Windows
Analysis Report
RasTls.dll
Overview
General Information
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll32.exe (PID: 6616 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\Ras Tls.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618) - conhost.exe (PID: 5948 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1252 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\Ras Tls.dll",# 1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - rundll32.exe (PID: 6548 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\RasT ls.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 6348 cmdline:
rundll32.e xe C:\User s\user\Des ktop\RasTl s.dll,GetO fficeDatat al MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 5284 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\RasT ls.dll",Ge tOfficeDat atal MD5: 889B99C52A60DD49227C5E485A016679)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | Network Connect: | Jump to behavior |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 111 Process Injection | 1 Rundll32 | 1 Credential API Hooking | 21 Security Software Discovery | Remote Services | 1 Credential API Hooking | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 111 Process Injection | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 21 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
68% | ReversingLabs | Win32.Backdoor.Healquick | ||
100% | Avira | TR/Redcap.mvaff | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
swiftandfast.net | 65.20.90.139 | true | true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
65.20.90.139 | swiftandfast.net | United States | 199592 | CP-ASDE | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561846 |
Start date and time: | 2024-11-24 13:29:37 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 5s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | RasTls.dll |
Detection: | MAL |
Classification: | mal88.evad.winDLL@10/0@1/1 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: RasTls.dll
Time | Type | Description |
---|---|---|
07:30:32 | API Interceptor | |
07:31:01 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CP-ASDE | Get hash | malicious | Discord Token Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RMSRemoteAdmin | Browse |
| ||
Get hash | malicious | RMSRemoteAdmin | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 7.965303809439106 |
TrID: |
|
File name: | RasTls.dll |
File size: | 6'302'208 bytes |
MD5: | f1c9f093d5479560e83a0759201210b7 |
SHA1: | 9553567e231a172c69f0ef8800a927193b9cbd49 |
SHA256: | 1906e7d5a745a364c91f5e230e16e1566721ace1183a57e8d25ff437664c7d02 |
SHA512: | be63e2da1a550053d599e4369fe2e4a96bfed5bf0dc52bd4cba2a6ab0f8995c9953d4b703547e3bed45ce640c0eee4ebe3aef15849f126fff39b1f0178951201 |
SSDEEP: | 196608:5y0OghWwkjhzqi5DOjUl2DGzNZZkuBm1W8xQVW:5JFEDj9qiloUl7Ux1W |
TLSH: | E3562363216A0006E5F9883DC61F7D9831F742769B43E87CB1B6ADD52B269B1F203B53 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ob...........!................0.=..............................................:`...@.............................N.. |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x103dc030 |
Entrypoint Section: | .WFm |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x624FFDD6 [Fri Apr 8 09:18:14 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 1a39c9a6ecf0ca64fc5770962bbdc4e5 |
Instruction |
---|
push BFD4F858h |
call 00007F6D6509915Ch |
dec edx |
not edx |
jmp 00007F6D6513CC49h |
mov eax, dword ptr [ebp+00h] |
sub cx, 5642h |
shrd cx, dx, 00000081h |
mov cx, word ptr [ebp+04h] |
lea ebp, dword ptr [ebp+00000006h] |
jmp 00007F6D650D5143h |
bt ecx, esi |
mov ecx, dword ptr [ebp+00h] |
jmp 00007F6D6528CD45h |
add edi, eax |
jmp 00007F6D650FAC6Dh |
jne 00007F6D650E672Eh |
mov eax, dword ptr [ebp+00h] |
jmp 00007F6D6505A610h |
add esi, 00000004h |
test di, ax |
xor ecx, ebx |
jmp 00007F6D65087ECDh |
mov eax, dword ptr [esi] |
mov edx, esi |
bt edx, 1Ah |
btc edx, 14h |
mov edx, dword ptr [eax] |
cmc |
cmp sp, 55CAh |
mov dword ptr [esi], edx |
btc dx, di |
add edx, edx |
test ebp, 4118545Dh |
mov edx, dword ptr [ebp+00h] |
test cl, dh |
jmp 00007F6D651408AEh |
inc ecx |
not ecx |
xor ebx, ecx |
jmp 00007F6D650B4496h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x9216d0 | 0x4e | .WFm |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x5c5ac4 | 0x118 | .WFm |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x96a000 | 0x1b2 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x969000 | 0x5fc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x968670 | 0x40 | .WFm |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x366000 | 0x90 | .BXf |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1a59b | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x1c000 | 0x462e | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x21000 | 0xa900 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.X:T | 0x2c000 | 0x339eac | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.BXf | 0x366000 | 0x5b0 | 0x600 | 7ef56d7580a2e67cae4f7f89e6eafb55 | False | 0.07877604166666667 | data | 0.5089280985485166 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.WFm | 0x367000 | 0x601800 | 0x601800 | 61ee4f262fb1277e667af5bfdf9afdab | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x969000 | 0x5fc | 0x600 | 28b0624b163f2fd9b5e789a185b2c2db | False | 0.52734375 | data | 4.347436157519483 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x96a000 | 0x1b2 | 0x200 | 6a1cfcb854d8d3c8d4a13f0819166e2e | False | 0.470703125 | data | 4.47450519324645 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x96a058 | 0x15a | ASCII text, with CRLF line terminators | English | United States | 0.5491329479768786 |
DLL | Import |
---|---|
KERNEL32.dll | GetVersionExW |
USER32.dll | wsprintfA |
ADVAPI32.dll | CredEnumerateA |
SHELL32.dll | ShellExecuteW |
WS2_32.dll | WSAIoctl |
SHLWAPI.dll | PathGetArgsW |
NETAPI32.dll | NetUserGetInfo |
IPHLPAPI.DLL | GetAdaptersInfo |
CRYPT32.dll | CryptUnprotectData |
OLEAUT32.dll | GetErrorInfo |
KERNEL32.dll | GetSystemTimeAsFileTime |
USER32.dll | CharUpperBuffW |
KERNEL32.dll | LocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress |
Name | Ordinal | Address |
---|---|---|
