Windows
Analysis Report
windxcmd.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- windxcmd.exe (PID: 7404 cmdline:
"C:\Users\ user\Deskt op\windxcm d.exe" MD5: 65F2DF92724E59CABE9CC5F12768AD93) - svchost.exe (PID: 7456 cmdline:
"C:\Users\ user\AppDa ta\Roaming \svchost.e xe" MD5: FBC06EB9F872988CF94EC59C859FACD7) - schtasks.exe (PID: 7704 cmdline:
"C:\Window s\System32 \schtasks. exe" /crea te /f /RL HIGHEST /s c minute / mo 1 /tn " svchost" / tr "C:\Use rs\user\Ap pData\Roam ing\svchos t.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 7712 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wind.exe (PID: 7480 cmdline:
"C:\Users\ user\AppDa ta\Roaming \wind.exe" MD5: A43BF335D87DF0128E7DA328C6A447B7)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["45.141.26.134"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "usb.exe"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
Click to see the 13 entries |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:55:39.835907+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:55:53.369724+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:55:53.712594+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:07.602597+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:21.492991+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:23.378688+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:34.178782+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:39.806194+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:40.060140+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:40.353195+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:53.395155+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:53.729778+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:55.462497+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:01.101843+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:11.367860+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:16.240004+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:16.240251+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:16.696188+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:23.384551+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:23.899550+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:26.023750+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:33.753603+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:46.399910+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:53.040127+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:53.406222+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:06.929942+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:11.399731+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:11.653910+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:11.925757+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:23.432884+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:24.462311+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:26.902453+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:27.274986+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:33.181717+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:36.745355+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:37.196123+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:47.164750+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:52.150218+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:53.438566+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:54.492682+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:56.674939+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:57.852047+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:58.351879+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:58.608295+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:01.462519+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:08.579608+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:08.833416+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:11.633875+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:18.821312+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:20.104054+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:23.444705+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:23.745977+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:24.196844+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:27.770571+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:55:39.853925+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:55:53.721542+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:07.604708+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:21.494597+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:34.181270+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:39.819371+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:40.064715+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:40.355122+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:53.732407+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:55.463889+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:01.104528+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:11.369689+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:16.243183+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:16.697744+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:23.902579+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:26.025412+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:33.786962+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:46.405091+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:53.232690+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:06.931814+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:11.403104+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:11.690822+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:12.023345+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:24.464680+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:26.904844+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:27.276607+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:33.183692+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:36.747499+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:37.198005+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:47.168451+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:52.152210+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:54.494066+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:56.676874+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:58.353766+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:58.609837+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:01.464362+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:08.581856+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:08.838729+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:09.140205+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:11.635684+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:18.829686+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:20.107542+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:23.750177+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:24.199688+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:27.771330+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:55:53.369724+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:23.378688+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:53.395155+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:23.384551+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:53.406222+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:23.432884+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:53.438566+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:23.444705+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:57:33.167704+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | URLs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | DNS query: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Long String: |
Source: | Code function: | 1_2_00007FFD9B60C794 | |
Source: | Code function: | 1_2_00007FFD9B605776 | |
Source: | Code function: | 1_2_00007FFD9B601631 | |
Source: | Code function: | 1_2_00007FFD9B606522 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00007FFD9B60809D | |
Source: | Code function: | 1_2_00007FFD9B6080AD |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTP traffic detected: |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Code function: | 1_2_00007FFD9B606D21 |
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 2 Scheduled Task/Job | 111 Process Injection | 11 Masquerading | 1 Input Capture | 541 Security Software Discovery | Remote Services | 1 Input Capture | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Scheduled Task/Job | 1 DLL Side-Loading | 2 Scheduled Task/Job | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 11 Archive Collected Data | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 151 Virtualization/Sandbox Evasion | Security Account Manager | 151 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | 12 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Obfuscated Files or Information | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Software Packing | DCSync | 23 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Timestomp | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
68% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Spy.Gen | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
83% | ReversingLabs | ByteCode-MSIL.Ransomware.CryptConsole | ||
19% | ReversingLabs | Win64.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ip-api.com | 208.95.112.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
45.141.26.134 | unknown | Netherlands | 62068 | SPECTRAIPSpectraIPBVNL | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562137 |
Start date and time: | 2024-11-25 08:54:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | windxcmd.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@8/3@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target wind.exe, PID 7480 because it is empty
- Execution Graph export aborted for target windxcmd.exe, PID 7404 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: windxcmd.exe
Time | Type | Description |
---|---|---|
02:55:24 | API Interceptor | |
07:55:26 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
208.95.112.1 | Get hash | malicious | Blank Grabber, SilentXMRMiner, Xmrig | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ip-api.com | Get hash | malicious | Blank Grabber, SilentXMRMiner, Xmrig | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
SPECTRAIPSpectraIPBVNL | Get hash | malicious | Mirai, Okiru | Browse |
| |
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
TUT-ASUS | Get hash | malicious | Blank Grabber, SilentXMRMiner, Xmrig | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Process: | C:\Users\user\Desktop\windxcmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 654 |
Entropy (8bit): | 5.380476433908377 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT |
MD5: | 30E4BDFC34907D0E4D11152CAEBE27FA |
SHA1: | 825402D6B151041BA01C5117387228EC9B7168BF |
SHA-256: | A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63 |
SHA-512: | 89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\windxcmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40448 |
Entropy (8bit): | 5.6065495020412435 |
Encrypted: | false |
SSDEEP: | 768:yvDn5gHCJiQtTZeIAIxZH9oLIbtAW0xEtF5Pa9gveOwhI33Eab:YCHMlhZDAI6kN0xMFY9gmOw+UY |
MD5: | FBC06EB9F872988CF94EC59C859FACD7 |
SHA1: | B6DB9E916A0B5982C7EE5DF9417D58ABBD61808F |
SHA-256: | C1E467AC8B0AFE2AD9D5A1C5F24DB273345931C07B7E21A40ACD572C7E646BBE |
SHA-512: | DB447AEFBD7F536FBB7C9E89402AF8C76EBF9AB237557961109DF722E66776B5E02F39986B0BD4200254FCE19EE191F0CE2B1451737BA946E0F87BEDB0B8A201 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\windxcmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3491840 |
Entropy (8bit): | 7.809105520751368 |
Encrypted: | false |
SSDEEP: | 49152:zOzR/epSFnOne5uBwoqzCr4MnYrX6AXoZNM1Ho7Fif35uA+2c/8UdhbIJYkg4Huc:zOz0YMzwQ4nqqoYWy97c/TM5g4+K |
MD5: | A43BF335D87DF0128E7DA328C6A447B7 |
SHA1: | D65EB53BE51870AA31E1AB675F6AC7C8C6528F5C |
SHA-256: | 60AA4E15C2F974A4EBB9ADA3A90EC6A786C77FAA993A87572308F7F7A5E9B3B6 |
SHA-512: | C3446F80D932B54E0C9E527E9176658FA6B986E45D42DBF73E6652DF3FF0984E92E61D3E27CDCECDFFA75035E13CB3C0830A99078D47BE3DAD6CFB52971D1186 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.999409826341136 |
TrID: |
|
File name: | windxcmd.exe |
File size: | 3'542'528 bytes |
MD5: | 65f2df92724e59cabe9cc5f12768ad93 |
SHA1: | 6f21c66f2c529d37b046f53b04e3fd3baf91b13b |
SHA256: | bd5f54fa6a6b85d25c93c790c1b63f28f557cb7d9c1a79cbe702df30f6d0cc07 |
SHA512: | 59d5584d99401502babae333b85c68b39ca027710b19d27711b083526812593cdaca14c4e68f1b4f31daabbf1c8c7881e0ccd289567bd296fc7718f8dfed78f0 |
SSDEEP: | 98304:L/NSW1ks76/dzpo0XxEVDixT8tgbCfBIo:L/NShxp5+ViwgbB |
TLSH: | 3CF523482383B7C1E71A5BBF069633AAA544914ED9A156FE4534DB38E2241E33C353FB |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c.Cg..................6.........~"6.. ...@6...@.. ........................6...........@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x76227e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67431F63 [Sun Nov 24 12:43:15 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x362230 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x364000 | 0x4d8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x366000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x360284 | 0x360400 | 8d9927e2db3793dcbb2d20b9967edf54 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x364000 | 0x4d8 | 0x600 | f341932118d0526aec5c19047b4f8ba6 | False | 0.3743489583333333 | data | 3.726050043701057 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x366000 | 0xc | 0x200 | 995a71f3866ea5420b957cf65eb7cc7b | False | 0.044921875 | MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "6" | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x3640a0 | 0x244 | data | 0.4706896551724138 | ||
RT_MANIFEST | 0x3642e8 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:55:39.249985+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:55:39.835907+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:55:39.853925+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:55:53.369724+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:55:53.369724+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:55:53.712594+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:55:53.721542+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:07.602597+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:07.604708+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:21.492991+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:21.494597+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:23.378688+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:23.378688+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:34.178782+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:34.181270+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:39.806194+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:39.819371+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:40.060140+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:40.064715+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:40.353195+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:40.355122+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:53.395155+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:53.395155+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:53.729778+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:53.732407+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:56:55.462497+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:56:55.463889+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:01.101843+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:01.104528+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:11.367860+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:11.369689+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:16.240004+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:16.240251+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:16.243183+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:16.696188+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:16.697744+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:23.384551+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:23.384551+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:23.899550+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:23.902579+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:26.023750+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:26.025412+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:33.167704+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:33.753603+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