Windows
Analysis Report
enigma_loader.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- enigma_loader.exe (PID: 7268 cmdline:
"C:\Users\ user\Deskt op\enigma_ loader.exe " MD5: 262215BCD5FBA074E3F2DD216663F727) - WerFault.exe (PID: 7500 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 7 268 -s 188 0 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- svchost.exe (PID: 7464 cmdline:
"C:\Users\ user\AppDa ta\Roaming \svchost.e xe" MD5: 262215BCD5FBA074E3F2DD216663F727)
- svchost.exe (PID: 7644 cmdline:
"C:\Users\ user\AppDa ta\Roaming \svchost.e xe" MD5: 262215BCD5FBA074E3F2DD216663F727)
- svchost.exe (PID: 792 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - WerFault.exe (PID: 344 cmdline:
C:\Windows \system32\ WerFault.e xe -pss -s 440 -p 72 68 -ip 726 8 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["127.0.0.1", "selection-wa.gl.at.ply.gg"], "Port": 64769, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:31:26.215138+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:33.341346+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:47.555949+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:56.223589+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:01.774279+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:15.996776+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:22.799231+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:26.222991+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:32.774900+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:33.086808+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:37.215754+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:37.526454+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:43.305303+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:43.620016+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:44.653952+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:45.653721+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:48.821136+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:49.132021+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:49.454718+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:51.367562+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:51.678461+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:56.213226+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:59.674253+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:59.984447+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:05.228480+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:05.539012+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:06.159975+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:09.416188+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:15.759717+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:26.238242+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:27.354918+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:27.666554+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:28.969465+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:29.279560+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:31:33.343099+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:31:47.557720+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:01.777125+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:16.000422+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:22.863645+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:32.777946+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:33.088656+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:33.391147+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:33.703067+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:37.221099+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:37.532883+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:43.306878+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:43.622906+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:44.656683+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:45.656449+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:48.824507+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:49.140499+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:49.456622+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:51.372590+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:51.680412+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:59.685580+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:59.986287+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:05.230932+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:05.557175+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:05.852647+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:06.161321+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:09.505789+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:16.039955+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:27.359678+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:27.671384+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:28.987717+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:29.287722+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:31:26.215138+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:56.223589+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:26.222991+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:56.213226+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:26.238242+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:32:36.699680+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FFD9B7F6FE6 | |
Source: | Code function: | 0_2_00007FFD9B7F9E39 | |
Source: | Code function: | 0_2_00007FFD9B7F0F6D | |
Source: | Code function: | 0_2_00007FFD9B7F7D92 | |
Source: | Code function: | 0_2_00007FFD9B7F1289 | |
Source: | Code function: | 0_2_00007FFD9B7F0F70 | |
Source: | Code function: | 1_2_00007FFD9B801289 | |
Source: | Code function: | 3_2_00007FFD9B801289 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 0_2_00007FFD9B7F1EAA | |
Source: | Code function: | 0_2_00007FFD9B7F00C1 | |
Source: | Code function: | 1_2_00007FFD9B8000C1 | |
Source: | Code function: | 3_2_00007FFD9B8000C1 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 21 Registry Run Keys / Startup Folder | 11 Process Injection | 11 Masquerading | OS Credential Dumping | 231 Security Software Discovery | Remote Services | 11 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 21 Registry Run Keys / Startup Folder | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 141 Virtualization/Sandbox Evasion | Security Account Manager | 141 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 11 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Obfuscated Files or Information | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
87% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT | ||
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML | |||
87% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
selection-wa.gl.at.ply.gg | 147.185.221.23 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