GetOfficeDatatal | 1 | 0x100098d0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 13:30:30.962975025 CET | 49704 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:30.963006020 CET | 443 | 49704 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:30:30.963099957 CET | 49704 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:30.963136911 CET | 49704 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:30.963141918 CET | 443 | 49704 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:30:30.986747980 CET | 49705 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:30.986825943 CET | 443 | 49705 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:30:30.986917973 CET | 49705 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:30.986978054 CET | 49705 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:30.986994028 CET | 443 | 49705 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:30:33.763658047 CET | 49706 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:33.763705969 CET | 443 | 49706 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:30:33.763784885 CET | 49706 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:33.763829947 CET | 49706 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:30:33.763835907 CET | 443 | 49706 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:15.150484085 CET | 443 | 49705 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:15.150568962 CET | 49705 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:15.150652885 CET | 49705 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:15.150686979 CET | 443 | 49705 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:15.197293043 CET | 443 | 49704 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:15.197371006 CET | 49704 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:15.197457075 CET | 49704 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:15.197477102 CET | 443 | 49704 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:17.931536913 CET | 443 | 49706 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:17.931627989 CET | 49706 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:17.931729078 CET | 49706 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:17.931746960 CET | 443 | 49706 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:18.158365965 CET | 49778 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:18.158411980 CET | 443 | 49778 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:18.158504009 CET | 49778 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:18.158559084 CET | 49778 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:18.158566952 CET | 443 | 49778 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:18.205172062 CET | 49779 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:18.205246925 CET | 443 | 49779 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:18.205368996 CET | 49779 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:18.205439091 CET | 49779 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:18.205456972 CET | 443 | 49779 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:20.939543009 CET | 49785 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:20.939625978 CET | 443 | 49785 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:31:20.939733982 CET | 49785 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:20.939815998 CET | 49785 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:31:20.939856052 CET | 443 | 49785 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:02.378051043 CET | 443 | 49778 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:02.378406048 CET | 49778 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:02.378432989 CET | 49778 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:02.378448009 CET | 443 | 49778 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:02.408528090 CET | 443 | 49779 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:02.408617973 CET | 49779 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:02.408698082 CET | 49779 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:02.408740044 CET | 443 | 49779 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:05.111037970 CET | 443 | 49785 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:05.111125946 CET | 49785 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.111212015 CET | 49785 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.111259937 CET | 443 | 49785 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:05.392849922 CET | 49887 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.392894030 CET | 443 | 49887 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:05.392967939 CET | 49887 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.393017054 CET | 49887 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.393027067 CET | 443 | 49887 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:05.424109936 CET | 49888 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.424149036 CET | 443 | 49888 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:05.424238920 CET | 49888 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.424946070 CET | 49888 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:05.424957991 CET | 443 | 49888 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:08.129369020 CET | 49894 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:08.129401922 CET | 443 | 49894 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:08.133399963 CET | 49894 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:08.133461952 CET | 49894 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:08.133467913 CET | 443 | 49894 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:49.524281979 CET | 443 | 49887 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:49.524518967 CET | 49887 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:49.524518967 CET | 49887 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:49.555542946 CET | 443 | 49888 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:49.555721045 CET | 49888 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:49.555844069 CET | 49888 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:49.555876017 CET | 443 | 49888 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:49.876773119 CET | 49887 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:49.876794100 CET | 443 | 49887 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:52.252123117 CET | 443 | 49894 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:52.252254963 CET | 49894 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.252334118 CET | 49894 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.252351046 CET | 443 | 49894 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:52.533334970 CET | 49985 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.533370972 CET | 443 | 49985 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:52.533435106 