Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Feb. 27, 2023, 9:24 a.m. | Feb. 27, 2023, 9:37 a.m. |
-
-
-
taskkill.exe taskkill /f /im chrome.exe
2264
-
-
-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xb0,0xb4,0xb8,0x84,0xbc,0x7fef3716e00,0x7fef3716e10,0x7fef3716e20
2528
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.ippfinfo.top | 178.18.252.110 | |
iplogger.org | 148.251.234.83 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49161 178.18.252.110:443 |
C=CN, O=TrustAsia Technologies, Inc., CN=TrustAsia RSA DV TLS CA G2 | CN=www.ippfinfo.top | d3:a0:ee:8d:57:c1:a8:45:01:49:11:aa:77:a0:96:06:3f:c2:e1:5b |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\86.0.4240.111\Locales |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
section | .xauqcph |
section | .yxojxqx |
resource name | ZIP |
request | GET https://www.ippfinfo.top/ |
domain | www.ippfinfo.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Last Version |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 1\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Preferences |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\First Run |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Policy\User Policy |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\1ab4d48c-7866-413e-9b79-103c9698d414.dmp |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 1\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-63FC640E-978.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3 |
name | ZIP | language | LANG_CHINESE | filetype | Zip archive data, at least v1.0 to extract | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00162fd0 | size | 0x0000c2c2 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00162180 | size | 0x00000ca8 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00162e28 | size | 0x00000014 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | PGP symmetric key encrypted data - Plaintext or unencrypted data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00162e40 | size | 0x0000018c |
file | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\aes.js |
file | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\jquery-3.3.1.min.js |
file | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\pad-nopadding.js |
file | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\content.js |
file | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\background.js |
file | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\mode-ecb.js |
cmdline | cmd.exe /c taskkill /f /im chrome.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe") |
section | {u'size_of_data': u'0x0000d600', u'virtual_address': u'0x00162000', u'entropy': 7.797548856018583, u'name': u'.rsrc', u'virtual_size': u'0x0000d418'} | entropy | 7.79754885602 | description | A section with a high entropy has been found |
cmdline | cmd.exe /c taskkill /f /im chrome.exe |
cmdline | taskkill /f /im chrome.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1040,3154081050703671251,908888056568054633,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1032 /prefetch:2 | ||||||
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xb0,0xb4,0xb8,0x84,0xbc,0x7fef3716e00,0x7fef3716e10,0x7fef3716e20 |
Lionic | Trojan.Win32.FBStealer.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.65662402 |
McAfee | Artemis!CD2CD260BDC5 |
Malwarebytes | Spyware.Socelars |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Spyware ( 0056c7821 ) |
Alibaba | TrojanSpy:Win32/RedLineStealer.64ea0cbf |
K7GW | Spyware ( 0056c7821 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefenderTheta | Gen:NN.ZexaF.36276.CH0@aKcHYFcj |
Cyren | W32/ABRisk.OMER-8187 |
Symantec | ML.Attribute.HighConfidence |
tehtris | Generic.Malware |
ESET-NOD32 | a variant of Win32/Spy.Agent.PYV |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan.Script.FBStealer.gen |
BitDefender | Trojan.GenericKD.65662402 |
Avast | Win32:PWSX-gen [Trj] |
Tencent | Script.Trojan.Fbstealer.Uimw |
Emsisoft | Trojan.GenericKD.65662402 (B) |
F-Secure | Heuristic.HEUR/AGEN.1213343 |
DrWeb | Trojan.Siggen19.56605 |
VIPRE | Trojan.GenericKD.65662402 |
TrendMicro | TROJ_GEN.R002C0DBO23 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.th |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.cd2cd260bdc51afa |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Spy.Win32.Agent |
Avira | HEUR/AGEN.1213343 |
Microsoft | Trojan:Win32/RedLineStealer.RT!MTB |
Gridinsoft | Spy.Win32.Socelars.bot |
Arcabit | Trojan.Generic.D3E9EDC2 |
ViRobot | Trojan.Win.Z.Fragtor.1508864.A |
ZoneAlarm | HEUR:Trojan.Script.FBStealer.gen |
GData | Trojan.GenericKD.65662402 |
Detected | |
AhnLab-V3 | Trojan/Win.REDLINESTEALER.C5388052 |
VBA32 | BScope.Trojan.Agentb |
ALYac | Gen:Variant.Fragtor.27219 |
MAX | malware (ai score=80) |
Cylance | unsafe |
TrendMicro-HouseCall | TROJ_GEN.R002C0DBO23 |
Rising | Stealer.FBAdsCard!1.CE03 (CLASSIC) |
SentinelOne | Static AI - Suspicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | PossibleThreat.ZDS |