Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 12, 2021, 9:40 a.m. | July 12, 2021, 9:52 a.m. |
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im bat_english.exe /f & timeout /t 6 & del /f /q "C:\Users\test22\AppData\Local\Temp\bat_english.exe" & del C:\ProgramData\*.dll & exit
2680-
taskkill.exe taskkill /im bat_english.exe /f
2740 -
timeout.exe timeout /t 6
2848
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
sergeevih43.tumblr.com | 74.114.154.22 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
section | |
section | eda deer |
section | .themida |
section | .loadcon |
section | .boot |
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://162.55.223.232/947 | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://162.55.223.232/freebl3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://162.55.223.232/mozglue.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://162.55.223.232/msvcp140.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://162.55.223.232/nss3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://162.55.223.232/softokn3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://162.55.223.232/vcruntime140.dll | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://162.55.223.232/ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://sergeevih43.tumblr.com/ |
request | POST http://162.55.223.232/947 |
request | GET http://162.55.223.232/freebl3.dll |
request | GET http://162.55.223.232/mozglue.dll |
request | GET http://162.55.223.232/msvcp140.dll |
request | GET http://162.55.223.232/nss3.dll |
request | GET http://162.55.223.232/softokn3.dll |
request | GET http://162.55.223.232/vcruntime140.dll |
request | POST http://162.55.223.232/ |
request | GET https://sergeevih43.tumblr.com/ |
request | POST http://162.55.223.232/947 |
request | POST http://162.55.223.232/ |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Local State |
file | C:\Users\test22\AppData\Local\Nichrome\User Data\Local State |
file | C:\ProgramData\freebl3.dll |
file | C:\ProgramData\msvcp140.dll |
file | C:\ProgramData\nss3.dll |
file | C:\ProgramData\vcruntime140.dll |
file | C:\ProgramData\mozglue.dll |
file | C:\ProgramData\softokn3.dll |
cmdline | "C:\Windows\System32\cmd.exe" /c taskkill /im bat_english.exe /f & timeout /t 6 & del /f /q "C:\Users\test22\AppData\Local\Temp\bat_english.exe" & del C:\ProgramData\*.dll & exit |
cmdline | C:\Windows\System32\cmd.exe /c taskkill /im bat_english.exe /f & timeout /t 6 & del /f /q "C:\Users\test22\AppData\Local\Temp\bat_english.exe" & del C:\ProgramData\*.dll & exit |
file | C:\Users\test22\AppData\Local\Temp\bat_english.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "bat_english.exe") |