147.185.221.23 | selection-wa.gl.at.ply.gg | United States | 12087 | SALSGIVERUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561481 |
Start date and time: | 2024-11-23 14:30:22 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Critical Process Termination |
Sample name: | enigma_loader.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@8/10@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target svchost.exe, PID 7464 because it is empty
- Execution Graph export aborted for target svchost.exe, PID 7644 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: enigma_loader.exe
Time | Type | Description |
---|---|---|
08:31:16 | API Interceptor | |
13:31:17 | Autostart | |
13:31:25 | Autostart | |
13:31:34 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
147.185.221.23 | Get hash | malicious | SheetRat | Browse | ||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | Blank Grabber, Skuld Stealer, XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
SALSGIVERUS | Get hash | malicious | SheetRat | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Blank Grabber, Skuld Stealer, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_enigma_loader.ex_241c9992af64d28bdcb0b67c166884b89b2d3ebe_e45d3950_fd5bba2a-f600-4b81-a0a7-5975f24b1b5e\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.3255494721995904 |
Encrypted: | false |
SSDEEP: | 192:w4t8w6Wuv3081iHxaWz8iyg5lA1t2zuiFKZ24lO8/4y:w69uvE81iRa48idAOzuiFKY4lO8/l |
MD5: | 4507FE0F54BC5AA52DF00D7EAF221CD0 |
SHA1: | 5EE73D73B6F433C81EDA2ECC228D8F0682CB462B |
SHA-256: | BA81004DD3E1F062046B9E493425A5D477C3C56FCB4608ECD1C2A5BE6F463CAF |
SHA-512: | D347281726FD4591BFE678DF2A3263020A73B468D8300B2E4BB3DAA724406B678262E8845231729AED89C19D7E65102F8680D5259C6C21EC096A3179806E55B9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 523859 |
Entropy (8bit): | 3.11843367176594 |
Encrypted: | false |
SSDEEP: | 3072:/6lZa9kB3+vu+drTxkbO2ruuy64ObRmFxXH+cS4ygPB1CCqBc2a:/6lGkB3Qu+dpAruuy6vFwmU5qBC |
MD5: | 5AD865A76F64FE66CACD07207B4AE9A7 |
SHA1: | 80DD1A27EB54A2AE64859C891BDE3C41E0F7AF85 |
SHA-256: | 72269A2A175167D28B7EE6C00E0AB917A3BA6341D5A5C3FA317ACACBAB43B719 |
SHA-512: | 86E54966ED25EF6A29E0B1C0DFBE06163D06451975BF9F07077CABAC1F58732DBD94B9DE9DF31FCC27A5F970A734DF141FF8BE586B4EA5D92230783A7115D0F5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9340 |
Entropy (8bit): | 3.7013386466840617 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ9i96Y9yVV0gmfk4jX4t8Iprr89bXvXwbvrfMW9m:R6lXJ496Y4VWgmfkS4tYXvX0vrf6 |
MD5: | E6AFB2A930B7B567A322D9E7A0048E5A |
SHA1: | D26A2F9068C5C4857296B0DE9FAEE0910362A150 |
SHA-256: | CDD41B62F6FA41E1946ABCE4AE07978DBA5F2F9C0384761CDF6196EE1AF35220 |
SHA-512: | 1A97BB70107704E09E3193EC75C589D1A05C7C1F57BBDAA60FAE6C213BBF45B8BF43028498435FAF3AF3B7461F6037822EADD618B6437F52FE67AE249830B91A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4963 |
Entropy (8bit): | 4.494688239637227 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs+Jg771I9/0WpW8VYQyYm8M4JwSFMy4yq8vR7/4UrSsyd:uIjf0I70t7VpJwNWlxOsyd |
MD5: | 27A79A8D8BDAC40E3EF324F4D5DADAAE |
SHA1: | 61513577FA63D2375EF30F7A0D8629DE75C8D7FC |
SHA-256: | 3D77062AED40F24447B3EACAA82AC73675D0207F1C3E6975B6731237DCF424B7 |
SHA-512: | 829077D3F645B7DCB6A98A3A0764697F9D982F2044574DDBD79B3D07F056E09EB7EA218D8B2FCAB8170A7E97BD045896B7421B752227507478672136A07351F7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 80988 |
Entropy (8bit): | 3.109606105736042 |
Encrypted: | false |
SSDEEP: | 1536:kPj35oN+1+sEzZCOmh+Fe8d55j/FG6XdW9:kPj35oN+1+sEzZCOmh+Fe8d55zFG6Xdy |
MD5: | 55493B2B910FCC22F826E106146A1186 |
SHA1: | 189C651F06C89B2B38E4B37CBA59BF5320D18EC8 |
SHA-256: | 295FD6E30B414D61CD6DF20489C0187B8C5917C5EF93CE99C35D317E96C0C400 |
SHA-512: | 519F7AB6F24C6C7F15983DA28297943326C9427D834FC7019F9B53292F802950C08A6470EA1D08CCDC9E88FB04C37E3320152F884E4F5F0C34F0E197F59CA1D2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13340 |
Entropy (8bit): | 2.6870056256649826 |
Encrypted: | false |
SSDEEP: | 96:TiZYW8zW02YTYKkWBibHxYEZfJtNiEIFDjwJ26QaWOiM+Z4IvwZ3:2ZDpEtuX/EaWOiM+ZfvM3 |
MD5: | 9368DDB17C320932628FD1F050542BE8 |
SHA1: | 53D26C1FFBA39EE1571DBDF1E7D9F24433A79780 |
SHA-256: | D220D0533C7B5971453696BEB353A3F5CB354DB956066D91252ACA856A7BF582 |
SHA-512: | 77DE3D55C47746B72FA655909B9BE2C935883C2259A0B37030BCAF6A667D5AD8759C3C8B6E420F7702ECC83E654F56BB42871DD0D6B91DC8C34E8FC156147019 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Roaming\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 654 |
Entropy (8bit): | 5.380476433908377 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT |
MD5: | 30E4BDFC34907D0E4D11152CAEBE27FA |
SHA1: | 825402D6B151041BA01C5117387228EC9B7168BF |
SHA-256: | A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63 |
SHA-512: | 89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
Download File
Process: | C:\Users\user\Desktop\enigma_loader.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 764 |
Entropy (8bit): | 5.035439340804292 |
Encrypted: | false |
SSDEEP: | 12:83Uk/7k/n24h8WC0rgdY//UyL2XNvu4jAsjrHkBLBmV:83ChHc+MM2X0cAsjIBLBm |
MD5: | EE1A7D3AFFAC12AE4D0001A1B8AF460D |
SHA1: | 7AEF855D9BE90AA4FEB66DDE991520FC627CD7E3 |
SHA-256: | A6AF25811C1C488EA6725213ECB7A7739C1F0E41195A9518526BAF9D4232FE16 |
SHA-512: | 16BF0C59E3A10D18A85D4E599BE4994F7B190C29B8286EA51759B71CA4376828C1D849EF43D02C002F67C624CB80B9C2AD57872F7AF9E43F17F6FF6637DE0016 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\enigma_loader.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35840 |
Entropy (8bit): | 5.6012158815462545 |
Encrypted: | false |
SSDEEP: | 384:ySBqVEqKykkTwusE+E33Rz3UXmbXLZoWRy7vHsJQcXTSc58pkFyHBLTIZwgG+Vv8:VQDb3QIX/hGcVFy79e6GOjhvy4Bt |
MD5: | 262215BCD5FBA074E3F2DD216663F727 |
SHA1: | 48803B38E74382826AA8B4CA9D3E2017601330EB |
SHA-256: | A0B52D44E5CE4FD05068101A2A7FE64B533BE9BACC774942234CBDD23B12D150 |
SHA-512: | DABC803AB7BABE6B6FBAE7A9B6E9E192B27C7D9ACB5D55CB990509CA2ED5800821CEB221FFC1A26CE77F21C29B8D7766D19218FCEA4A1F4054397E628E1764E8 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465702123831318 |
Encrypted: | false |
SSDEEP: | 6144:xIXfpi67eLPU9skLmb0b44WSPKaJG8nAgejZMMhA2gX4WABl0uN5dwBCswSbZ:SXD944WlLZMM6YFHb+Z |
MD5: | 81B88D88EB95B75691805BB843F0C468 |
SHA1: | 5C51F988E438ED5A610B625F162E7C45639EC8FF |
SHA-256: | 2F65D37C3CF3895E291AB4A9486908E40191986EE65EC689331F197E6EF29487 |
SHA-512: | CA60328A8CB3CE3EEFBD1F4E149DC845C1B73B0EAE9EC174DA6689F7D8AB75AD1664D5E0C27B81C707657178BE354784D06BB5B98C82E508FB1E4933559E3BB6 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.6012158815462545 |
TrID: |
|
File name: | enigma_loader.exe |
File size: | 35'840 bytes |
MD5: | 262215bcd5fba074e3f2dd216663f727 |
SHA1: | 48803b38e74382826aa8b4ca9d3e2017601330eb |
SHA256: | a0b52d44e5ce4fd05068101a2a7fe64b533be9bacc774942234cbdd23b12d150 |
SHA512: | dabc803ab7babe6b6fbae7a9b6e9e192b27c7d9acb5d55cb990509ca2ed5800821ceb221ffc1a26ce77f21c29b8d7766d19218fcea4a1f4054397e628e1764e8 |
SSDEEP: | 384:ySBqVEqKykkTwusE+E33Rz3UXmbXLZoWRy7vHsJQcXTSc58pkFyHBLTIZwgG+Vv8:VQDb3QIX/hGcVFy79e6GOjhvy4Bt |
