909 CEST | 1084 | OUT | |
Aug 24, 2021 15:20:06.374855042 CEST | 1130 | IN |
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
Aug 24, 2021 15:20:06.443064928 CEST | 104.23.98.190 | 443 | 192.168.2.3 | 49707 | CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US | CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE | Sat Jul 17 02:00:00 CEST 2021 Mon Jan 27 13:48:08 CET 2020 | Sun Jul 17 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2025 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,0 | 37f463bf4616ecd445d4a1937da06e19 |
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US | CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE | Mon Jan 27 13:48:08 CET 2020 | Wed Jan 01 00:59:59 CET 2025 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 15:20:03 |
Start date: | 24/08/2021 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbd0000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:20:03 |
Start date: | 24/08/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b2800000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 15:20:04 |
Start date: | 24/08/2021 |
Path: | C:\Windows\SysWOW64\mshta.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe70000 |
File size: | 13312 bytes |
MD5 hash: | 7083239CE743FDB68DFC933B7308E80A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|