Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 23, 2021, 11:56 a.m. | Aug. 23, 2021, 12:25 p.m. |
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im GodK6jam0J2bDZkC.exe /f & timeout /t 6 & del /f /q "C:\Users\test22\AppData\Local\Temp\GodK6jam0J2bDZkC.exe" & del C:\ProgramData\*.dll & exit
1304-
taskkill.exe taskkill /im GodK6jam0J2bDZkC.exe /f
2364 -
timeout.exe timeout /t 6
2696
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
eduarroma.tumblr.com | 74.114.154.18 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49199 74.114.154.22:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA | CN=*.tumblr.com | 14:78:ba:5b:b5:54:5d:a1:2c:d2:79:4c:42:99:bb:3a:a9:db:86:c2 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://188.34.200.103/903 | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://188.34.200.103/freebl3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://188.34.200.103/mozglue.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://188.34.200.103/msvcp140.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://188.34.200.103/nss3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://188.34.200.103/softokn3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://188.34.200.103/vcruntime140.dll | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://188.34.200.103/ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://eduarroma.tumblr.com/ |
request | POST http://188.34.200.103/903 |
request | GET http://188.34.200.103/freebl3.dll |
request | GET http://188.34.200.103/mozglue.dll |
request | GET http://188.34.200.103/msvcp140.dll |
request | GET http://188.34.200.103/nss3.dll |
request | GET http://188.34.200.103/softokn3.dll |
request | GET http://188.34.200.103/vcruntime140.dll |
request | POST http://188.34.200.103/ |
request | GET https://eduarroma.tumblr.com/ |
request | POST http://188.34.200.103/903 |
request | POST http://188.34.200.103/ |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Local State |
file | C:\Users\test22\AppData\Local\Nichrome\User Data\Local State |
file | C:\ProgramData\freebl3.dll |
file | C:\ProgramData\msvcp140.dll |
file | C:\ProgramData\nss3.dll |
file | C:\ProgramData\vcruntime140.dll |
file | C:\ProgramData\mozglue.dll |
file | C:\ProgramData\softokn3.dll |
cmdline | "C:\Windows\System32\cmd.exe" /c taskkill /im GodK6jam0J2bDZkC.exe /f & timeout /t 6 & del /f /q "C:\Users\test22\AppData\Local\Temp\GodK6jam0J2bDZkC.exe" & del C:\ProgramData\*.dll & exit |
cmdline | C:\Windows\System32\cmd.exe /c taskkill /im GodK6jam0J2bDZkC.exe /f & timeout /t 6 & del /f /q "C:\Users\test22\AppData\Local\Temp\GodK6jam0J2bDZkC.exe" & del C:\ProgramData\*.dll & exit |
file | C:\Users\test22\AppData\Local\Temp\GodK6jam0J2bDZkC.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "GodK6jam0J2bDZkC.exe") |