Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Jan. 22, 2023, 1:42 p.m. | Jan. 22, 2023, 2:07 p.m. |
-
-
gqffposnn.exe "C:\Users\test22\AppData\Local\Temp\gqffposnn.exe" C:\Users\test22\AppData\Local\Temp\mdsrjp.b
2064-
gqffposnn.exe "C:\Users\test22\AppData\Local\Temp\gqffposnn.exe"
2168
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
oneness.duckdns.org | 194.5.212.164 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 194.5.212.164:8336 -> 192.168.56.103:49166 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49166 -> 194.5.212.164:8336 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
domain | oneness.duckdns.org |
file | C:\Users\test22\AppData\Roaming\jewjxcer\csrepl.exe |
file | C:\Users\test22\AppData\Local\Temp\gqffposnn.exe |
file | C:\Users\test22\AppData\Roaming\jewjxcer\csrepl.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\gtqatowvssmhow | reg_value | C:\Users\test22\AppData\Roaming\jewjxcer\csrepl.exe "C:\Users\test22\AppData\Local\Temp\gqffposnn.exe" C:\Users\test22\AppData\Lo |
Lionic | Trojan.Win32.Generic.4!c |
MicroWorld-eScan | Trojan.Generic.33089215 |
FireEye | Trojan.Generic.33089215 |
McAfee | Artemis!37F6AA9E499C |
Cylance | Unsafe |
VIPRE | Trojan.Garf.Gen.6 |
K7AntiVirus | Trojan ( 005983031 ) |
Alibaba | Trojan:Win32/Redcap.9929eb4f |
Arcabit | Trojan.Garf.Gen.6 [many] |
Cyren | W32/Injector.BJH.gen!Eldorado |
Symantec | Packed.NSISPacker!g14 |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/Warzone.A |
Cynet | Malicious (score: 99) |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.Generic.33089215 |
Avast | Win32:Evo-gen [Trj] |
Tencent | Win32.Trojan-QQPass.QQRob.Czlw |
Emsisoft | Trojan.Generic.33089215 (B) |
DrWeb | Trojan.Inject4.51111 |
McAfee-GW-Edition | RDN/AveMariaRAT |
Webroot | W32.Trojan.Garf.Gen |
Avira | TR/AD.GenShell.moaku |
MAX | malware (ai score=84) |
Antiy-AVL | Trojan/Win32.Injector |
Kingsoft | win32.pswtroj.undef.a.(kcloud) |
Gridinsoft | Trojan.Win32.WarzoneRAT.bot |
Xcitium | Malware@#3iicfo4gkln97 |
Microsoft | Trojan:Win32/Casdet!rfn |
GData | Trojan.Generic.33089215 |
Detected | |
AhnLab-V3 | Malware/Win.Generic.R552621 |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaE.36212.cmW@aK7D9mj |
ALYac | Gen:Variant.Zusy.447396 |
Malwarebytes | Malware.AI.4276613666 |
Rising | Trojan.Injector!8.C4 (TFE:5:np9WwqyV8SI) |
Ikarus | Trojan.Win32.Injector |
Fortinet | W32/Injector.BJF!tr |
AVG | Win32:Evo-gen [Trj] |
Panda | Trj/GdSda.A |
CrowdStrike | win/malicious_confidence_100% (W) |