Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 4, 2021, 2:41 p.m. | Nov. 4, 2021, 3:11 p.m. |
-
-
setup.tmp "C:\Users\test22\AppData\Local\Temp\is-IUK9L.tmp\setup.tmp" /SL5="$3002C,1570064,56832,C:\Users\test22\AppData\Local\Temp\setup.exe"
2452-
-
setup.tmp "C:\Users\test22\AppData\Local\Temp\is-4Q1E8.tmp\setup.tmp" /SL5="$4002C,1570064,56832,C:\Users\test22\AppData\Local\Temp\setup.exe" /SILENT
2596-
postback.exe "C:\Users\test22\AppData\Local\Temp\is-V3M4S.tmp\postback.exe" ss1
2708 -
FarLabUninstaller.exe "C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss1
2744 -
NDP472-KB4054531-Web.exe "C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart
2784-
-
SetupUtility.exe SetupUtility.exe /aupause
2084 -
SetupUtility.exe SetupUtility.exe /screboot
2332 -
TMPC2AA.tmp.exe TMPC2AA.tmp.exe /Q /X:C:\a26b2ef62474b6e3da4af3\TMPC2AA.tmp.exe.tmp
2520
-
-
-
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
indug.com | 47.254.184.183 | |
download.microsoft.com |
CNAME
main.dl.ms.akadns.net
|
104.109.240.114 |
www.microsoft.com | 23.201.37.168 | |
download.visualstudio.microsoft.com |
CNAME
cs10.wpc.v0cdn.net
CNAME
4316b.wpc.azureedge.net
|
192.229.232.200 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49172 -> 47.254.184.183:80 | 2022482 | ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01 | A Network Trojan was detected |
TCP 47.254.184.183:80 -> 192.168.56.103:49172 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 47.254.184.183:80 -> 192.168.56.103:49172 | 2021954 | ET MALWARE JS/Nemucod.M.gen downloading EXE payload | A Network Trojan was detected |
TCP 47.254.184.183:80 -> 192.168.56.103:49172 | 2014520 | ET INFO EXE - Served Attached HTTP | Misc activity |
TCP 192.168.56.103:49188 -> 23.201.36.112:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49193 -> 192.229.232.200:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49188 23.201.36.112:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=download.microsoft.com | 07:84:e3:73:a7:c0:23:a1:94:3b:48:8f:06:a3:1f:12:78:4a:73:99 |
TLSv1 192.168.56.103:49193 192.229.232.200:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=*.vo.msecnd.net | 43:64:16:4b:73:33:82:e8:0f:a9:73:e6:cc:d5:11:b5:ee:fe:e3:4b |
section | CODE |
section | DATA |
section | BSS |
request | HEAD http://indug.com/68.exe |
request | GET http://indug.com/68.exe |
request | GET http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl |
request | GET http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl |
request | GET http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl |
request | HEAD http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full.mzz |
request | GET http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full.mzz |
request | HEAD http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full_x64.msi |
request | GET http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full_x64.msi |
request | GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl |
request | GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl |
request | GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl |
request | GET http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl |
request | HEAD http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03081.00&sar=amd64&o1=netfx_Patch_x64.msp |
request | GET http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03081.00&sar=amd64&o1=netfx_Patch_x64.msp |
request | HEAD http://go.microsoft.com/fwlink/?LinkId=862008 |
request | GET http://go.microsoft.com/fwlink/?LinkId=862008 |
request | HEAD http://go.microsoft.com/fwlink/?LinkId=249120&clcid=0x409 |
request | GET http://go.microsoft.com/fwlink/?LinkId=249120&clcid=0x409 |
request | HEAD https://download.microsoft.com/download/b/9/5/b95136c0-58a0-48df-821a-d05319a86852/enu_NETFX/amd64_netfx_full_mzz/netfx_full_cab.exe |
request | HEAD https://download.visualstudio.microsoft.com/download/pr/7db06743-abf0-4a85-a9d3-5af54b6cabcc/cc8282475d16202c4dca707e83cf0ae0/netfx_full_x64.msi |
request | GET https://download.visualstudio.microsoft.com/download/pr/7db06743-abf0-4a85-a9d3-5af54b6cabcc/cc8282475d16202c4dca707e83cf0ae0/netfx_full_x64.msi |
request | HEAD https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/61ef25faf2ae00460f6a77e29327699a/netfx_patch_x64.msp |
request | GET https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/61ef25faf2ae00460f6a77e29327699a/netfx_patch_x64.msp |
request | HEAD https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/f0771dabc43ba46cfe9e3481840a7944/windows6.1-kb4019990-x64.cab |
request | GET https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/f0771dabc43ba46cfe9e3481840a7944/windows6.1-kb4019990-x64.cab |
request | HEAD https://download.visualstudio.microsoft.com/download/pr/375f6a02-34bc-4b7d-ad8b-957789cf81e8/e4abafc291524af6e2b478f5d4857f0a/netfx_full_x64.msi |
request | GET https://download.visualstudio.microsoft.com/download/pr/375f6a02-34bc-4b7d-ad8b-957789cf81e8/e4abafc291524af6e2b478f5d4857f0a/netfx_full_x64.msi |
file | C:\Users\test22\AppData\Local\Temp\is-T1SK8.tmp\idp.dll |
file | C:\a26b2ef62474b6e3da4af3\1049\SetupResources.dll |
file | C:\Users\test22\AppData\Local\Temp\is-V3M4S.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-T1SK8.tmp\_isetup\_shfoldr.dll |
file | C:\a26b2ef62474b6e3da4af3\1042\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1041\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1033\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1031\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1040\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\Setup.exe |
file | C:\a26b2ef62474b6e3da4af3\2070\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1055\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1044\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1043\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\SetupEngine.dll |
file | C:\a26b2ef62474b6e3da4af3\TMPC2AA.tmp.exe.tmp\netfx_fullcab.msi |
file | C:\a26b2ef62474b6e3da4af3\1028\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1025\SetupResources.dll |
file | C:\Users\test22\AppData\Local\Temp\is-V3M4S.tmp\idp.dll |
file | C:\a26b2ef62474b6e3da4af3\1030\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1035\SetupResources.dll |
file | C:\Users\test22\AppData\Local\Temp\is-V3M4S.tmp\postback.exe |
file | C:\a26b2ef62474b6e3da4af3\2052\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1029\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1045\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1036\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1053\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1038\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\SetupUi.dll |
file | C:\a26b2ef62474b6e3da4af3\3082\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\sqmapi.dll |
file | C:\a26b2ef62474b6e3da4af3\1046\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\SetupUtility.exe |
file | C:\a26b2ef62474b6e3da4af3\1032\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\1037\SetupResources.dll |
file | C:\a26b2ef62474b6e3da4af3\SetupUtility.exe |
file | C:\a26b2ef62474b6e3da4af3\TMPC2AA.tmp.exe |
file | C:\Users\test22\AppData\Local\Temp\is-T1SK8.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-IUK9L.tmp\setup.tmp |
file | C:\Users\test22\AppData\Local\Temp\is-T1SK8.tmp\idp.dll |
MicroWorld-eScan | Trojan.GenericKD.37941357 |
FireEye | Trojan.GenericKD.37941357 |
APEX | Malicious |
Webroot | W32.Adware.Gen |
GData | Trojan.GenericKD.37941357 |
MAX | malware (ai score=80) |