Windows
Analysis Report
Doc.exe
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Doc.exe (PID: 7440 cmdline:
"C:\Users\ user\Deskt op\Doc.exe " MD5: 2746A7120BCE30E9230A2E71A9AD909F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Sliver | According to VK9 Seecurity, Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
| |
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00A77120 | |
Source: | Code function: | 0_2_00A77EC0 |
Source: | TCP traffic: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Binary or memory string: | memstr_5efe563f-6 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00A560A0 | |
Source: | Code function: | 0_2_00A968C0 | |
Source: | Code function: | 0_2_00A94000 | |
Source: | Code function: | 0_2_00A56980 | |
Source: | Code function: | 0_2_00A74980 | |
Source: | Code function: | 0_2_00A5D120 | |
Source: | Code function: | 0_2_00A79120 | |
Source: | Code function: | 0_2_00A77120 | |
Source: | Code function: | 0_2_00A98100 | |
Source: | Code function: | 0_2_00A96AA0 | |
Source: | Code function: | 0_2_00A6E260 | |
Source: | Code function: | 0_2_00A5BBA0 | |
Source: | Code function: | 0_2_00A833C0 | |
Source: | Code function: | 0_2_00A64B40 | |
Source: | Code function: | 0_2_00A6BCA0 | |
Source: | Code function: | 0_2_00A73CC0 | |
Source: | Code function: | 0_2_00A775A0 | |
Source: | Code function: | 0_2_00A6F520 | |
Source: | Code function: | 0_2_00A5C560 | |
Source: | Code function: | 0_2_00A80560 | |
Source: | Code function: | 0_2_00A77EC0 | |
Source: | Code function: | 0_2_00A63E60 | |
Source: | Code function: | 0_2_00A56E40 | |
Source: | Code function: | 0_2_00A68F80 | |
Source: | Code function: | 0_2_00A85FE0 | |
Source: | Code function: | 0_2_00A59740 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Code function: | 0_2_00AAB800 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Code function: | 0_2_00AAB800 |
Source: | Code function: | 0_2_00AAB800 |
Source: | Queries volume information: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | 11 Input Capture | 11 Security Software Discovery | Remote Services | 11 Input Capture | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 11 System Information Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | ReversingLabs | Win64.Trojan.SliverMarte | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sam.mr | 128.65.199.135 | true | false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
128.65.199.135 | sam.mr | Switzerland | 29222 | INFOMANIAK-ASCH | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1523125 |
Start date and time: | 2024-10-01 06:38:06 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Doc.exe |
Detection: | MAL |
Classification: | mal76.troj.evad.winEXE@1/1@1/1 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Doc.exe, PID 7440 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
INFOMANIAK-ASCH | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | SystemBC | Browse |
| ||
Get hash | malicious | PureLog Stealer, SystemBC | Browse |
| ||
Get hash | malicious | PureLog Stealer, SystemBC | Browse |
|
Process: | C:\Users\user\Desktop\Doc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 160 |
Entropy (8bit): | 4.438743916256937 |
Encrypted: | false |
SSDEEP: | 3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty |
MD5: | E467C82627F5E1524FDB4415AF19FC73 |
SHA1: | B86E3AA40E9FBED0494375A702EABAF1F2E56F8E |
SHA-256: | 116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540 |
SHA-512: | 2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.12525593465114 |
TrID: |
|
File name: | Doc.exe |
File size: | 15'875'584 bytes |
MD5: | 2746a7120bce30e9230a2e71a9ad909f |
SHA1: | 506c97a2e62a2c962dbd283b2344e73cac4f8271 |
SHA256: | 4480d314657f84b2f829fb85fe6603c288bd9262e00e752e475c2a315dd2013f |
SHA512: | 0552f8a0bc9af0b03ab4a0d1b1afc08038aa0fce2b563daf865020414cc5a8c985a55589d8f2af891dd5b302f423bbe05fbfc6889171f74e33728b6b4027fc04 |
SSDEEP: | 98304:43pEB59UU/DVSk8V57vYJDysmvezaIaFiP5wvEx5S/8/yKTqEc:gpEBIIV2YJOsmvaaIaFU5wsxgU/yH |
TLSH: | DFF62C03E89611D5C4E9D1B089258272B970386C1B7933DB3BA5F7B42B327E05FBA791 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........<........"...........................@..............................`............`... ............................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x45d0a0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x0 [Thu Jan 1 00:00:00 1970 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 1 |
File Version Major: | 6 |
File Version Minor: | 1 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 1 |
Import Hash: | f0ea7b7844bbc5bfa9bb32efdcea957c |
Instruction |
---|
jmp 00007FC730B89460h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
pushfd |
cld |
dec eax |
sub esp, 000000E0h |
dec eax |
mov dword ptr [esp], edi |
dec eax |
mov dword ptr [esp+08h], esi |
dec eax |
mov dword ptr [esp+10h], ebp |
dec eax |
mov dword ptr [esp+18h], ebx |
dec esp |
mov dword ptr [esp+20h], esp |
dec esp |
mov dword ptr [esp+28h], ebp |
