Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 23, 2021, 9:43 a.m. | Oct. 23, 2021, 9:46 a.m. |
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\3e5d740863\
556-
reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\3e5d740863\
2032
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN dllhost.exe /TR "C:\Users\test22\AppData\Local\Temp\3e5d740863\dllhost.exe" /F
2672
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
web.xmlpost.xyz | ||
web.jsonpost.xyz | 169.197.142.162 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49206 -> 169.197.142.162:80 | 2027700 | ET MALWARE Amadey CnC Check-In | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
pdb_path | OfficeDesktop.pdb |
packer | Armadillo v1.71 |
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST http://web.jsonpost.xyz/sj2vMs/index.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST http://web.jsonpost.xyz/sj2vMs/index.php?scr=1 |
request | POST http://web.jsonpost.xyz/sj2vMs/index.php |
request | POST http://web.jsonpost.xyz/sj2vMs/index.php?scr=1 |
request | POST http://web.jsonpost.xyz/sj2vMs/index.php |
request | POST http://web.jsonpost.xyz/sj2vMs/index.php?scr=1 |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN dllhost.exe /TR "C:\Users\test22\AppData\Local\Temp\3e5d740863\dllhost.exe" /F |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN dllhost.exe /TR "C:\Users\test22\AppData\Local\Temp\3e5d740863\dllhost.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\3e5d740863\ |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN dllhost.exe /TR "C:\Users\test22\AppData\Local\Temp\3e5d740863\dllhost.exe" /F |
cmdline | cmd /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\3e5d740863\ |
cmdline | REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\3e5d740863\ |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN dllhost.exe /TR "C:\Users\test22\AppData\Local\Temp\3e5d740863\dllhost.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\3e5d740863\ |
file | C:\ProgramData\AVAST Software |
file | C:\ProgramData\Avira |
file | C:\ProgramData\Kaspersky Lab |
file | C:\ProgramData\Panda Security |
file | C:\ProgramData\Bitdefender |
file | C:\ProgramData\AVG |
file | C:\ProgramData\Doctor Web |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN dllhost.exe /TR "C:\Users\test22\AppData\Local\Temp\3e5d740863\dllhost.exe" /F |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN dllhost.exe /TR "C:\Users\test22\AppData\Local\Temp\3e5d740863\dllhost.exe" /F |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Win32.Swizzor.l8Pw |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
McAfee | RDN/Generic PWS.y |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 00588b3e1 ) |
BitDefender | Trojan.GenericKD.37823254 |
K7GW | Trojan ( 00588b3e1 ) |
CrowdStrike | win/malicious_confidence_60% (W) |
Arcabit | Trojan.Generic.D2412316 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Kryptik.HMUW |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Spy.Win32.Bobik.gen |
Alibaba | Trojan:Win32/Kryptik.4f5b5137 |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
MicroWorld-eScan | Trojan.GenericKD.37823254 |
Avast | Win32:CrypterX-gen [Trj] |
Rising | Trojan.Generic@ML.88 (RDMK:6vwUYEhpGEvMId2uu2lEqQ) |
Ad-Aware | Trojan.GenericKD.37823254 |
Sophos | ML/PE-A |
TrendMicro | TROJ_GEN.R002C0WJI21 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.gm |
FireEye | Generic.mg.07f5f3b04b399735 |
Emsisoft | Trojan.GenericKD.37823254 (B) |
Jiangmin | Trojan.Fsysna.nhh |
Avira | TR/Fraud.Gen8 |
MAX | malware (ai score=84) |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:Script/Phonzy.B!ml |
GData | Win32.Trojan.BSE.TTUNZ7 |
AhnLab-V3 | Trojan/Win.Generic.R445985 |
VBA32 | BScope.TrojanSpy.Bobik |
ALYac | Trojan.GenericKD.37823254 |
TrendMicro-HouseCall | TROJ_GEN.R002C0WJI21 |
Tencent | Malware.Win32.Gencirc.11d327a0 |
Yandex | Trojan.Kryptik!0JPmqTA7D64 |
Ikarus | Trojan.Win32.Crypt |
Fortinet | W32/Kryptik.HMUW!tr |
BitDefenderTheta | Gen:NN.ZexaF.34236.zq0@autzNPdi |
AVG | Win32:CrypterX-gen [Trj] |
Cybereason | malicious.f8ea07 |
Panda | Trj/GdSda.A |
MaxSecure | Trojan.Malware.74196578.susgen |