Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 4, 2021, 11:07 a.m. | May 4, 2021, 11:17 a.m. |
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /pid 2196 & erase C:\Users\test22\AppData\Local\Temp\LFI_874_103_116.exe & RD /S /Q C:\\ProgramData\\939833468218216\\* & exit
2668-
taskkill.exe taskkill /pid 2196
1896
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1848
Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/6.jpg | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/1.jpg | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/2.jpg | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/3.jpg | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/4.jpg | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/5.jpg | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/7.jpg | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/main.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://205.185.120.57/ |
request | POST http://205.185.120.57/6.jpg |
request | POST http://205.185.120.57/1.jpg |
request | POST http://205.185.120.57/2.jpg |
request | POST http://205.185.120.57/3.jpg |
request | POST http://205.185.120.57/4.jpg |
request | POST http://205.185.120.57/5.jpg |
request | POST http://205.185.120.57/7.jpg |
request | POST http://205.185.120.57/main.php |
request | POST http://205.185.120.57/ |
request | POST http://205.185.120.57/6.jpg |
request | POST http://205.185.120.57/1.jpg |
request | POST http://205.185.120.57/2.jpg |
request | POST http://205.185.120.57/3.jpg |
request | POST http://205.185.120.57/4.jpg |
request | POST http://205.185.120.57/5.jpg |
request | POST http://205.185.120.57/7.jpg |
request | POST http://205.185.120.57/main.php |
request | POST http://205.185.120.57/ |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Local State |
file | C:\Users\test22\AppData\Local\Nichrome\User Data\Local State |
file | C:\ProgramData\sqlite3.dll |
file | C:\ProgramData\freebl3.dll |
file | C:\ProgramData\msvcp140.dll |
file | C:\ProgramData\nss3.dll |
file | C:\ProgramData\vcruntime140.dll |
file | C:\ProgramData\mozglue.dll |
file | C:\ProgramData\softokn3.dll |
cmdline | cmd.exe /c taskkill /pid 2196 & erase C:\Users\test22\AppData\Local\Temp\LFI_874_103_116.exe & RD /S /Q C:\\ProgramData\\939833468218216\\* & exit |
cmdline | "C:\Windows\System32\cmd.exe" /c taskkill /pid 2196 & erase C:\Users\test22\AppData\Local\Temp\LFI_874_103_116.exe & RD /S /Q C:\\ProgramData\\939833468218216\\* & exit |
file | C:\Users\test22\AppData\Local\Temp\LFI_874_103_116.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( ProcessId = 2196) |