Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 19, 2021, 10:42 a.m. | Sept. 19, 2021, 11:14 a.m. |
-
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\85B3.tmp\85B4.tmp\85B5.bat C:\Users\test22\wincfg.exe"
656
-
-
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.215.113.84:80 -> 192.168.56.101:49198 | 2400024 | ET DROP Spamhaus DROP Listed Traffic Inbound group 25 | Misc Attack |
TCP 192.168.56.101:49198 -> 185.215.113.84:80 | 2016141 | ET INFO Executable Download from dotted-quad Host | A Network Trojan was detected |
TCP 192.168.56.101:49198 -> 185.215.113.84:80 | 2019714 | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile | Potentially Bad Traffic |
TCP 185.215.113.84:80 -> 192.168.56.101:49198 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 185.215.113.84:80 -> 192.168.56.101:49198 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
pdb_path |
packer | Armadillo v1.71 |
suspicious_features | Connection to IP address | suspicious_request | GET http://185.215.113.84/etc.exe |
request | GET http://185.215.113.84/etc.exe |
description | wincfg.exe tried to sleep 586 seconds, actually delayed analysis time by 586 seconds |
file | C:\Users\test22\AppData\Local\Temp\85B3.tmp\85B4.tmp\85B5.bat |
file | C:\Users\test22\AppData\Local\Temp\85B3.tmp\Defender.exe |
file | C:\Users\test22\wincfg.exe |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\85B3.tmp\85B4.tmp\85B5.bat C:\Users\test22\wincfg.exe" |
file | C:\Users\test22\AppData\Local\Temp\85B3.tmp\Defender.exe |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | C:\Windows\System32\cmd /c "C:\Users\test22\AppData\Local\Temp\85B3.tmp\85B4.tmp\85B5.bat C:\Users\test22\wincfg.exe" |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\85B3.tmp\85B4.tmp\85B5.bat C:\Users\test22\wincfg.exe" |
host | 185.215.113.84 |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration | reg_value | C:\Users\test22\wincfg.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Configuration | reg_value | C:\Users\test22\wincfg.exe |
file | C:\Users\test22\wincfg.exe:Zone.Identifier |
Lionic | Trojan.Win32.Generic.a!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.DownLoader.origin |
MicroWorld-eScan | Trojan.GenericKD.37595827 |
ALYac | Trojan.GenericKD.37595827 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan-Downloader ( 005823881 ) |
Alibaba | TrojanDownloader:Win32/MalwareX.95a1a994 |
K7GW | Trojan-Downloader ( 005823881 ) |
CrowdStrike | win/malicious_confidence_90% (W) |
BitDefenderTheta | Gen:NN.ZexaF.34142.auW@a8m3bHai |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Tiny.NTK |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Downloader.Win32.Generic |
BitDefender | Trojan.GenericKD.37595827 |
Avast | Win32:MalwareX-gen [Trj] |
Tencent | Win32.Trojan-downloader.Generic.Lohy |
Ad-Aware | Trojan.GenericKD.37595827 |
Sophos | Mal/Generic-S (PUA) |
TrendMicro | TROJ_FRS.0NA103II21 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.zt |
FireEye | Generic.mg.af3e98549b975158 |
Emsisoft | Trojan-Downloader.Tiny (A) |
SentinelOne | Static AI - Malicious PE |
Avira | TR/Crypt.XPACK.Gen |
MAX | malware (ai score=84) |
Kingsoft | Win32.Heur.KVMH017.a.(kcloud) |
Gridinsoft | Trojan.Win32.Packed.oa |
Microsoft | Trojan:Win32/Sabsik.TE.B!ml |
GData | Trojan.GenericKD.37595827 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Malware/Win32.Generic.C4204685 |
Acronis | suspicious |
McAfee | RDN/Generic Downloader.x |
VBA32 | suspected of Trojan.Downloader.gen |
Malwarebytes | Trojan.Downloader |
TrendMicro-HouseCall | TROJ_FRS.0NA103II21 |
Rising | Trojan.Generic@ML.91 (RDML:HYCzEUpYBrFhWCy5trk1yg) |
Ikarus | Trojan-Downloader.Win32.Tiny |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Tiny.NTK!tr.dldr |
AVG | Win32:MalwareX-gen [Trj] |
Cybereason | malicious.49b975 |