Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 3, 2021, 9:18 a.m. | July 3, 2021, 9:22 a.m. |
-
-
-
-
-
findstr.exe findstr /V /R "^LXmKJkIvUqYCaDklbWMYErRVBHqPzfiGpAvAJJQodEWOpuhtYKCIpGYHyDpekTrFTszRuLBNuEIZirLxzWRIMnbCBPxymNWvBsVRNvXjpPCEYZAeSPJfwcT$" Sbigottito.wma
4788 -
-
Accompagna.exe.com C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Accompagna.exe.com H
7424
-
-
PING.EXE ping 127.0.0.1 -n 30
6916
-
-
-
-
4.exe "C:\Users\test22\AppData\Local\Temp\New Feature\4.exe"
5236
-
Name | Response | Post-Analysis Lookup |
---|---|---|
d2js2viceajwla.cloudfront.net |
AAAA
2600:9000:2139:e400:11:6feb:6f80:93a1
AAAA
2600:9000:2139:d800:11:6feb:6f80:93a1
AAAA
2600:9000:2139:6a00:11:6feb:6f80:93a1
AAAA
2600:9000:2139:b000:11:6feb:6f80:93a1
AAAA
2600:9000:2139:ee00:11:6feb:6f80:93a1
AAAA
2600:9000:2139:4e00:11:6feb:6f80:93a1
AAAA
2600:9000:2139:e600:11:6feb:6f80:93a1
AAAA
2600:9000:2139:1600:11:6feb:6f80:93a1
|
99.86.202.75 |
aus.thunderbird.net | 99.86.202.125 | |
WYEnXVSECgshKtHcubAXXu.WYEnXVSECgshKtHcubAXXu | ||
prod.balrog.prod.cloudops.mozgcp.net | 35.244.181.201 | |
d2js2viceajwla.cloudfront.net | 99.86.202.75 | |
aus5.mozilla.org | 35.244.181.201 | |
prod.balrog.prod.cloudops.mozgcp.net | 35.244.181.201 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.102:49334 99.86.202.75:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=thunderbird.net | dd:92:a0:f3:c5:f2:3a:c7:42:66:30:75:8a:b3:b3:03:6b:8c:df:9d |
TLS 1.2 192.168.56.102:49335 35.244.181.201:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=California, L=Mountain View, O=Mozilla Corporation, CN=aus5.mozilla.org | 37:1a:8a:6e:ae:e7:b7:ae:1f:a9:c0:87:53:e5:a0:94:ef:0b:de:0c |
section | .ndata |
file | C:\Users\test22\AppData\Local\Temp\nsfB0AC.tmp\UAC.dll |
file | C:\Program Files (x86)\foler\olader\acppage.dll |
file | C:\Users\test22\AppData\Local\Temp\New Feature\vpn.exe |
file | C:\Program Files (x86)\foler\olader\acledit.dll |
file | C:\Program Files (x86)\foler\olader\adprovider.dll |
file | C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Accompagna.exe.com |
file | C:\Users\test22\AppData\Local\Temp\New Feature\4.exe |
cmdline | "C:\Windows\System32\cmd.exe" /c cmd < Sussulto.wma |
file | C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Accompagna.exe.com |
file | C:\Users\test22\AppData\Local\Temp\nsfB0AC.tmp\UAC.dll |
file | C:\Users\test22\AppData\Local\Temp\New Feature\4.exe |
file | C:\Users\test22\AppData\Local\Temp\New Feature\vpn.exe |
file | C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Accompagna.exe.com |
url | http://www.microsoft.com/schemas/ie8tldlistdescription/1.0 |
url | http://purl.org/rss/1.0/ |
url | http://www.passport.com |
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Hijack network configuration | rule | Hijack_Network | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Install itself for autorun at Windows startup | rule | Persistence |
cmdline | ping 127.0.0.1 -n 30 |
host | 99.86.144.100 | |||
host | 99.86.144.46 | |||
host | 99.86.144.61 | |||
host | 99.86.144.82 |
file | C:\ProgramData\AVAST Software |
file | C:\ProgramData\AVG |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Doina.10795 |
FireEye | Gen:Variant.Doina.10795 |
ALYac | Gen:Variant.Doina.10795 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0057da551 ) |
K7GW | Trojan ( 0057da551 ) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Avast | Win32:Trojan-gen |
ClamAV | Win.Packed.Filerepmalware-9864117-0 |
Kaspersky | Trojan.Win32.Crypzip.ou |
BitDefender | Gen:Variant.Doina.10795 |
Tencent | Win32.Trojan-qqpass.Qqrob.Lkxr |
Ad-Aware | Gen:Variant.Doina.10795 |
Sophos | Mal/Generic-R + Troj/Agent-BHFT |
DrWeb | BAT.Drop.2756 |
TrendMicro | TROJ_GEN.R06CC0DG221 |
McAfee-GW-Edition | BehavesLike.Win32.FakeRena.tc |
Emsisoft | Trojan.Crypt (A) |
MAX | malware (ai score=82) |
Microsoft | Trojan:Win32/Glupteba.QV!MTB |
GData | Gen:Variant.Doina.10795 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.Generic.C4493298 |
McAfee | GenericRXAA-FA!35B76B818730 |
VBA32 | Malware-Cryptor.InstallCore.6 |
Malwarebytes | Malware.AI.2177412044 |
Rising | Trojan.Kryptik!1.D7CF (CLASSIC) |
BitDefenderTheta | Gen:NN.ZexaF.34790.cr3@aWAVf8ok |
AVG | Win32:Trojan-gen |
Cybereason | malicious.c59907 |
Panda | Trj/CI.A |