Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Feb. 2, 2023, 11:30 a.m. | Feb. 2, 2023, 11:33 a.m. |
-
-
Viposhopami.exe "C:\Users\test22\AppData\Local\Temp\64-f4e04-c63-98d8d-23884bc27b79f\Viposhopami.exe"
2896-
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
2836-
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2836 CREDAT:145409
604
-
-
-
-
poweroff.tmp "C:\Users\test22\AppData\Local\Temp\is-NK702.tmp\poweroff.tmp" /SL5="$8012C,490199,350720,C:\Program Files\Windows Mail\IMRMEEDGJJ\poweroff.exe" /VERYSILENT
2988-
Power Off.exe "C:\Program Files (x86)\powerOff\Power Off.exe" -silent -desktopShortcut -programMenu
800
-
-
-
Lupisaeguwu.exe "C:\Users\test22\AppData\Local\Temp\85-2a844-436-38eb4-cee5932e512e3\Lupisaeguwu.exe"
3028
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49165 216.155.20.140:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.c12.e2-1.dev | f4:2e:74:ce:19:13:4f:d4:b2:f4:6f:11:2a:21:4f:ac:1b:db:f1:48 |
TLSv1 192.168.56.101:49178 37.230.138.123:443 |
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49 |
TLSv1 192.168.56.101:49164 37.230.138.123:443 |
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49 |
TLS 1.2 192.168.56.101:49166 216.155.20.140:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.c12.e2-1.dev | f4:2e:74:ce:19:13:4f:d4:b2:f4:6f:11:2a:21:4f:ac:1b:db:f1:48 |
TLSv1 192.168.56.101:49189 192.243.59.20:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=profitabletrustednetwork.com | f7:40:fe:06:98:43:c6:e1:58:b9:b4:b8:6c:ec:bc:6b:d7:3a:c7:44 |
TLS 1.2 192.168.56.101:49167 52.219.75.132:443 |
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon | CN=*.s3.eu-central-1.amazonaws.com | bc:92:6b:62:48:5f:c5:08:60:03:a9:1e:bc:29:58:79:d7:4b:94:fb |
TLSv1 192.168.56.101:49188 192.243.59.20:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=profitabletrustednetwork.com | f7:40:fe:06:98:43:c6:e1:58:b9:b4:b8:6c:ec:bc:6b:d7:3a:c7:44 |
TLSv1 192.168.56.101:49180 37.230.138.123:443 |
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.google.com/ | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST https://connectini.net/Series/SuperNitouDisc.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://wewewe.s3.eu-central-1.amazonaws.com/WeUninstalled.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://n8w5.c12.e2-1.dev/doma/Villains-Wiki/pub-LJWuMU9jpVNtx.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://n8w5.c12.e2-1.dev/doma/Villains-Wiki/hand-LJWuMU9jpVNtx.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://n8w5.c12.e2-1.dev/doma/widgets/powerOff.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://n8w5.c12.e2-1.dev/doma/Villains-Wiki/up-do-dat-LJWuMU9jpVNtx.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://connectini.net/S2S/Disc/Disc.php?ezok=power2off2&tesla=8 | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST https://connectini.net/Series/Conumer2kenpachi.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST https://connectini.net/Series/Conumer4Publisher.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://connectini.net/Series/publisher/1/KR.json | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://connectini.net/Series/kenpachi/2/goodchannel/KR.json | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://connectini.net/Series/configPoduct/2/goodchannel.json |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | POST http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies |
request | GET http://www.google.com/ |
request | POST https://connectini.net/Series/SuperNitouDisc.php |
request | GET https://wewewe.s3.eu-central-1.amazonaws.com/WeUninstalled.exe |
request | GET https://n8w5.c12.e2-1.dev/doma/Villains-Wiki/pub-LJWuMU9jpVNtx.exe |
request | GET https://n8w5.c12.e2-1.dev/doma/Villains-Wiki/hand-LJWuMU9jpVNtx.exe |
request | GET https://n8w5.c12.e2-1.dev/doma/widgets/powerOff.exe |
request | GET https://n8w5.c12.e2-1.dev/doma/Villains-Wiki/up-do-dat-LJWuMU9jpVNtx.exe |
request | GET https://connectini.net/S2S/Disc/Disc.php?ezok=power2off2&tesla=8 |
request | POST https://connectini.net/Series/Conumer2kenpachi.php |
request | POST https://connectini.net/Series/Conumer4Publisher.php |
request | GET https://connectini.net/Series/publisher/1/KR.json |
request | GET https://connectini.net/Series/kenpachi/2/goodchannel/KR.json |
request | GET https://connectini.net/Series/configPoduct/2/goodchannel.json |
request | POST http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies |
request | POST https://connectini.net/Series/SuperNitouDisc.php |
request | POST https://connectini.net/Series/Conumer2kenpachi.php |
request | POST https://connectini.net/Series/Conumer4Publisher.php |
description | Viposhopami.exe tried to sleep 206 seconds, actually delayed analysis time by 206 seconds | |||
description | Lupisaeguwu.exe tried to sleep 181 seconds, actually delayed analysis time by 181 seconds |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\powerOff.lnk |
file | C:\Users\Public\Desktop\powerOff.lnk |
file | C:\Program Files\Windows Mail\IMRMEEDGJJ\poweroff.exe |
file | C:\Program Files (x86)\Windows Sidebar\Lukyqypolo.exe |
file | C:\Users\test22\AppData\Local\Temp\64-f4e04-c63-98d8d-23884bc27b79f\Viposhopami.exe |
file | C:\Users\test22\AppData\Local\Temp\85-2a844-436-38eb4-cee5932e512e3\Lupisaeguwu.exe |
file | C:\Users\test22\AppData\Local\Temp\is-UKO1T.tmp\_isetup\_shfoldr.dll |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\powerOff.lnk |
file | C:\Users\Public\Desktop\powerOff.lnk |
file | C:\Users\test22\AppData\Local\Temp\64-f4e04-c63-98d8d-23884bc27b79f\Viposhopami.exe |
file | C:\Program Files\Windows Mail\IMRMEEDGJJ\poweroff.exe |
file | C:\Users\test22\AppData\Local\Temp\85-2a844-436-38eb4-cee5932e512e3\Lupisaeguwu.exe |
file | C:\Users\test22\AppData\Local\Temp\64-f4e04-c63-98d8d-23884bc27b79f\Viposhopami.exe |
file | C:\Users\test22\AppData\Local\Temp\is-NK702.tmp\poweroff.tmp |
file | C:\Users\test22\AppData\Local\Temp\85-2a844-436-38eb4-cee5932e512e3\Lupisaeguwu.exe |
file | C:\Users\test22\AppData\Local\Temp\is-UKO1T.tmp\_isetup\_shfoldr.dll |
section | {u'size_of_data': u'0x00044400', u'virtual_address': u'0x00002000', u'entropy': 6.956665632554608, u'name': u'.text', u'virtual_size': u'0x00044264'} | entropy | 6.95666563255 | description | A section with a high entropy has been found | |||||||||
entropy | 0.47936786655 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2836 CREDAT:145409 |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6 |
cmdline | C:\Program Files (x86)\Internet Explorer\iexplore.exe https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6 |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover | reg_value | "C:\Program Files (x86)\Windows Sidebar\Lukyqypolo.exe" |
cmdline | "C:\Program Files (x86)\powerOff\Power Off.exe" -silent -desktopShortcut -programMenu |