CET | 49985 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.533520937 CET | 49985 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.533530951 CET | 443 | 49985 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:52.564817905 CET | 49986 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.564858913 CET | 443 | 49986 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:52.564933062 CET | 49986 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.564992905 CET | 49986 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:52.565001011 CET | 443 | 49986 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:55.267700911 CET | 49987 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:55.267776966 CET | 443 | 49987 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:32:55.271517992 CET | 49987 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:55.271666050 CET | 49987 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:32:55.271692991 CET | 443 | 49987 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:36.693067074 CET | 443 | 49985 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:36.693149090 CET | 49985 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:36.693236113 CET | 49985 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:36.693248987 CET | 443 | 49985 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:36.731028080 CET | 443 | 49986 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:36.731120110 CET | 49986 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:36.731184959 CET | 49986 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:36.731204033 CET | 443 | 49986 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:39.388725996 CET | 443 | 49987 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:39.388972044 CET | 49987 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.389018059 CET | 49987 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.389039993 CET | 443 | 49987 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:39.705185890 CET | 49988 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.705220938 CET | 443 | 49988 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:39.705310106 CET | 49988 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.705358982 CET | 49988 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.705363035 CET | 443 | 49988 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:39.737416029 CET | 49989 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.737447977 CET | 443 | 49989 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:39.740595102 CET | 49989 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.740778923 CET | 49989 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:39.740787029 CET | 443 | 49989 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:42.392714977 CET | 49990 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:42.392749071 CET | 443 | 49990 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:33:42.392808914 CET | 49990 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:42.392872095 CET | 49990 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:33:42.392878056 CET | 443 | 49990 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:23.847861052 CET | 443 | 49988 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:23.851691008 CET | 49988 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:23.851800919 CET | 49988 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:23.851823092 CET | 443 | 49988 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:23.863003016 CET | 443 | 49989 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:23.863547087 CET | 49989 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:23.863601923 CET | 49989 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:23.863616943 CET | 443 | 49989 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:26.548851967 CET | 443 | 49990 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:26.548926115 CET | 49990 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.549026966 CET | 49990 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.549046040 CET | 443 | 49990 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:26.861453056 CET | 49991 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.861514091 CET | 443 | 49991 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:26.861576080 CET | 49991 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.861615896 CET | 49991 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.861623049 CET | 443 | 49991 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:26.878180027 CET | 49992 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.878237963 CET | 443 | 49992 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:26.878307104 CET | 49992 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.878401995 CET | 49992 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:26.878412962 CET | 443 | 49992 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:29.565471888 CET | 49993 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:29.565526009 CET | 443 | 49993 | 65.20.90.139 | 192.168.2.5 |
Nov 24, 2024 13:34:29.569555998 CET | 49993 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:29.569556952 CET | 49993 | 443 | 192.168.2.5 | 65.20.90.139 |
Nov 24, 2024 13:34:29.569600105 CET | 443 | 49993 | 65.20.90.139 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 13:30:30.554168940 CET | 60440 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 24, 2024 13:30:30.941832066 CET | 53 | 60440 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 24, 2024 13:30:30.554168940 CET | 192.168.2.5 | 1.1.1.1 | 0xbf87 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 24, 2024 13:30:30.941832066 CET | 1.1.1.1 | 192.168.2.5 | 0xbf87 | No error (0) | 65.20.90.139 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 07:30:28 |
Start date: | 24/11/2024 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xce0000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 07:30:28 |
Start date: | 24/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 07:30:28 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 07:30:28 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9d0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 4 |
Start time: | 07:30:28 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9d0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 6 |
Start time: | 07:30:31 |
Start date: | 24/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9d0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |