Windows Analysis Report 01_extracted.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
Threatname: NanoCore |
---|
{"Version": "1.2.2.0", "Mutex": "af905a54-91e0-44a6-90a1-2d1125da", "Group": "septe123", "Domain1": "sunnysept.duckdns.org", "Domain2": "sunnysept.duckdns.org", "Port": 5500, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
Yara Overview |
---|
Initial Sample |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Nanocore_RAT_Gen_2 | Detetcs the Nanocore RAT | Florian Roth |
| |
Nanocore_RAT_Feb18_1 | Detects Nanocore RAT | Florian Roth |
| |
JoeSecurity_Nanocore | Yara detected Nanocore RAT | Joe Security | ||
NanoCore | unknown | Kevin Breen <kevin@techanarchy.net> |
|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Nanocore_RAT_Gen_2 | Detetcs the Nanocore RAT | Florian Roth |
| |
JoeSecurity_Nanocore | Yara detected Nanocore RAT | Joe Security | ||
NanoCore | unknown | Kevin Breen <kevin@techanarchy.net> |
| |
Nanocore_RAT_Gen_2 | Detetcs the Nanocore RAT | Florian Roth |
| |
JoeSecurity_Nanocore | Yara detected Nanocore RAT | Joe Security | ||
Click to see the 1 entries |
Unpacked PEs |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Nanocore_RAT_Gen_2 | Detetcs the Nanocore RAT | Florian Roth |
| |
Nanocore_RAT_Feb18_1 | Detects Nanocore RAT | Florian Roth |
| |
JoeSecurity_Nanocore | Yara detected Nanocore RAT | Joe Security | ||
NanoCore | unknown | Kevin Breen <kevin@techanarchy.net> |
|
Sigma Overview |
---|
AV Detection: |
---|
Sigma detected: NanoCore | Show sources |
Source: | Author: Joe Security: |
E-Banking Fraud: |
---|
Sigma detected: NanoCore | Show sources |
Source: | Author: Joe Security: |
Stealing of Sensitive Information: |
---|
Sigma detected: NanoCore | Show sources |
Source: | Author: Joe Security: |
Remote Access Functionality: |
---|
Sigma detected: NanoCore | Show sources |
Source: | Author: Joe Security: |
Jbx Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample | Show sources |
Source: | Avira: |
Found malware configuration | Show sources |
Source: | Malware Configuration Extractor: |
Yara detected Nanocore RAT | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Machine Learning detection for sample | Show sources |
Source: | Joe Sandbox ML: |
Source: | Avira: |
Source: | Static PE information: |
Source: | File opened: |
Networking: |
---|
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) | Show sources |
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
C2 URLs / IPs found in malware configuration | Show sources |
Source: | URLs: |
Uses dynamic DNS services | Show sources |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | DNS traffic detected: |
E-Banking Fraud: |
---|
Yara detected Nanocore RAT | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary: |
---|
Malicious sample detected (through community Yara rule) | Show sources |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | File opened: |
Source: | Static PE information: |
Source: | File opened: |
Data Obfuscation: |
---|
.NET source code contains potential unpacker | Show sources |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Hooking and other Techniques for Hiding and Protection: |
---|
Hides that the sample has been downloaded from the Internet (zone.identifier) | Show sources |
Source: | File opened: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Last function: |
Source: | Thread delayed: |
Source: | Process information queried: |
Source: | Thread delayed: |
Source: | Process token adjusted: |
Source: | Memory allocated: |
Source: | Key value queried: |
Stealing of Sensitive Information: |
---|
Yara detected Nanocore RAT | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality: |
---|
Yara detected Nanocore RAT | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Detected Nanocore Rat | Show sources |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Masquerading1 | OS Credential Dumping | Process Discovery1 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Non-Standard Port1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Disable or Modify Tools1 | LSASS Memory | Virtualization/Sandbox Evasion21 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Remote Access Software1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Virtualization/Sandbox Evasion21 | Security Account Manager | Application Window Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Non-Application Layer Protocol1 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Deobfuscate/Decode Files or Information1 | NTDS | System Information Discovery2 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol21 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Hidden Files and Directories1 | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Software Packing12 | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Dropper.MSIL.Gen7 | ||
100% | Joe Sandbox ML |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Dropper.MSIL.Gen7 | Download File |
Domains |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
2% | Virustotal | Browse |
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
2% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sunnysept.duckdns.org | 194.147.140.14 | true | true |
| unknown |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
194.147.140.14 | sunnysept.duckdns.org | unknown | 47285 | PTPEU | true |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 483429 |
Start date: | 15.09.2021 |
Start time: | 00:26:08 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | 01_extracted.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/2@22/1 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
00:27:00 | API Interceptor |
Joe Sandbox View / Context |
---|
IPs |
---|
No context |
---|
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
sunnysept.duckdns.org | Get hash | malicious | Browse |
|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
PTPEU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Users\user\Desktop\01_extracted.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1160 |
Entropy (8bit): | 7.089541637477408 |
Encrypted: | false |
SSDEEP: | 24:IQnybgC4jh+dQnybgC4jh+dQnybgC4jh+dQnybgC4jh+dQnybgC4jh+K:IknjhUknjhUknjhUknjhUknjhL |
MD5: | 7BEBBE1F1511163A3243CD8E0C75CC69 |
SHA1: | 216B3AB5D802FA037A6EC5348B189398D8980B3C |
SHA-256: | 79A130865E9EFFFAA6C2E453942CE87F652681BCD76AAF987318300CAF5E3778 |
SHA-512: | 4DCCB32411DEF72C938022B8675DA50B2DC4CD2C051B1C0377F63D6AAC42FC3D128B0ED580FB88954AB04A9E9EC8D272EBCCF74EB3F136BEF41ADBB845A1A530 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Users\user\Desktop\01_extracted.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8 |
Entropy (8bit): | 3.0 |
Encrypted: | false |
SSDEEP: | 3:c:c |
MD5: | 315CCD3669C58A3177FFB7D0189A1EEF |
SHA1: | 678EF06864D26881E2DB1B9511A32B56CF988F3A |
SHA-256: | FFA8198F332474004817F0E82E3C209AF881FCDF52F51F30497A6AE6BFB37866 |
SHA-512: | D9FD615BE3D8AFEC18151D0CE055602C346F1525FD8ECBCA47B6D204FAC13DCD821B385B46DFC39CE5B3BDEFB23D7E75DB6F583505A31CC412F473B1C05E7E4E |
Malicious: | true |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.446133348432718 |
TrID: |
|
File name: | 01_extracted.exe |
File size: | 207360 |
MD5: | 59f356092b9f54b4ee5563a2fb8a3255 |
SHA1: | 252ee78cd1597581b9dc14253a77526ef344af38 |
SHA256: | 2206669cc770b99bfdcc44079e5f218a3b4161c7c973f652d6a497a58031bf1d |
SHA512: | 7043f238357ef4d13c4ebd4c21371173157332547ccf0777594fcdcc566f78f865850a28fabb43ee23f24b26bbf03ed3ee0ea03b299c1565313db623ccbfc128 |
SSDEEP: | 6144:gLV6Bta6dtJmakIM5wq+HjVCuSj2OjrtJrIOXu:gLV6BtpmkNq+DVcH85 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. ..................................................................... |
File Icon |
---|
Icon Hash: | 00828e8e8686b000 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x41e792 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v2.0.50727 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Entrypoint Preview |
---|
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1e738 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x22000 | 0x15d90 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x20000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x1c798 | 0x1c800 | False | 0.594503837719 | data | 6.5980706265 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.reloc | 0x20000 | 0xc | 0x200 | False | 0.044921875 | data | 0.101910425663 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x22000 | 0x15d90 | 0x15e00 | False | 0.999732142857 | data | 7.99777392121 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_RCDATA | 0x22058 | 0x15d38 | TIM image, (48492,12466) |
Imports |
---|
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
09/15/21-00:27:02.076627 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 50200 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:27:02.354546 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:07.400195 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 51281 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:27:07.631437 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49734 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:12.383586 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 49199 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:27:12.611541 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:17.744080 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:23.140472 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:28.739254 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:34.478410 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49745 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:39.773403 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 65110 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:27:39.998463 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49746 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:45.423084 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49767 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:50.997919 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49773 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:27:56.021163 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49774 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:02.027049 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49777 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:07.677320 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 49563 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:28:08.684677 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49783 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:15.052658 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49786 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:21.468840 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49787 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:28.077642 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 57084 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:28:28.305043 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49788 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:35.011567 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 57568 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:28:35.239451 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49790 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:41.718002 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49795 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:48.005439 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 55435 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:28:48.231608 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49797 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:28:54.654295 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49798 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:29:00.711953 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 56132 | 8.8.8.8 | 192.168.2.3 |
09/15/21-00:29:00.938829 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49799 | 5500 | 192.168.2.3 | 194.147.140.14 |
09/15/21-00:29:07.032341 | TCP | 2025019 | ET TROJAN Possible NanoCore C2 60B | 49800 | 5500 | 192.168.2.3 | 194.147.140.14 |
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 15, 2021 00:27:02.087652922 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:02.312653065 CEST | 5500 | 49733 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:02.312792063 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:02.354546070 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:02.632098913 CEST | 5500 | 49733 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:02.632209063 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:02.835180044 CEST | 5500 | 49733 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:02.835506916 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:02.914844990 CEST | 5500 | 49733 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:02.915138006 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:03.021835089 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:03.059214115 CEST | 5500 | 49733 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:03.059271097 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:03.194070101 CEST | 5500 | 49733 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:03.194232941 CEST | 49733 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:07.404175043 CEST | 49734 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:07.630057096 CEST | 5500 | 49734 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:07.630222082 CEST | 49734 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:07.631437063 CEST | 49734 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:07.898245096 CEST | 5500 | 49734 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:07.898408890 CEST | 49734 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:08.021995068 CEST | 49734 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:08.166990995 CEST | 5500 | 49734 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:08.167257071 CEST | 49734 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:12.386518955 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:12.610210896 CEST | 5500 | 49735 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:12.610375881 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:12.611541033 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:12.897222996 CEST | 5500 | 49735 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:12.897310019 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:13.069019079 CEST | 5500 | 49735 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:13.069168091 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:13.179615021 CEST | 5500 | 49735 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:13.180906057 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:13.240910053 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:13.292944908 CEST | 5500 | 49735 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:13.294959068 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:13.460134983 CEST | 5500 | 49735 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:13.460298061 CEST | 49735 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:17.519107103 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:17.742636919 CEST | 5500 | 49736 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:17.742877960 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:17.744080067 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:18.022598028 CEST | 5500 | 49736 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:18.022763968 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:18.303188086 CEST | 5500 | 49736 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:18.303390026 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:18.306282997 CEST | 5500 | 49736 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:18.306436062 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:18.528666019 CEST | 5500 | 49736 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:18.528908968 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:18.584222078 CEST | 5500 | 49736 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:18.741544008 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:18.752623081 CEST | 5500 | 49736 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:18.752809048 CEST | 49736 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:22.913896084 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:23.137590885 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:23.139857054 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:23.140471935 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:23.412609100 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:23.413749933 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:23.696033001 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:23.696188927 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:23.737236023 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:23.737422943 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:23.960838079 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:23.961071968 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:24.100568056 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:24.100753069 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:24.240279913 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:24.240411043 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:24.304337025 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:24.324481010 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:24.324642897 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:24.521557093 CEST | 5500 | 49737 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:24.521682024 CEST | 49737 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:28.514481068 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:28.738651037 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:28.738778114 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:28.739253998 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:29.022232056 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:29.022490025 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:29.234245062 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:29.234370947 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:29.287017107 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:29.290369987 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:29.513585091 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:29.514445066 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:29.518325090 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:29.569633961 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:29.738221884 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:29.738471031 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:29.898152113 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:30.023263931 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:30.026415110 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
Sep 15, 2021 00:27:30.029808044 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:30.029836893 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:30.029861927 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:30.029885054 CEST | 5500 | 49744 | 194.147.140.14 | 192.168.2.3 |
Sep 15, 2021 00:27:30.029921055 CEST | 49744 | 5500 | 192.168.2.3 | 194.147.140.14 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 15, 2021 00:26:54.170667887 CEST | 60985 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:26:54.207604885 CEST | 53 | 60985 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:01.947751045 CEST | 50200 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:02.076627016 CEST | 53 | 50200 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:07.272417068 CEST | 51281 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:07.400194883 CEST | 53 | 51281 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:12.254900932 CEST | 49199 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:12.383585930 CEST | 53 | 49199 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:17.482837915 CEST | 50620 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:17.516397953 CEST | 53 | 50620 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:22.885296106 CEST | 64938 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:22.912415028 CEST | 53 | 64938 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:25.565556049 CEST | 60152 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:25.609678984 CEST | 53 | 60152 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:25.988378048 CEST | 57544 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:26.024219036 CEST | 53 | 57544 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:28.477812052 CEST | 55984 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:28.513227940 CEST | 53 | 55984 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:34.172791004 CEST | 64185 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:34.251058102 CEST | 53 | 64185 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:39.649972916 CEST | 65110 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:39.773402929 CEST | 53 | 65110 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:40.543015003 CEST | 58361 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:40.586541891 CEST | 53 | 58361 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:45.167210102 CEST | 63492 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:45.197247028 CEST | 53 | 63492 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:50.734563112 CEST | 60831 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:50.770559072 CEST | 53 | 60831 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:27:55.767343998 CEST | 60100 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:27:55.794513941 CEST | 53 | 60100 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:01.209887981 CEST | 53195 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:01.254210949 CEST | 53 | 53195 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:01.768517017 CEST | 50141 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:01.800992966 CEST | 53 | 50141 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:04.530802011 CEST | 53023 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:04.567562103 CEST | 53 | 53023 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:07.552164078 CEST | 49563 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:07.677320004 CEST | 53 | 49563 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:14.785747051 CEST | 51352 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:14.822325945 CEST | 53 | 51352 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:21.204571962 CEST | 59349 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:21.239867926 CEST | 53 | 59349 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:27.949857950 CEST | 57084 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:28.077641964 CEST | 53 | 57084 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:34.182403088 CEST | 58823 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:34.260754108 CEST | 53 | 58823 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:34.886750937 CEST | 57568 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:35.011567116 CEST | 53 | 57568 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:35.031457901 CEST | 50540 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:35.067050934 CEST | 53 | 50540 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:39.408174992 CEST | 54366 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:39.448267937 CEST | 53 | 54366 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:41.205141068 CEST | 53034 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:41.248573065 CEST | 53 | 53034 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:41.456763029 CEST | 57762 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:41.491748095 CEST | 53 | 57762 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:47.879156113 CEST | 55435 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:48.005439043 CEST | 53 | 55435 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:28:54.399796963 CEST | 50713 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:28:54.427526951 CEST | 53 | 50713 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:29:00.587172031 CEST | 56132 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:29:00.711952925 CEST | 53 | 56132 | 8.8.8.8 | 192.168.2.3 |
Sep 15, 2021 00:29:06.781688929 CEST | 58987 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 15, 2021 00:29:06.808100939 CEST | 53 | 58987 | 8.8.8.8 | 192.168.2.3 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Sep 15, 2021 00:27:01.947751045 CEST | 192.168.2.3 | 8.8.8.8 | 0x369f | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:07.272417068 CEST | 192.168.2.3 | 8.8.8.8 | 0x673 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:12.254900932 CEST | 192.168.2.3 | 8.8.8.8 | 0x55cf | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:17.482837915 CEST | 192.168.2.3 | 8.8.8.8 | 0x3be6 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:22.885296106 CEST | 192.168.2.3 | 8.8.8.8 | 0x18e9 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:28.477812052 CEST | 192.168.2.3 | 8.8.8.8 | 0xc3fb | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:34.172791004 CEST | 192.168.2.3 | 8.8.8.8 | 0xd60b | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:39.649972916 CEST | 192.168.2.3 | 8.8.8.8 | 0xd20 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:45.167210102 CEST | 192.168.2.3 | 8.8.8.8 | 0x7879 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:50.734563112 CEST | 192.168.2.3 | 8.8.8.8 | 0x7d4f | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:27:55.767343998 CEST | 192.168.2.3 | 8.8.8.8 | 0x7772 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:01.768517017 CEST | 192.168.2.3 | 8.8.8.8 | 0x5cc8 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:07.552164078 CEST | 192.168.2.3 | 8.8.8.8 | 0x12e5 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:14.785747051 CEST | 192.168.2.3 | 8.8.8.8 | 0xfdc0 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:21.204571962 CEST | 192.168.2.3 | 8.8.8.8 | 0x114a | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:27.949857950 CEST | 192.168.2.3 | 8.8.8.8 | 0xe839 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:34.886750937 CEST | 192.168.2.3 | 8.8.8.8 | 0x10c6 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:41.456763029 CEST | 192.168.2.3 | 8.8.8.8 | 0x3859 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:47.879156113 CEST | 192.168.2.3 | 8.8.8.8 | 0x36fb | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:28:54.399796963 CEST | 192.168.2.3 | 8.8.8.8 | 0xd1d0 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:29:00.587172031 CEST | 192.168.2.3 | 8.8.8.8 | 0x1acf | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 15, 2021 00:29:06.781688929 CEST | 192.168.2.3 | 8.8.8.8 | 0x4c4d | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Sep 15, 2021 00:27:02.076627016 CEST | 8.8.8.8 | 192.168.2.3 | 0x369f | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:07.400194883 CEST | 8.8.8.8 | 192.168.2.3 | 0x673 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:12.383585930 CEST | 8.8.8.8 | 192.168.2.3 | 0x55cf | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:17.516397953 CEST | 8.8.8.8 | 192.168.2.3 | 0x3be6 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:22.912415028 CEST | 8.8.8.8 | 192.168.2.3 | 0x18e9 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:28.513227940 CEST | 8.8.8.8 | 192.168.2.3 | 0xc3fb | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:34.251058102 CEST | 8.8.8.8 | 192.168.2.3 | 0xd60b | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:39.773402929 CEST | 8.8.8.8 | 192.168.2.3 | 0xd20 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:45.197247028 CEST | 8.8.8.8 | 192.168.2.3 | 0x7879 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:50.770559072 CEST | 8.8.8.8 | 192.168.2.3 | 0x7d4f | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:27:55.794513941 CEST | 8.8.8.8 | 192.168.2.3 | 0x7772 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:01.800992966 CEST | 8.8.8.8 | 192.168.2.3 | 0x5cc8 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:07.677320004 CEST | 8.8.8.8 | 192.168.2.3 | 0x12e5 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:14.822325945 CEST | 8.8.8.8 | 192.168.2.3 | 0xfdc0 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:21.239867926 CEST | 8.8.8.8 | 192.168.2.3 | 0x114a | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:28.077641964 CEST | 8.8.8.8 | 192.168.2.3 | 0xe839 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:35.011567116 CEST | 8.8.8.8 | 192.168.2.3 | 0x10c6 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:41.491748095 CEST | 8.8.8.8 | 192.168.2.3 | 0x3859 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:48.005439043 CEST | 8.8.8.8 | 192.168.2.3 | 0x36fb | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:28:54.427526951 CEST | 8.8.8.8 | 192.168.2.3 | 0xd1d0 | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:29:00.711952925 CEST | 8.8.8.8 | 192.168.2.3 | 0x1acf | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) | ||
Sep 15, 2021 00:29:06.808100939 CEST | 8.8.8.8 | 192.168.2.3 | 0x4c4d | No error (0) | 194.147.140.14 | A (IP address) | IN (0x0001) |
Code Manipulations |
---|
Statistics |
---|
System Behavior |
---|
General |
---|
Start time: | 00:26:59 |
Start date: | 15/09/2021 |
Path: | C:\Users\user\Desktop\01_extracted.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x260000 |
File size: | 207360 bytes |
MD5 hash: | 59F356092B9F54B4EE5563A2FB8A3255 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Yara matches: |
|
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|