:33.786962+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:46.399910+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:46.405091+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:53.040127+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:53.232690+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:57:53.406222+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:57:53.406222+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:06.929942+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:06.931814+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:11.399731+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:11.403104+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:11.653910+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:11.690822+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:11.925757+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:12.023345+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:23.432884+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:23.432884+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:24.462311+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:24.464680+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:26.902453+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:26.904844+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:27.274986+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:27.276607+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:33.181717+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:33.183692+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:36.745355+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:36.747499+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:37.196123+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:37.198005+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:47.164750+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:47.168451+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:52.150218+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:52.152210+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:53.438566+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:53.438566+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:54.492682+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:54.494066+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:56.674939+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:56.676874+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:57.852047+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:58.351879+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:58.353766+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:58:58.608295+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:58:58.609837+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:01.462519+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:01.464362+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:08.579608+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:08.581856+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:08.833416+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:08.838729+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:09.140205+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:11.633875+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:11.635684+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:18.821312+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:18.829686+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:20.104054+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:20.107542+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:23.444705+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:23.444705+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:23.745977+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:23.750177+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:24.196844+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:24.199688+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
2024-11-25T08:59:27.770571+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 45.141.26.134 | 7000 | 192.168.2.4 | 49734 | TCP |
2024-11-25T08:59:27.771330+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49734 | 45.141.26.134 | 7000 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 08:55:22.901902914 CET | 49732 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 25, 2024 08:55:23.021713018 CET | 80 | 49732 | 208.95.112.1 | 192.168.2.4 |
Nov 25, 2024 08:55:23.021816969 CET | 49732 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 25, 2024 08:55:23.022228003 CET | 49732 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 25, 2024 08:55:23.141724110 CET | 80 | 49732 | 208.95.112.1 | 192.168.2.4 |
Nov 25, 2024 08:55:24.118144035 CET | 80 | 49732 | 208.95.112.1 | 192.168.2.4 |
Nov 25, 2024 08:55:24.167500973 CET | 49732 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 25, 2024 08:55:25.150810957 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:25.270431042 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:25.270524979 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:25.359460115 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:25.480268002 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:39.249984980 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:39.369504929 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:39.835906982 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:39.853924990 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:39.973536015 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:53.137115002 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:53.256686926 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:53.369724035 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:53.417361975 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:53.712594032 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:55:53.721541882 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:55:53.841037989 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:07.027252913 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:07.146744013 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:07.602596998 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:07.604707956 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:07.724267006 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:09.119645119 CET | 80 | 49732 | 208.95.112.1 | 192.168.2.4 |
Nov 25, 2024 08:56:09.119740009 CET | 49732 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 25, 2024 08:56:20.917747021 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:21.037254095 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:21.492990971 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:21.494596958 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:21.734848976 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:23.378688097 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:23.433140039 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:33.602716923 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:33.722259045 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:34.178781986 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:34.181269884 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:34.300832033 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:39.230078936 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:39.350061893 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:39.350133896 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:39.469665051 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:39.806194067 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:39.819370985 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:39.938911915 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:40.060139894 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:40.064714909 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:40.184150934 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:40.353194952 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:40.355122089 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:40.474762917 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:53.152097940 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:53.271600962 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:53.395154953 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:53.438405037 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:53.729778051 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:53.732407093 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:53.852183104 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:54.855214119 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:54.975068092 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:55.462496996 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:56:55.463888884 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:56:55.583647966 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:00.526762009 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:00.646282911 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:01.101843119 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:01.104527950 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:01.224026918 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:04.153184891 CET | 49732 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 25, 2024 08:57:04.272717953 CET | 80 | 49732 | 208.95.112.1 | 192.168.2.4 |
Nov 25, 2024 08:57:10.792444944 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:10.911993027 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:11.367860079 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:11.369688988 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:11.489229918 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:15.276794910 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:15.396286964 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:16.091135025 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:16.240004063 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:16.240251064 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:16.240936041 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:16.241143942 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:16.243182898 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:16.362591982 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:16.696187973 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:16.697743893 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:16.817210913 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:23.324034929 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:23.384551048 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:23.443145990 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:23.443567991 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:23.899549961 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:23.902579069 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:24.022253990 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:25.448504925 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:25.568033934 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:26.023750067 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:26.025412083 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:26.145311117 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:33.167704105 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:33.287420034 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:33.753602982 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:33.786962032 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:33.906548977 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:45.823862076 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:45.943653107 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:46.399909973 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:46.405091047 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:46.524698973 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:52.464581013 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:52.584492922 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:53.040127039 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:53.213866949 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:53.232690096 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:57:53.352216005 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:53.406222105 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:57:53.510721922 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:06.354979992 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:06.474620104 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:06.929941893 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:06.931813955 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:07.051275969 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:10.823684931 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:10.944068909 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:10.980137110 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:11.099988937 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:11.100084066 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:11.219682932 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:11.399730921 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:11.403104067 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:11.522727013 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:11.653909922 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:11.690821886 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:11.810513973 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:11.925756931 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:12.012444973 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:12.023344994 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:12.144469023 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:23.432883978 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:23.510683060 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:23.886919022 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:24.006584883 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:24.462311029 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:24.464679956 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:24.584331036 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:26.326883078 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:26.447045088 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:26.450858116 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:26.570465088 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:26.902452946 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:26.904844046 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:27.024385929 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:27.274986029 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:27.276607037 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:27.396300077 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:32.606833935 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:32.726428986 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:33.181716919 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:33.183691978 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:33.303251028 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:36.168842077 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:36.289824963 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:36.621047020 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:36.740729094 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:36.745354891 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:36.747498989 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:36.907555103 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:37.196122885 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:37.198004961 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:37.317609072 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:46.589308023 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:46.708920002 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:47.164750099 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:47.168451071 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:47.288059950 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:51.574752092 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:51.694511890 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:52.150218010 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:52.152209997 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:52.271790028 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:53.438565969 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:53.654728889 