Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 29, 2021, 11:32 a.m. | Sept. 29, 2021, 11:34 a.m. |
-
-
daiparl.tmp "C:\Users\test22\AppData\Local\Temp\is-J2HJJ.tmp\daiparl.tmp" /SL5="$501AE,2564405,831488,C:\Users\test22\AppData\Local\Temp\daiparl.exe"
2580-
cmd.exe "cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi
2196 -
-
mountvol.exe mountvol P: /D
2060
-
-
-
setx.exe setx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\util\cmd;C:\Python27;C:\util\cmd;C:\Python27C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp"
2776
-
-
cmd.exe "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" remove "ROOT\bareflank""
2840 -
cmd.exe "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" install "C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\bareflank.inf" "ROOT\bareflank""
2304 -
cmd.exe "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" remove "ROOT\bfbuilder""
2548 -
cmd.exe "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" install "C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\bfbuilder.inf" "ROOT\bfbuilder""
2612
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1924
Name | Response | Post-Analysis Lookup |
---|---|---|
imagizer.imageshack.com | 151.139.128.11 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 151.139.128.11:443 -> 192.168.56.103:49187 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.103:49183 -> 151.139.128.11:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49186 -> 151.139.128.11:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 151.139.128.11:443 -> 192.168.56.103:49184 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.103:49185 -> 151.139.128.11:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
section | .itext |
section | .didata |
file | C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\googlesystem.exe |
file | C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\express.dll |
cmdline | "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" install "C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\bfbuilder.inf" "ROOT\bfbuilder"" |
cmdline | "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" remove "ROOT\bfbuilder"" |
cmdline | "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" install "C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\bareflank.inf" "ROOT\bareflank"" |
cmdline | "cmd.exe" /C mountvol P: /D |
cmdline | setx /m PATH "C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\util\cmd;C:\Python27;C:\util\cmd;C:\Python27C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp" |
cmdline | "cmd.exe" /C ""C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\devcon.exe" remove "ROOT\bareflank"" |
cmdline | "cmd.exe" /C setx /m PATH "%PATH%C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp" |
cmdline | "cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi |
file | C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\googlesystem.exe |
file | C:\Users\test22\AppData\Local\Temp\is-J2HJJ.tmp\daiparl.tmp |
file | C:\Users\test22\AppData\Local\Temp\is-CV4N9.tmp\express.dll |
command | "cmd.exe" /c bcdedit /set {bootmgr} path \efi\boot\bareflank.efi |
Lionic | Trojan.Win32.Penguish.a!c |
MicroWorld-eScan | Trojan.GenericKD.37675674 |
FireEye | Trojan.GenericKD.37675674 |
K7AntiVirus | Trojan ( 005882651 ) |
Alibaba | TrojanDownloader:Win32/Penguish.2c815146 |
K7GW | Trojan ( 005882651 ) |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | a variant of Win32/GenKryptik.FKVU |
Paloalto | generic.ml |
Kaspersky | Trojan-Downloader.Win32.Penguish.wc |
BitDefender | Trojan.GenericKD.37675674 |
Avast | FileRepMalware |
Tencent | Win32.Trojan-downloader.Penguish.Wrql |
Ad-Aware | Trojan.GenericKD.37675674 |
Emsisoft | Trojan.GenericKD.37675674 (B) |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.wc |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Krypt |
Webroot | W32.Malware.Gen |
Avira | TR/Kryptik.wzzar |
MAX | malware (ai score=83) |
Kingsoft | Win32.TrojDownloader.Penguish.wc.(kcloud) |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Win32.Trojan.Kryptik.7W7IH5 |
Cynet | Malicious (score: 100) |
McAfee | Artemis!D0EFA396AEC4 |
TrendMicro-HouseCall | TROJ_FRS.VSNW1CI21 |
Fortinet | W32/GenKryptik.FKVU!tr |
AVG | FileRepMalware |