Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 30, 2021, 10:57 a.m. | July 30, 2021, 11:05 a.m. |
-
-
-
cmd.exe cmd /c ""C:\Users\test22\AppData\Local\Temp\944A.tmp\Update.bat" "C:\Users\test22\AppData\Local\Temp\Update.exe""
2664-
dC_v13_Scrypt.exe dC_v13_Scrypt.exe -pOWgAUV8kbH7KBETghv5LwESz8Uv13 -dC:\Users\test22\AppData\Local\Temp
2936-
-
cmd.exe cmd /c ""C:\Users\test22\AppData\Local\Temp\E94F.tmp\DFCTRL1_9.bat" "C:\Users\test22\AppData\Local\Temp\DFCTRL1_9.exe""
2020-
-
dControl.exe DFCTRL1_9\dControl.exe /D
2288
-
-
-
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb |
section | .didat |
resource name | PNG |
file | C:\Users\test22\AppData\Local\Temp\NSudo\NSudoLC.exe |
file | C:\Users\test22\AppData\Local\Temp\dC_v13_Scrypt.exe |
file | C:\Users\test22\AppData\Local\Temp\DFCTRL1_9.exe |
file | C:\Users\test22\AppData\Local\Temp\Update.exe |
file | C:\Users\test22\AppData\Local\Temp\NSudo\NSudoLG.exe |
file | C:\Users\test22\AppData\Local\Temp\DFCTRL1_9\dControl.exe |
file | C:\Users\test22\AppData\Local\Temp\944A.tmp\Update.bat |
file | C:\Users\test22\AppData\Local\Temp\E94F.tmp\DFCTRL1_9.bat |
file | C:\Users\test22\AppData\Local\Temp\DFCTRL1_9\dControl.exe |
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | C:\Users\test22\AppData\Local\Temp\E94F.tmp\DFCTRL1_9.bat "C:\Users\test22\AppData\Local\Temp\DFCTRL1_9.exe" |
cmdline | C:\Users\test22\AppData\Local\Temp\944A.tmp\Update.bat "C:\Users\test22\AppData\Local\Temp\Update.exe" |
file | C:\Users\test22\AppData\Local\Temp\Update.exe |
file | C:\Users\test22\AppData\Local\Temp\944A.tmp\Update.bat |
file | C:\Users\test22\AppData\Local\Temp\dC_v13_Scrypt.exe |
file | C:\Users\test22\AppData\Local\Temp\DFCTRL1_9.exe |
file | C:\Users\test22\AppData\Local\Temp\E94F.tmp\DFCTRL1_9.bat |
file | C:\Users\test22\AppData\Local\Temp\NSudo\NSudoLG.exe |
service | WinDefend (regkey HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start) |
description | attempts to modify windows defender policies | registry | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware | ||||||
description | attempts to disable windows defender | registry | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start |
MicroWorld-eScan | Trojan.GenericKD.37161181 |
FireEye | Generic.mg.22e4972a8a73e90a |
ALYac | Trojan.GenericKD.37161181 |
Cylance | Unsafe |
VIPRE | Trojan.Win32.Generic!BT |
K7AntiVirus | Riskware ( 0040eff71 ) |
BitDefender | Trojan.GenericKD.37161181 |
K7GW | Riskware ( 0040eff71 ) |
CrowdStrike | win/malicious_confidence_60% (W) |
Cyren | W64/Coinminer.C |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | a variant of Win64/GenKryptik.FHBF |
Kaspersky | VHO:Trojan.Win32.Convagent.gen |
Avast | Win64:Malware-gen |
Ad-Aware | Trojan.GenericKD.37161181 |
Sophos | Mal/Generic-S |
McAfee-GW-Edition | BehavesLike.Win64.PUPXME.tc |
Emsisoft | Trojan.GenericKD.37161181 (B) |
MAX | malware (ai score=87) |
Antiy-AVL | Trojan/Generic.ASBOL.2F8F |
Microsoft | Trojan:Win32/Wacatac.B!ml |
GData | Trojan.GenericKD.37161181 |
Cynet | Malicious (score: 100) |
McAfee | Artemis!22E4972A8A73 |
Malwarebytes | Malware.AI.4120687121 |
Zoner | Trojan.Win64.52156 |
TrendMicro-HouseCall | TROJ_GEN.R002H0CG221 |
Ikarus | Trojan.BAT.CoinMiner |
Fortinet | Malicious_Behavior.SB |
AVG | Win64:Malware-gen |