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:53.917223930 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:54.036885023 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:54.492681980 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:54.494066000 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:54.613701105 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:56.073275089 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:56.193830013 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:56.674938917 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:56.676873922 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:56.796653032 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:57.276746035 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:57.396589041 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:57.776494980 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:57.852046967 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:57.896078110 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:57.896131992 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:58.015611887 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:58.351878881 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:58.353765965 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:58.473301888 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:58.608294964 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:58:58.609837055 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:58:58.729374886 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:00.886701107 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:01.006464958 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:01.462518930 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:01.464361906 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:01.584167004 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:07.995424986 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:08.115219116 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:08.115279913 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:08.234843969 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:08.234930992 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:08.355256081 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:08.579607964 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:08.581856012 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:08.702378988 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:08.833415985 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:08.838728905 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:08.958462000 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:09.136951923 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:09.140204906 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:09.260042906 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:09.260274887 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:09.380108118 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:11.058523893 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:11.178265095 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:11.633874893 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:11.635684013 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:11.755481005 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:18.246047020 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:18.365799904 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:18.821311951 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:18.829685926 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:18.949275017 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:19.510818005 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:19.630611897 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:20.104053974 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:20.107542038 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:20.227140903 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:23.090486050 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:23.214312077 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:23.444705009 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:23.560672998 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:23.621256113 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:23.740931034 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:23.745976925 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:23.750176907 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:23.911500931 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:24.196844101 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:24.199687958 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:24.322515965 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:27.195117950 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:27.314929962 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:27.770570993 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Nov 25, 2024 08:59:27.771330118 CET | 49734 | 7000 | 192.168.2.4 | 45.141.26.134 |
Nov 25, 2024 08:59:27.890924931 CET | 7000 | 49734 | 45.141.26.134 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 08:55:22.757508993 CET | 62824 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 25, 2024 08:55:22.896015882 CET | 53 | 62824 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 25, 2024 08:55:22.757508993 CET | 192.168.2.4 | 1.1.1.1 | 0x6f6c | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 25, 2024 08:55:22.896015882 CET | 1.1.1.1 | 192.168.2.4 | 0x6f6c | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49732 | 208.95.112.1 | 80 | 7456 | C:\Users\user\AppData\Roaming\svchost.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 25, 2024 08:55:23.022228003 CET | 80 | OUT | |
Nov 25, 2024 08:55:24.118144035 CET | 175 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:55:17 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\windxcmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xf00000 |
File size: | 3'542'528 bytes |
MD5 hash: | 65F2DF92724E59CABE9CC5F12768AD93 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 02:55:18 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\AppData\Roaming\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x300000 |
File size: | 40'448 bytes |
MD5 hash: | FBC06EB9F872988CF94EC59C859FACD7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 02:55:18 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\AppData\Roaming\wind.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x1cd8cab0000 |
File size: | 3'491'840 bytes |
MD5 hash: | A43BF335D87DF0128E7DA328C6A447B7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 02:55:24 |
Start date: | 25/11/2024 |
Path: | C:\Windows\System32\schtasks.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76f990000 |
File size: | 235'008 bytes |
MD5 hash: | 76CD6626DD8834BD4A42E6A565104DC2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:55:24 |
Start date: | 25/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B6110ED Relevance: .4, Instructions: 426COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B6109F7 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B610498 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B610E71 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B6104B0 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B6104A8 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B610F3F Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 21.8% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 23.1% |
Total number of Nodes: | 13 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B605776 Relevance: .5, Instructions: 472COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B606522 Relevance: .5, Instructions: 458COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B601631 Relevance: .4, Instructions: 395COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B6316C3 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B631543 Relevance: .2, Instructions: 156COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B631D07 Relevance: .1, Instructions: 115COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B631173 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B6307B5 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B630935 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B630888 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|