Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 8, 2021, 1:11 p.m. | Nov. 8, 2021, 1:13 p.m. |
-
-
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2772 -
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2780 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\123.exe" -Force
1948 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\123.exe" -Force
2800 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\123.exe" -Force
2600 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force
3028 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force
3040 -
deforcing.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe"
2020-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
1488 -
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2660 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force
1604 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force
2400 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force
2292 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\appertaining\svchost.exe" -Force
776 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force
2528 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\appertaining\svchost.exe" -Force
644 -
aspnet_regsql.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"
2152
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\123.exe" -Force
2328 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\appertaining\svchost.exe" -Force
2596 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\123.exe" -Force
1060 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\appertaining\svchost.exe" -Force
2832 -
aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
2468
-
-
OlecranonsCasein.exe "C:\Users\test22\AppData\Local\Temp\OlecranonsCasein.exe"
2764
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
62.113.112.212 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\test.bat |
file | C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\123.exe |
file | C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\test.bat |
file | C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\test.bat |
file | C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\OlecranonsCasein.exe |
file | C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\test.bat |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\appertaining\svchost.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\appertaining\svchost.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\123.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deforcing.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\123.exe" -Force |
file | C:\Users\test22\AppData\Local\Temp\123.exe |
file | C:\Users\test22\AppData\Local\Temp\OlecranonsCasein.exe |
file | C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\OlecranonsCasein.exe |
file | C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\123.exe |
section | {u'size_of_data': u'0x00134000', u'virtual_address': u'0x00002000', u'entropy': 7.716996148196171, u'name': u'.text', u'virtual_size': u'0x00133fe4'} | entropy | 7.7169961482 | description | A section with a high entropy has been found | |||||||||
entropy | 0.998379254457 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\96b5728a-2182-4ac6-9780-9a4835abb8a7\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\5df72808-f7e9-414c-9780-53e050306c4c\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | "C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\2ad87d7e-5e5e-4ada-9506-bd9e47fde881\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
cmdline | C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\AdvancedRun.exe /EXEFilename "C:\Users\test22\AppData\Local\Temp\e132ee2c-eb4f-4b88-a7bf-8f1f582dc6da\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run |
host | 62.113.112.212 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\deforcing | reg_value | C:\Windows\Resources\Themes\appertaining\svchost.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\deforcing | reg_value | C:\Windows\Resources\Themes\appertaining\svchost.exe |
file | C:\Users\test22\AppData\Local\Temp\OlecranonsCasein.exe |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |