Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 15, 2021, 1:08 p.m. | Aug. 15, 2021, 1:11 p.m. |
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
492-
netsh.exe netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe"
2696 -
netsh.exe netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe"
2196
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480
1204 -
-
netsh.exe netsh firewall set service type= upnp mode = enable
2088
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1848
Name | Response | Post-Analysis Lookup |
---|---|---|
stun.sipgate.net | 217.10.68.152 |
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh |
ip | 217.10.68.145 |
ip | 217.116.122.143 |
ip | 79.141.72.138 |
ip | 79.141.72.156 |
ip | 79.141.72.52 |
cmdline | cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh firewall set service type= upnp mode = enable |
cmdline | cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | cmd.exe /c netsh firewall set service type= upnp mode = enable |
domain | stun.sipgate.net |
cmdline | netsh firewall set service type= upnp mode = enable |
cmdline | cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh firewall set service type= upnp mode = enable |
cmdline | cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" |
cmdline | cmd.exe /c netsh firewall set service type= upnp mode = enable |
host | 217.116.122.143 | |||
host | 79.141.72.138 | |||
host | 79.141.72.156 | |||
host | 79.141.72.52 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Application Manager | reg_value | C:\Users\test22\Windows Application Manager\winappmgr.exe |
cmdline | cmd.exe /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | cmd.exe /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\test22\windows application manager\winappmgr.exe" program="C:\Users\test22\Windows Application Manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall show rule name="c:\users\test22\windows application manager\winappmgr.exe" |
cmdline | netsh advfirewall firewall add rule name="Port 61480 c:\users\test22\windows application manager\winappmgr.exe" dir=in action=allow protocol=UDP localport=61480 |
cmdline | netsh advfirewall firewall show rule "Port 61480 c:\users\test22\windows application manager\winappmgr.exe" |
Lionic | Trojan.Win32.Malicious.4!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.MulDrop18.27677 |
MicroWorld-eScan | Trojan.GenericKD.37397738 |
FireEye | Generic.mg.39d6ec1892af37c0 |
McAfee | Artemis!39D6EC1892AF |
Sangfor | Trojan.Win32.Save.a |
Alibaba | Trojan:Win32/Starter.ali2000005 |
Cybereason | malicious.146cbb |
BitDefenderTheta | Gen:NN.ZexaE.34058.ruW@aGlBEvmi |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Dropper.Win32.Sysn.gen |
BitDefender | Trojan.GenericKD.37397738 |
Ad-Aware | Trojan.GenericKD.37397738 |
Sophos | Mal/Generic-S |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dt |
Emsisoft | Trojan.GenericKD.37397738 (B) |
Webroot | W32.Trojan.Gen |
MAX | malware (ai score=99) |
Kingsoft | Win32.Heur.KVMH017.a.(kcloud) |
Gridinsoft | Trojan.Win32.Agent.vb |
Microsoft | Trojan:Script/Phonzy.C!ml |
ZoneAlarm | HEUR:Trojan-Dropper.Win32.Sysn.gen |
GData | Trojan.GenericKD.37397738 |
Cynet | Malicious (score: 100) |
Rising | Spyware.ClipBanker!1.D05A (CLASSIC) |
SentinelOne | Static AI - Malicious PE |
Fortinet | Malicious_Behavior.SB |
MaxSecure | Trojan.Malware.300983.susgen |
Panda | Trj/GdSda.A |
CrowdStrike | win/malicious_confidence_60% (W) |
Qihoo-360 | Win32/TrojanDropper.Sysn.HgIASaUA |