dec esp |
mov dword ptr [esp+30h], esi |
dec esp |
mov dword ptr [esp+38h], edi |
movups dqword ptr [esp+40h], xmm6 |
movups dqword ptr [esp+50h], xmm7 |
inc esp |
movups dqword ptr [esp+60h], xmm0 |
inc esp |
movups dqword ptr [esp+70h], xmm1 |
inc esp |
movups dqword ptr [esp+00000080h], xmm2 |
inc esp |
movups dqword ptr [esp+00000090h], xmm3 |
inc esp |
movups dqword ptr [esp+000000A0h], xmm4 |
inc esp |
movups dqword ptr [esp+000000B0h], xmm5 |
inc esp |
movups dqword ptr [esp+000000C0h], xmm6 |
inc esp |
movups dqword ptr [esp+000000D0h], xmm7 |
dec eax |
sub esp, 30h |
dec ecx |
mov ebp, ecx |
dec ecx |
mov edi, eax |
dec eax |
mov edx, dword ptr [00EFBB93h] |
dec eax |
mov edx, dword ptr [edx] |
dec eax |
cmp edx, 00000000h |
jne 00007FC730B8D12Eh |
dec eax |
mov eax, 00000000h |
jmp 00007FC730B8D1F3h |
dec eax |
mov edx, dword ptr [edx] |
dec eax |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xf6d000 | 0x490 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xf6e000 | 0x26c52 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xebd040 | 0x148 | .data |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x942dfd | 0x942e00 | 24cfd1142cf5ef1cde557551d4e6c91b | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x944000 | 0x578158 | 0x578200 | c6f09c58d59d65f22427926bde3132aa | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xebd000 | 0xaf350 | 0x41200 | 05d8eb8b115b53897dd83f07f2f22bc9 | False | 0.3883419805662188 | data | 4.776804623524716 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xf6d000 | 0x490 | 0x600 | 894ab5241150f06ca87878224acaf6bf | False | 0.3372395833333333 | data | 3.6172927131939767 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0xf6e000 | 0x26c52 | 0x26e00 | e427021ec6a780efd307ada8663fb660 | False | 0.14090760651125403 | data | 5.443966304282102 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.symtab | 0xf95000 | 0x4 | 0x200 | 07b5472d347d42780469fb2654b7fc54 | False | 0.02734375 | data | 0.020393135236084953 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
kernel32.dll | WriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 1, 2024 06:38:57.439121008 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:38:57.443926096 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:38:57.444096088 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:38:57.444324017 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:38:57.449073076 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:38:58.116525888 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:38:58.131820917 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:38:58.136795044 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:38:58.165620089 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:38:58.165620089 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:38:58.170499086 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:38:58.170511007 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:39:13.185779095 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:39:13.190579891 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:39:28.197055101 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:39:28.202380896 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:39:43.212713003 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:39:43.217746019 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:39:58.229110003 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:39:58.234149933 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:40:13.244899988 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:40:13.249845028 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:40:28.260337114 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:40:28.265764952 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:40:43.275983095 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:40:43.280924082 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:40:58.167192936 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:40:58.167192936 CEST | 49730 | 8888 | 192.168.2.4 | 128.65.199.135 |
Oct 1, 2024 06:40:58.173755884 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Oct 1, 2024 06:40:58.173770905 CEST | 8888 | 49730 | 128.65.199.135 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 1, 2024 06:38:57.397265911 CEST | 65276 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 1, 2024 06:38:57.435512066 CEST | 53 | 65276 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 1, 2024 06:38:57.397265911 CEST | 192.168.2.4 | 1.1.1.1 | 0x5d2a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 1, 2024 06:38:57.435512066 CEST | 1.1.1.1 | 192.168.2.4 | 0x5d2a | No error (0) | 128.65.199.135 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 00:38:56 |
Start date: | 01/10/2024 |
Path: | C:\Users\user\Desktop\Doc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa50000 |
File size: | 15'875'584 bytes |
