Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 27, 2021, 5:53 p.m. | July 27, 2021, 6:02 p.m. |
-
-
taskkill.exe Taskkill /F /IM DbSecuritySpt.exe
2216 -
taskkill.exe Taskkill /F /IM Bill.exe
2332 -
taskkill.exe Taskkill /F /IM svch0st.exe
2476
-
Name | Response | Post-Analysis Lookup |
---|---|---|
cao.300gsyn.it | 216.83.33.79 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
resource name | EXE |
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 |
file | C:\Program Files\DbSecuritySpt\DbSecuritySpt.exe |
file | C:\Program Files\DbSecuritySpt\Packet.dll |
file | C:\Program Files\DbSecuritySpt\SESDKDummy64.dll |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "DbSecuritySpt.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "svch0st.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "Bill.exe") |
cmdline | Taskkill /F /IM svch0st.exe |
cmdline | Taskkill /F /IM DbSecuritySpt.exe |
cmdline | Taskkill /F /IM Bill.exe |
service_name | NPF | service_path | C:\Program Files\DbSecuritySpt\npf.sys | ||||||
service_name | DbSecuritySpt | service_path | C:\Program Files\DbSecuritySpt\DbSecuritySpt.exe |
file | C:\Program Files\DbSecuritySpt\Packet.dll |
file | C:\Program Files\DbSecuritySpt\npf.sys |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Reconyc.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Agent.CGMR |
CAT-QuickHeal | Trojan.WebToos.S18562 |
ALYac | Trojan.Agent.CGMR |
Cylance | Unsafe |
Zillya | Rootkit.Agent.Win32.15968 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | RootKit ( 0055e3fe1 ) |
Alibaba | Malware:Win32/Dorpal.ali1000029 |
K7GW | RootKit ( 0055e3fe1 ) |
Cybereason | malicious.90df7e |
Baidu | Win32.Rootkit.Agent.at |
Cyren | W32/WebToos.B.gen!Eldorado |
Symantec | SMG.Heur!gen |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Trojan.Gadoopt-2 |
Kaspersky | Trojan.Win32.Reconyc.esql |
BitDefender | Trojan.Agent.CGMR |
NANO-Antivirus | Trojan.Win32.Reconyc.exhhog |
ViRobot | Backdoor.Win32.Agent.1315840.A |
Avast | Win32:Prockill-A [Rtk] |
Tencent | Malware.Win32.Gencirc.10b54e8b |
Ad-Aware | Trojan.Agent.CGMR |
TACHYON | Trojan/W32.Rootkit.1315840 |
Sophos | Mal/Generic-R |
DrWeb | BackDoor.Gates.8 |
VIPRE | Trojan.Win32.Generic!BT |
TrendMicro | TROJ_WEBTOOS.SM |
McAfee-GW-Edition | BehavesLike.Win32.Generic.th |
FireEye | Generic.mg.36efb3390df7e6ec |
Emsisoft | Trojan.Agent.CGMR (B) |
Ikarus | Backdoor.Win32.Agent |
Jiangmin | Trojan/Reconyc.eyd |
Avira | TR/Agent.14016.2 |
Antiy-AVL | Trojan/Generic.ASMalwS.A3CBB3 |
Kingsoft | Win32.Troj.Reconyc.es.(kcloud) |
Microsoft | Trojan:Win32/WebToos.A |
SUPERAntiSpyware | Trojan.Agent/Gen-Backdoor |
ZoneAlarm | Trojan.Win32.Reconyc.esql |
GData | Trojan.Agent.CGMR |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win32.Webtoos.C1040590 |
McAfee | GenericRXDY-OY!36EFB3390DF7 |
MAX | malware (ai score=100) |
VBA32 | BScope.Trojan.Nagyo |
Malwarebytes | Trojan.WebToos |