Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 27, 2021, 9:24 a.m. | Oct. 27, 2021, 9:26 a.m. |
-
-
taskmgr.exe "C:\Windows\System32\taskmgr.exe"
584 -
-
taskkill.exe taskkill /IM explorer.exe -f
1808
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
prodownload.live | 74.208.236.24 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49202 -> 74.208.236.24:80 | 2029286 | ET MALWARE CrownAdPro CnC Activity M3 | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49203 -> 74.208.236.24:80 | 2029287 | ET MALWARE CrownAdPro CnC Activity M4 | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49199 -> 74.208.236.24:80 | 2029143 | ET MALWARE CrownAdPro CnC Activity M1 | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49201 -> 74.208.236.24:80 | 2029285 | ET MALWARE CrownAdPro CnC Activity M2 | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49204 -> 74.208.236.24:80 | 2029288 | ET MALWARE CrownAdPro CnC Activity M5 | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
pdb_path | E:\123\All in Desktop\crown-demo-01-07-2019\cross3\Release\cross3.pdb |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://prodownload.live/iam//index.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://prodownload.live/ixset.php?ip=175.208.134.150&mcid=1 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://prodownload.live/ixpkey.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://prodownload.live/ixptexts.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://prodownload.live/setad.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://prodownload.live/ixlive.php?uid=1 |
request | GET http://prodownload.live/iam//index.php |
request | GET http://prodownload.live/ixset.php?ip=175.208.134.150&mcid=1 |
request | GET http://prodownload.live/ixpkey.php |
request | GET http://prodownload.live/ixptexts.php |
request | GET http://prodownload.live/setad.php |
request | GET http://prodownload.live/ixlive.php?uid=1 |
cmdline | C:\Windows\system32\cmd.exe /c taskkill /IM explorer.exe -f |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "explorer.exe") |
cmdline | taskkill /IM explorer.exe -f |
cmdline | C:\Windows\system32\cmd.exe /c taskkill /IM explorer.exe -f |
Lionic | Trojan.Win32.Mikey.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Mikey.112480 |
ALYac | Gen:Variant.Mikey.112480 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Agent.QBF |
K7AntiVirus | Spyware ( 005712c61 ) |
BitDefender | Gen:Variant.Mikey.112480 |
K7GW | Spyware ( 005712c61 ) |
CrowdStrike | win/malicious_confidence_60% (W) |
Arcabit | Trojan.Mikey.D1B760 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Spy.Agent.QBF |
APEX | Malicious |
Paloalto | generic.ml |
Alibaba | TrojanSpy:Win32/Cryptoload.1cdd878d |
Avast | Win32:Trojan-gen |
Ad-Aware | Gen:Variant.Mikey.112480 |
Emsisoft | Gen:Variant.Mikey.112480 (B) |
McAfee-GW-Edition | GenericRXJO-MB!2626A621FAB1 |
FireEye | Generic.mg.2626a621fab10eec |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Downloader.Win32.Cryptoload |
Avira | HEUR/AGEN.1123838 |
MAX | malware (ai score=84) |
Gridinsoft | Trojan.Win32.Agent.dd!n |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Win32.Trojan-Spy.Agent.ASH |
Cynet | Malicious (score: 99) |
AhnLab-V3 | Downloader/Win.Cryptoload.R445611 |
McAfee | GenericRXJO-MB!2626A621FAB1 |
VBA32 | BScope.Trojan.Gasti |
Malwarebytes | Rogue.TechSupportScam |
TrendMicro-HouseCall | TROJ_GEN.R002H0CJQ21 |
Fortinet | W32/Agent.QBF!tr |
BitDefenderTheta | Gen:NN.ZexaF.34236.Jy0@a85p6Ypi |
AVG | Win32:Trojan-gen |
Cybereason | malicious.1fab10 |
Panda | Trj/Genetic.gen |