MD5 hash: | 2746A7120BCE30E9230A2E71A9AD909F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Go lang |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Function 00A5C560 Relevance: 8.0, Strings: 6, Instructions: 510COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A5BBA0 Relevance: 6.6, Strings: 5, Instructions: 349COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A68F80 Relevance: 5.5, Strings: 4, Instructions: 545COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A968C0 Relevance: 3.9, Strings: 3, Instructions: 124COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A56E40 Relevance: 2.9, Strings: 2, Instructions: 418COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A560A0 Relevance: 2.9, Strings: 2, Instructions: 381COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A80560 Relevance: 2.7, Strings: 2, Instructions: 249COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A833C0 Relevance: 2.7, Strings: 2, Instructions: 246COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A85FE0 Relevance: 2.7, Strings: 2, Instructions: 237COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A94000 Relevance: 1.6, Strings: 1, Instructions: 391COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A775A0 Relevance: 1.6, Strings: 1, Instructions: 346COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A74980 Relevance: 1.6, Strings: 1, Instructions: 324COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A96AA0 Relevance: 1.5, Strings: 1, Instructions: 243COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A63E60 Relevance: 1.5, Strings: 1, Instructions: 219COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A79120 Relevance: 1.4, Strings: 1, Instructions: 172COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A64B40 Relevance: .3, Instructions: 327COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A56980 Relevance: .3, Instructions: 260COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A77120 Relevance: .2, Instructions: 207COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A77EC0 Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A6BCA0 Relevance: .2, Instructions: 183COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A59740 Relevance: .2, Instructions: 161COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A98100 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A6E260 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A6F520 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A5D120 Relevance: .1, Instructions: 99COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A73CC0 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00AAB800 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A675C0 Relevance: 12.9, Strings: 10, Instructions: 351COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A57A60 Relevance: 12.7, Strings: 10, Instructions: 194COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A584E0 Relevance: 11.4, Strings: 9, Instructions: 167COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A51060 Relevance: 9.1, Strings: 7, Instructions: 306COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A59080 Relevance: 8.9, Strings: 7, Instructions: 170COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A7DEE0 Relevance: 8.8, Strings: 7, Instructions: 68COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677A4 Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677AA Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677B6 Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677B0 Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677BC Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A6779E Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A67798 Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677C2 Relevance: 6.4, Strings: 5, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677C8 Relevance: 6.4, Strings: 5, Instructions: 112COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A67823 Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A67805 Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A6780B Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A67817 Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A67811 Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A6781D Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677FF Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A677F9 Relevance: 6.4, Strings: 5, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A515C0 Relevance: 5.4, Strings: 4, Instructions: 445COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A6C620 Relevance: 5.3, Strings: 4, Instructions: 314COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A69A60 Relevance: 5.2, Strings: 4, Instructions: 198COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A94E40 Relevance: 5.2, Strings: 4, Instructions: 180COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A5D3A0 Relevance: 5.2, Strings: 4, Instructions: 163COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00A658E0 Relevance: 5.1, Strings: 4, Instructions: 131COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|