TLSH: | 80F24B08B3900756D6ED6FB56EB3A1420679FA078913EB5E0CD4849B7F337C18A123E6 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k.@g................................. ........@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40a12e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6740E26B [Fri Nov 22 19:58:35 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa0e0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc000 | 0x500 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x8134 | 0x8200 | 4d5d1fce4af35d602822054fcfb1ead7 | False | 0.4982872596153846 | data | 5.735314685854522 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xc000 | 0x500 | 0x600 | 331abcd5e502089714ca8eff24912c6b | False | 0.3893229166666667 | data | 3.932150987433378 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe000 | 0xc | 0x200 | 6ec9a61f3ba2211c329706c20b53f907 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xc0a0 | 0x26c | data | 0.47580645161290325 | ||
RT_MANIFEST | 0xc310 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T14:31:26.215138+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:26.215138+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:32.708522+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:31:33.341346+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:33.343099+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:31:47.555949+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:47.557720+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:31:56.223589+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:31:56.223589+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:01.774279+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:01.777125+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:15.996776+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:16.000422+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:22.799231+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:22.863645+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:26.222991+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:26.222991+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:32.774900+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:32.777946+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:33.086808+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:33.088656+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:33.391147+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:33.703067+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:36.699680+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:37.215754+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:37.221099+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:37.526454+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:37.532883+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:43.305303+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:43.306878+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:43.620016+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:43.622906+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:44.653952+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:44.656683+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:45.653721+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:45.656449+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:48.821136+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:48.824507+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:49.132021+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:49.140499+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:49.454718+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:49.456622+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:51.367562+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:51.372590+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:51.678461+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:51.680412+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:56.213226+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:56.213226+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:59.674253+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:59.685580+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:32:59.984447+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:32:59.986287+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:05.228480+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:05.230932+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:05.539012+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:05.557175+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:05.852647+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:06.159975+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:06.161321+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:09.416188+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:09.505789+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:15.759717+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:16.039955+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:26.238242+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:26.238242+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:27.354918+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:27.359678+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:27.666554+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:27.671384+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:28.969465+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:28.987717+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
2024-11-23T14:33:29.279560+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.23 | 64769 | 192.168.2.4 | 49730 | TCP |
2024-11-23T14:33:29.287722+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49730 | 147.185.221.23 | 64769 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 14:31:18.185638905 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:18.306057930 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:18.306184053 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:18.488655090 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:18.609757900 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:26.215137959 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:26.266459942 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:32.708522081 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:32.828713894 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:33.341346025 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:33.343099117 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:33.464010954 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:46.923078060 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:47.043400049 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:47.555948973 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:47.557719946 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:31:47.677710056 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:56.223588943 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:31:56.266558886 