Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 17, 2021, 5:32 p.m. | Aug. 17, 2021, 5:38 p.m. |
-
-
-
-
net1.exe C:\Windows\system32\net1 stop svswin
972
-
-
-
-
sc.exe Sc delete svswin
2544
-
-
cmd.exe C:\Windows\system32\cmd.exe /C Sc create svswin binpath= C:\Windows\splwin.exe start= auto DisplayName= IntelService
2412-
sc.exe Sc create svswin binpath= C:\Windows\splwin.exe start= auto DisplayName= IntelService
240
-
-
-
sc.exe sc description svswin ServiceManagerForWin
1972
-
-
-
-
net1.exe C:\Windows\system32\net1 start svswin
2296
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
silentlegion.duckdns.org | 3.142.212.137 | |
hashlegion.duckdns.org | 3.67.42.250 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.102:64034 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
UDP 192.168.56.102:52062 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | HTTP version 1.0 used | suspicious_request | GET http://silentlegion.duckdns.org/badproc.txt |
domain | hashlegion.duckdns.org |
domain | silentlegion.duckdns.org |
request | GET http://silentlegion.duckdns.org/badproc.txt |
file | C:\Windows\splwin.exe |
file | C:\Users\test22\AppData\Local\Temp\nsr7C8C.tmp\nsProcess.dll |
file | C:\Users\test22\AppData\Local\Temp\nsr7C8C.tmp\nsExec.dll |
cmdline | C:\Windows\system32\cmd.exe /C net stop svswin |
cmdline | C:\Windows\system32\cmd.exe /C Sc create svswin binpath= C:\Windows\splwin.exe start= auto DisplayName= IntelService |
cmdline | C:\Windows\system32\cmd.exe /C Sc delete svswin |
cmdline | C:\Windows\system32\cmd.exe /C sc description svswin ServiceManagerForWin |
cmdline | C:\Windows\system32\cmd.exe /C net start svswin |
file | C:\Users\test22\AppData\Local\Temp\nsr7C8C.tmp\nsExec.dll |
file | C:\Users\test22\AppData\Local\Temp\nsr7C8C.tmp\nsProcess.dll |
cmdline | net start svswin |
cmdline | C:\Windows\system32\cmd.exe /C net stop svswin |
cmdline | Sc create svswin binpath= C:\Windows\splwin.exe start= auto DisplayName= IntelService |
cmdline | C:\Windows\system32\cmd.exe /C Sc create svswin binpath= C:\Windows\splwin.exe start= auto DisplayName= IntelService |
cmdline | sc description svswin ServiceManagerForWin |
cmdline | C:\Windows\system32\cmd.exe /C Sc delete svswin |
cmdline | net stop svswin |
cmdline | Sc delete svswin |
cmdline | C:\Windows\system32\cmd.exe /C sc description svswin ServiceManagerForWin |
cmdline | C:\Windows\system32\cmd.exe /C net start svswin |
service_name | svswin | service_path | C:\Windows\splwin.exe |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Zusy.325941 |
FireEye | Generic.mg.bfa3677a1d68a0b2 |
CAT-QuickHeal | Trojan.Agent |
ALYac | Gen:Variant.Zusy.325941 |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.a |
K7AntiVirus | Trojan-Downloader ( 0050e5cf1 ) |
Alibaba | Trojan:Win32/CoinMiner.04215d33 |
K7GW | Trojan-Downloader ( 0050e5cf1 ) |
CrowdStrike | win/malicious_confidence_60% (W) |
Cyren | W32/Trojan.SMLD-6675 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Delf.BBD |
APEX | Malicious |
Kaspersky | HEUR:Trojan.Win32.Generic |
BitDefender | Gen:Variant.Zusy.325941 |
SUPERAntiSpyware | Trojan.Agent/Gen-Zusy |
Avast | Win32:Trojan-gen |
Tencent | Win32.Trojan.Generic.Pjxb |
Sophos | Mal/Generic-S |
VIPRE | Trojan.Win32.Generic!BT |
McAfee-GW-Edition | BehavesLike.Win32.Generic.tc |
Emsisoft | Gen:Variant.Zusy.325941 (B) |
Ikarus | Trojan.Delf.CoinMiner |
Avira | HEUR/AGEN.1138164 |
Antiy-AVL | Trojan/Generic.ASMalwS.337C6A3 |
Gridinsoft | Malware.Win32.Gen.cc!s5 |
Microsoft | Trojan:Win32/Sabsik.TE.B!ml |
ZoneAlarm | HEUR:Trojan.Win32.Generic |
GData | Gen:Variant.Zusy.325941 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win32.Fuery.R202739 |
McAfee | Artemis!BFA3677A1D68 |
MAX | malware (ai score=87) |
VBA32 | Trojan.Sabsik.TE |
Malwarebytes | Malware.AI.4240736848 |
Rising | Trojan.CoinMiner/NSIS!1.D88C (CLASSIC) |
Yandex | Trojan.Delf!YJMVO1Sclss |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/Delf.BBD!tr |
BitDefenderTheta | Gen:NN.ZelphiF.34088.@V0@aCEm37ki |
AVG | Win32:Trojan-gen |
Cybereason | malicious.a1d68a |
Panda | Trj/CI.A |