Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Jan. 28, 2023, 10:49 p.m. | Jan. 28, 2023, 11:28 p.m. |
-
-
cmd.exe C:\Windows\system32\cmd.exe /c schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1
2688-
schtasks.exe schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1
2796
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
Name | Response | Post-Analysis Lookup |
---|---|---|
ninja1337.zapto.org | 94.207.64.73 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2028703 | ET POLICY DNS Query to DynDNS Domain *.zapto .org | Potentially Bad Traffic |
UDP 192.168.56.101:54148 -> 164.124.101.2:53 | 2028703 | ET POLICY DNS Query to DynDNS Domain *.zapto .org | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
section | aHc |
section | Security |
packer | UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
domain | ninja1337.zapto.org |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SBADLH.lnk |
file | C:\Users\test22\AppData\Roaming\Windata\system.exe |
file | C:\Users\test22\AppData\Local\Temp\SBADLH.vbs |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SBADLH.lnk |
cmdline | schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1 |
cmdline | C:\Windows\system32\cmd.exe /c schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1 |
file | C:\Users\test22\AppData\Roaming\Windata\system.exe |
section | {u'size_of_data': u'0x0005a200', u'virtual_address': u'0x000f0000', u'entropy': 7.913543981454384, u'name': u'Security', u'virtual_size': u'0x0005b000'} | entropy | 7.91354398145 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00072000', u'virtual_address': u'0x0014b000', u'entropy': 7.956578929974608, u'name': u'.rsrc', u'virtual_size': u'0x00072000'} | entropy | 7.95657892997 | description | A section with a high entropy has been found | |||||||||
entropy | 1.0 | description | Overall entropy of this PE file is high |
process | wscript.exe |
cmdline | schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1 |
cmdline | C:\Windows\system32\cmd.exe /c schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\SBADLH | reg_value | "C:\Users\test22\AppData\Roaming\Windata\system.exe" | ||||||
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SBADLH.lnk | ||||||||
cmdline | schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1 | ||||||||
cmdline | C:\Windows\system32\cmd.exe /c schtasks /create /tn SBADLH.exe /tr C:\Users\test22\AppData\Roaming\Windata\system.exe /sc minute /mo 1 |
wmi | Select * from AntiVirusProduct |
dead_host | 94.207.64.73:4000 |
Bkav | W32.AIDetectNet.01 |
Lionic | Trojan.Win32.LodaRat.4!c |
tehtris | Generic.Malware |
MicroWorld-eScan | Trojan.GenericKD.65162573 |
FireEye | Generic.mg.9e870f801dd75929 |
ALYac | Trojan.GenericKD.65162573 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0056c7c41 ) |
Alibaba | Backdoor:Script/LodaRat.b9d7053f |
Cybereason | malicious.01dd75 |
Arcabit | Trojan.Generic.D3E24D4D |
Cyren | W32/AutoIt.VB.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Autoit.EJ |
Cynet | Malicious (score: 100) |
APEX | Malicious |
ClamAV | Txt.Malware.LodaRAT-9769386-0 |
Kaspersky | HEUR:Backdoor.Script.LodaRat.a |
BitDefender | Trojan.GenericKD.65162573 |
Avast | AutoIt:KeyLogger-R [Trj] |
Tencent | Script.Backdoor.Lodarat.Gkjl |
Emsisoft | Trojan.GenericKD.65162573 (B) |
F-Secure | Heuristic.HEUR/AGEN.1201152 |
DrWeb | Trojan.AutoIt.1195 |
VIPRE | Trojan.GenericKD.65162573 |
TrendMicro | TROJ_GEN.R03BC0PAQ23 |
McAfee-GW-Edition | BehavesLike.Win32.TrojanAitInject.cc |
Sophos | Mal/Generic-S (PUA) |
Jiangmin | Trojan.AutoItScript.c |
Webroot | W32.Trojan.GenKD |
Avira | HEUR/AGEN.1201152 |
MAX | malware (ai score=81) |
Antiy-AVL | Trojan[Backdoor]/Script.Lodarat |
Gridinsoft | Trojan.Heur!.03212061 |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ZoneAlarm | VHO:Backdoor.Win32.Convagent.gen |
GData | Trojan.GenericKD.65162573 |
Detected | |
McAfee | Artemis!9E870F801DD7 |
VBA32 | Trojan.Autoit.F |
Malwarebytes | Malware.AI.2574267502 |
TrendMicro-HouseCall | TROJ_GEN.R03BC0PAQ23 |
Rising | Backdoor.888Rat/Autoit!1.C8E3 (CLASSIC) |
Ikarus | Trojan.Autoit |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | AutoIt/Agent.DB!tr |
BitDefenderTheta | AI:Packer.1D0DF3E616 |
AVG | AutoIt:KeyLogger-R [Trj] |