Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 1, 2021, 10:58 a.m. | Nov. 1, 2021, 11:05 a.m. |
-
-
wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\test22\AppData\Local\Temp\Prevent windows from sleeping.vbs"
2384 -
nwire733.exe "C:\Users\test22\AppData\Local\Temp\nwire733.exe"
1444
-
Name | Response | Post-Analysis Lookup |
---|---|---|
nwire733.duckdns.org | 185.228.19.147 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:61479 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
UDP 192.168.56.101:59369 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
Suricata TLS
No Suricata TLS
packer | MicroJoiner 1.7 -> coban2k |
domain | nwire733.duckdns.org |
file | C:\Users\test22\AppData\Local\Temp\nwire733.exe |
file | C:\Users\test22\AppData\Local\Temp\Prevent windows from sleeping.vbs |
file | C:\Users\test22\AppData\Local\Temp\Prevent windows from sleeping.vbs |
file | C:\Users\test22\AppData\Local\Temp\nwire733.exe |
file | C:\Users\test22\AppData\Local\Temp\nwire733.exe |
section | {u'size_of_data': u'0x000141d8', u'virtual_address': u'0x00002000', u'entropy': 7.9329436539567775, u'name': u'.rsrc', u'virtual_size': u'0x000141d8'} | entropy | 7.93294365396 | description | A section with a high entropy has been found | |||||||||
entropy | 0.981698598799 | description | Overall entropy of this PE file is high |
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | Win.Trojan.agentTesla | rule | Win_Trojan_agentTesla_Zero | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | email clients info stealer | rule | infoStealer_emailClients_Zero | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 103.151.123.194 |
file | C:\Windows\SysWOW64\wscript.exe |
dead_host | 185.228.19.147:7920 |
Lionic | Trojan.Win32.Microjoin.l4WK |
Elastic | malicious (high confidence) |
DrWeb | Trojan.MulDrop.1161 |
MicroWorld-eScan | Trojan.Clicker.Delf.KG |
FireEye | Generic.mg.a4a8a89ce20e6f60 |
CAT-QuickHeal | Trojan.Microjoin.16709 |
ALYac | Trojan.Clicker.Delf.KG |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_90% (W) |
Alibaba | Malware:Win32/km_2a02.None |
K7GW | Trojan ( 0007233e1 ) |
K7AntiVirus | Trojan ( 0007233e1 ) |
BitDefenderTheta | AI:Packer.AC7EEC021E |
Cyren | W32/Joiner.B.gen!Eldorado |
Symantec | Downloader |
ESET-NOD32 | Win32/TrojanDropper.Microjoin.C |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Dropper.Joiner-6 |
Kaspersky | Trojan-Dropper.Win32.Pincher.hp |
BitDefender | Trojan.Clicker.Delf.KG |
NANO-Antivirus | Trojan.Win32.Pincher.covlcf |
Avast | Win32:Joiner-C [Trj] |
Tencent | Win32.Trojan-dropper.Pincher.Lmui |
Ad-Aware | Trojan.Clicker.Delf.KG |
Sophos | Mal/Generic-R + Mal/Dropper-C |
Comodo | TrojWare.Win32.TrojanDropper.Microjoin.C@1r72 |
Baidu | Win32.Trojan-Dropper.Microjoin.c |
VIPRE | BehavesLike.Win32.Malware.dss (mx-v) |
TrendMicro | TROJ_DROPPER.MX |
McAfee-GW-Edition | BehavesLike.Win32.VirRansom.mc |
Emsisoft | Trojan.Clicker.Delf.KG (B) |
Ikarus | Trojan-Dropper.Win32.Microjoin |
Jiangmin | TrojanDropper.Win32.Joiner.ae |
Avira | DR/Injector.toian |
Antiy-AVL | Trojan[Dropper]/Win32.Pincher.hp |
Microsoft | TrojanDropper:Win32/Joiner.AJ |
ZoneAlarm | Trojan-Dropper.Win32.Pincher.hp |
GData | Trojan.Clicker.Delf.KG |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Dropper/Win32.Microjoin.C4198 |
Acronis | suspicious |
McAfee | BackDoor-CEO.c |
MAX | malware (ai score=85) |
VBA32 | Trojan-Droper.MTA.0465 |
Malwarebytes | Trojan.Dropper |
TrendMicro-HouseCall | TROJ_DROPPER.MX |
Rising | Backdoor.Win32.SdBot.xd (CLASSIC) |
Yandex | Constructor.Microjoiner.AC |