Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 18, 2021, 11:18 a.m. | Aug. 18, 2021, 11:34 a.m. |
-
-
irsetup.exe "C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1798690 "__IRAFN:C:\Users\test22\AppData\Local\Temp\wango666.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-3832866432-4053218753-3017428901-1001"
1556-
DbVisualizer.exe "C:\Users\test22\AppData\Roaming\DbVisualizer Manager\DbVisualizer.exe"
3028
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1848
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.215.113.20:80 -> 192.168.56.101:49213 | 2400024 | ET DROP Spamhaus DROP Listed Traffic Inbound group 25 | Misc Attack |
TCP 192.168.56.101:49213 -> 185.215.113.20:80 | 2027700 | ET MALWARE Amadey CnC Check-In | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49216 -> 185.215.113.20:80 | 2027700 | ET MALWARE Amadey CnC Check-In | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://185.215.113.20/gb9fskvS/index.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://185.215.113.20/gb9fskvS/index.php?scr=1 |
request | POST http://185.215.113.20/gb9fskvS/index.php |
request | POST http://185.215.113.20/gb9fskvS/index.php?scr=1 |
request | POST http://185.215.113.20/gb9fskvS/index.php |
request | POST http://185.215.113.20/gb9fskvS/index.php?scr=1 |
description | DbVisualizer.exe tried to sleep 339 seconds, actually delayed analysis time by 339 seconds |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\manual.pdf |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\DbVisualizer.exe |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-load.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\System.Numerics.Vectors.dll |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-menu.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\uninstall.exe |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-toolbar.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-scripteditor.js |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-stepsscript.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\Common.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-modals.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\SdCrashReporter.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\libEGL.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-applicationlist.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\zlibwapi.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\System.Memory.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-applicationeditor.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\codemirror-autorefresh.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\System.Buffers.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\libintl-8.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\MixPanel.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\lua5.1.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\VistaBridgeLibrary.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\WindowsInput.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\strokesplus-net-utilities.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\codemirror-javascript-hint.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\HTML\js\codemirror-matchbrackets.js |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\libxlt2.dll |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\DbVisualizer.exe |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\VistaBridgeLibrary.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\SdCrashReporter.dll |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\System.Buffers.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\libintl-8.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\Common.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\MixPanel.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\System.Memory.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\zlibwapi.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\DbVisualizer.exe |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\System.Numerics.Vectors.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\WindowsInput.dll |
file | C:\Users\test22\AppData\Roaming\DbVisualizer Manager\libxlt2.dll |
description | Take ScreenShot | rule | ScreenShot | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 185.215.113.20 |
file | C:\ProgramData\AVAST Software |
file | C:\ProgramData\Avira |
file | C:\ProgramData\Kaspersky Lab |
file | C:\ProgramData\Panda Security |
file | C:\ProgramData\Bitdefender |
file | C:\ProgramData\AVG |
file | C:\ProgramData\Doctor Web |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe |
MicroWorld-eScan | Trojan.GenericKD.37397275 |
FireEye | Generic.mg.a9d35b3546a908c8 |
Qihoo-360 | Win32/TrojanDownloader.Generic.HgIASaMA |
ALYac | Trojan.GenericKD.37397275 |
Sangfor | Trojan.Win32.Deyma.cdj |
K7AntiVirus | Trojan ( 0057ac811 ) |
Alibaba | TrojanDownloader:Win32/Deyma.60588dca |
K7GW | Trojan ( 0057ac811 ) |
Cyren | W32/Kryptik.DOL.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Agent.ACYJ |
APEX | Malicious |
ClamAV | Win.Malware.Ursu-9854581-0 |
Kaspersky | Trojan-Downloader.Win32.Deyma.cdj |
BitDefender | Trojan.GenericKD.37397275 |
Avast | Win32:Trojan-gen |
Ad-Aware | Trojan.GenericKD.37397275 |
Sophos | Mal/Generic-S |
Comodo | Malware@#3ko08bgbszs5o |
DrWeb | Trojan.DownLoader41.9312 |
Zillya | Trojan.AveMaria.Win32.17 |
TrendMicro | TROJ_GEN.R002C0WHG21 |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.vc |
Emsisoft | Trojan.GenericKD.37397275 (B) |
Ikarus | Trojan.Win32.Agent |
Kingsoft | Win32.TrojDownloader.Deyma.c.(kcloud) |
Gridinsoft | Trojan.Win32.Downloader.oa |
GData | Trojan.GenericKD.37397275 |
AhnLab-V3 | Trojan/Win.Generic.C4596125 |
McAfee | Artemis!A9D35B3546A9 |
MAX | malware (ai score=81) |
VBA32 | TrojanPSW.Convagent |
TrendMicro-HouseCall | TROJ_GEN.R002C0WHG21 |
Fortinet | W32/Deyma.CDJ!tr.dldr |
AVG | Win32:Trojan-gen |
Panda | Trj/CI.A |
CrowdStrike | win/malicious_confidence_100% (W) |