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:01.141849041 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:01.261753082 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:01.774279118 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:01.777124882 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:01.896859884 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:15.360831022 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:15.482292891 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:15.996776104 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:16.000422001 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:16.120162010 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:22.063967943 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:22.183727026 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:22.799231052 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:22.844762087 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:22.863645077 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:22.983331919 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:26.222990990 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:26.285902977 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:32.142007113 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:32.261955976 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:32.262013912 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:32.381638050 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:32.381696939 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:32.501449108 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:32.501524925 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:32.621653080 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:32.774899960 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:32.777945995 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:32.897542953 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.086807966 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.088655949 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:33.208250999 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.389233112 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.391146898 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:33.511450052 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.513679028 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:33.634553909 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.699222088 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.703067064 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:33.823930025 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:33.824172974 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:33.943820000 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:36.579807043 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:36.699611902 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:36.699680090 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:36.824090958 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:37.215754032 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:37.221098900 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:37.340938091 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:37.526453972 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:37.532882929 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:37.652522087 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:42.673289061 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:42.792861938 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:42.792918921 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:42.912476063 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:43.305303097 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:43.306878090 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:43.426636934 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:43.620016098 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:43.622905970 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:43.742767096 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:43.742882013 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:43.867902994 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:44.653951883 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:44.656682968 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:44.776853085 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:44.860802889 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:44.980566025 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:45.653721094 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:45.656449080 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:45.779002905 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:48.188816071 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:48.308489084 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:48.308553934 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:48.430927038 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:48.821135998 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:48.824506998 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:48.944279909 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:49.132020950 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:49.140499115 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:49.260293007 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:49.454718113 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:49.456621885 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:49.576380014 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:50.735707045 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:50.855493069 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:50.923141003 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:51.045681953 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:51.367562056 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:51.372590065 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:51.492613077 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:51.678461075 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:51.680412054 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:51.800117970 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:56.213226080 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:56.312988997 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:59.032571077 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:59.152441025 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:59.152539968 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:59.272972107 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:59.674252987 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:59.685580015 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:32:59.807502985 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:59.984447002 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:32:59.986287117 