Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 24, 2023, 6:07 p.m. | March 24, 2023, 6:16 p.m. |
-
-
-
taskkill.exe TASKKILL /IM chrome.exe /F
2896
-
-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --load-extension="C:\Users\test22\AppData\Roaming\extension_chrome"
3004-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef435f1e8,0x7fef435f1f8,0x7fef435f208
1964 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3008 --on-initialized-event-handle=308 --parent-handle=312 /prefetch:6
2284
-
-
cmd.exe cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\test22\AppData\Local\Temp\rc.exe"
1120-
PING.EXE ping 1.1.1.1 -n 1 -w 3000
1356
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
Name | Response | Post-Analysis Lookup |
---|---|---|
techcosupportservice.com | 198.251.84.36 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
file | C:\Program Files\Mozilla Firefox |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe\Path |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://techcosupportservice.com/ext/manifest.json | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://techcosupportservice.com/ext/background.js | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://techcosupportservice.com/ext/main.js |
request | GET http://techcosupportservice.com/ext/manifest.json |
request | GET http://techcosupportservice.com/ext/background.js |
request | GET http://techcosupportservice.com/ext/main.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata |
file | C:\Users\test22\AppData\Roaming\extension_chrome\background.js |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Chrome.lnk |
file | C:\Users\test22\AppData\Roaming\extension_chrome\main.js |
file | C:\Users\test22\Desktop\Google Chrome.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Chrome.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EditPlus.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Sidebar.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Fax and Scan.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Chrome.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Anytime Upgrade.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Firefox.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk |
file | C:\Users\test22\Desktop\Google Chrome.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer (64-bit).lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Chrome.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\XPS Viewer.lnk |
cmdline | "C:\Windows\System32\cmd.exe" /c TASKKILL /IM chrome.exe /F |
cmdline | cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\test22\AppData\Local\Temp\rc.exe" |
cmdline | cmd.exe /c TASKKILL /IM chrome.exe /F |
file | C:\Users\test22\AppData\Local\Temp\rc.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe") |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Windows\System32\cmd.exe" /c TASKKILL /IM chrome.exe /F |
cmdline | ping 1.1.1.1 -n 1 -w 3000 |
cmdline | TASKKILL /IM chrome.exe /F |
cmdline | cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\test22\AppData\Local\Temp\rc.exe" |
cmdline | cmd.exe /c TASKKILL /IM chrome.exe /F |
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef435f1e8,0x7fef435f1f8,0x7fef435f208 | ||||||
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3008 --on-initialized-event-handle=308 --parent-handle=312 /prefetch:6 |
Lionic | Trojan.Win32.Doina.4!c |
MicroWorld-eScan | Gen:Variant.Doina.26970 |
FireEye | Generic.mg.50e9958bb2a5b6ae |
ALYac | Gen:Variant.Doina.26970 |
Cylance | unsafe |
Sangfor | Trojan.Win32.Agent.Vnku |
CrowdStrike | win/malicious_confidence_90% (W) |
Arcabit | Trojan.Doina.D695A |
BitDefenderTheta | Gen:NN.ZexaF.36344.iuW@aaNToTki |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
Cynet | Malicious (score: 99) |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Gen:Variant.Doina.26970 |
VIPRE | Gen:Variant.Doina.26970 |
McAfee-GW-Edition | BehavesLike.Win32.NetLoader.ch |
Trapmine | suspicious.low.ml.score |
Emsisoft | Gen:Variant.Doina.26970 (B) |
Webroot | W32.Trojan.Gen |
Avira | HEUR/AGEN.1319003 |
Gridinsoft | Malware.Win32.Downloader.cc |
Microsoft | Trojan:Win32/Casdet!rfn |
GData | Gen:Variant.Doina.26970 |
McAfee | Artemis!50E9958BB2A5 |
MAX | malware (ai score=88) |
VBA32 | suspected of Trojan.Downloader.gen |
TrendMicro-HouseCall | TROJ_GEN.R002H07CN23 |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Malicious_Behavior.SBX |
Panda | Trj/Chgt.AD |