Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 23, 2021, 8:50 a.m. | Sept. 23, 2021, 9:05 a.m. |
-
-
taskkill.exe Taskkill /F /IM DbSecuritySpt.exe
1836 -
taskkill.exe Taskkill /F /IM Bill.exe
2112 -
taskkill.exe Taskkill /F /IM svch0st.exe
2200
-
Name | Response | Post-Analysis Lookup |
---|---|---|
300gsyn.it | 155.94.178.138 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
resource name | EXE |
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 | ||||||||||||||||||
name | EXE | language | LANG_CHINESE | filetype | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00133e48 | size | 0x0000ec00 |
file | C:\Program Files\DbSecuritySpt\DbSecuritySpt.exe |
file | C:\Program Files\DbSecuritySpt\Packet.dll |
file | C:\Program Files\DbSecuritySpt\SESDKDummy64.dll |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "DbSecuritySpt.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "svch0st.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "Bill.exe") |
cmdline | Taskkill /F /IM svch0st.exe |
cmdline | Taskkill /F /IM DbSecuritySpt.exe |
cmdline | Taskkill /F /IM Bill.exe |
service_name | NPF | service_path | C:\Program Files\DbSecuritySpt\npf.sys | ||||||
service_name | DbSecuritySpt | service_path | C:\Program Files\DbSecuritySpt\DbSecuritySpt.exe |
file | C:\Program Files\DbSecuritySpt\Packet.dll |
file | C:\Program Files\DbSecuritySpt\npf.sys |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Reconyc.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Agent.CGMR |
FireEye | Generic.mg.19892e4eaa5acc4d |
CAT-QuickHeal | Trojan.WebToos.S18562 |
ALYac | Trojan.Agent.CGMR |
Cylance | Unsafe |
VIPRE | Trojan.Win32.Generic!BT |
K7AntiVirus | RootKit ( 0055e3fe1 ) |
Alibaba | Trojan:Win32/WebToos.ba270fa0 |
K7GW | RootKit ( 0055e3fe1 ) |
Cybereason | malicious.eaa5ac |
Arcabit | Trojan.Agent.CGMR |
Baidu | Win32.Rootkit.Agent.at |
Cyren | W32/WebToos.B.gen!Eldorado |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Trojan.Gadoopt-2 |
Kaspersky | Trojan.Win32.Reconyc.esql |
BitDefender | Trojan.Agent.CGMR |
NANO-Antivirus | Trojan.Win32.Reconyc.exhhog |
SUPERAntiSpyware | Trojan.Agent/Gen-Backdoor |
Avast | Win32:Prockill-A [Rtk] |
Tencent | Malware.Win32.Gencirc.10b54e8b |
Ad-Aware | Trojan.Agent.CGMR |
Emsisoft | Trojan.Agent.CGMR (B) |
DrWeb | BackDoor.Gates.8 |
Zillya | Rootkit.Agent.Win32.15968 |
TrendMicro | TROJ_WEBTOOS.SM |
McAfee-GW-Edition | BehavesLike.Win32.Generic.th |
Sophos | ML/PE-A |
Ikarus | Backdoor.Win32.Agent |
Jiangmin | Trojan/Reconyc.eyd |
Webroot | W32.Trojan.Gadoopt-1 |
Avira | TR/Agent.14016.2 |
MAX | malware (ai score=100) |
Antiy-AVL | Trojan/Generic.ASMalwS.A3CBB3 |
Gridinsoft | Rootkit.Win32.Agent.bot!s1 |
Microsoft | Trojan:Win32/WebToos.A |
ViRobot | Backdoor.Win32.Agent.1315840.A |
GData | Trojan.Agent.CGMR |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win32.Webtoos.C1040590 |
McAfee | GenericRXDY-OY!19892E4EAA5A |
TACHYON | Trojan/W32.Rootkit.1315840 |
VBA32 | Backdoor.Gates |
Malwarebytes | Trojan.WebToos |
TrendMicro-HouseCall | TROJ_WEBTOOS.SM |
dead_host | 192.168.56.101:49222 |
dead_host | 192.168.56.101:49211 |
dead_host | 192.168.56.101:49206 |
dead_host | 192.168.56.101:49219 |
dead_host | 192.168.56.101:49215 |
dead_host | 192.168.56.101:49223 |
dead_host | 192.168.56.101:49224 |
dead_host | 192.168.56.101:49207 |
dead_host | 192.168.56.101:49208 |
dead_host | 192.168.56.101:49216 |
dead_host | 192.168.56.101:49212 |
dead_host | 192.168.56.101:49225 |
dead_host | 192.168.56.101:49220 |
dead_host | 192.168.56.101:49209 |
dead_host | 192.168.56.101:49217 |
dead_host | 155.94.178.138:25006 |
dead_host | 192.168.56.101:49213 |
dead_host | 192.168.56.101:49221 |
dead_host | 192.168.56.101:49210 |
dead_host | 192.168.56.101:49205 |
dead_host | 192.168.56.101:49218 |
dead_host | 192.168.56.101:49214 |