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:00.105969906 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:04.548702002 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:04.669701099 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:04.669764042 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:04.790132046 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:04.790199041 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:04.909859896 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:04.911715031 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:05.031779051 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:05.228480101 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:05.230931997 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:05.351522923 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:05.539011955 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:05.557174921 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:05.678400040 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:05.850704908 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:05.852647066 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:05.972240925 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:05.972296953 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:06.092312098 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:06.159975052 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:06.161320925 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:06.283874035 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:08.782706976 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:08.903393984 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:09.416188002 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:09.505789042 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:09.625682116 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:15.127681971 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:15.247559071 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:15.759716988 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:15.846812010 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:16.039954901 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:16.159852028 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:26.238241911 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:26.360532999 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:26.720244884 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:26.841856003 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:26.841912985 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:26.962660074 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:27.354918003 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:27.359678030 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:27.479146004 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:27.666553974 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:27.671384096 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:27.790929079 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:28.329900026 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:28.450639963 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:28.450700998 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:28.570354939 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:28.969465017 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:28.987716913 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:29.107867956 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:29.279560089 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:29.287722111 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Nov 23, 2024 14:33:29.408399105 CET | 64769 | 49730 | 147.185.221.23 | 192.168.2.4 |
Nov 23, 2024 14:33:33.844039917 CET | 49730 | 64769 | 192.168.2.4 | 147.185.221.23 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 14:31:17.763812065 CET | 58330 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 23, 2024 14:31:17.999507904 CET | 53 | 58330 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 23, 2024 14:31:17.763812065 CET | 192.168.2.4 | 1.1.1.1 | 0x332f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 23, 2024 14:31:17.999507904 CET | 1.1.1.1 | 192.168.2.4 | 0x332f | No error (0) | 147.185.221.23 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:31:11 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\Desktop\enigma_loader.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 35'840 bytes |
MD5 hash: | 262215BCD5FBA074E3F2DD216663F727 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 08:31:25 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Roaming\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x960000 |
File size: | 35'840 bytes |
MD5 hash: | 262215BCD5FBA074E3F2DD216663F727 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 08:31:34 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Roaming\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x80000 |
File size: | 35'840 bytes |
MD5 hash: | 262215BCD5FBA074E3F2DD216663F727 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 7 |
Start time: | 08:33:30 |
Start date: | 23/11/2024 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6eef20000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 8 |
Start time: | 08:33:31 |
Start date: | 23/11/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75c3d0000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 08:33:31 |
Start date: | 23/11/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75c3d0000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 19.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 3 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F6FE6 Relevance: .5, Instructions: 473COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F7D92 Relevance: .5, Instructions: 459COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F0F6D Relevance: .3, Instructions: 282COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B7F0F70 Relevance: .3, Instructions: 268COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B801289 Relevance: .6, Instructions: 568COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800BFE Relevance: .8, Instructions: 765COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8019F9 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8004C8 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800A91 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B80093A Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B801BA1 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B801289 Relevance: .6, Instructions: 568COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800BFE Relevance: .8, Instructions: 765COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8019F9 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8004C8 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800A91 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B800937 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B801BA1 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|