Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 27, 2023, 10:18 a.m. | March 27, 2023, 10:20 a.m. |
-
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\fd369298e4\oneetx.exe" /F
2172 -
cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "test22:N"&&CACLS "oneetx.exe" /P "test22:R" /E&&echo Y|CACLS "..\fd369298e4" /P "test22:N"&&CACLS "..\fd369298e4" /P "test22:R" /E&&Exit
2224-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2304 -
cacls.exe CACLS "oneetx.exe" /P "test22:N"
2340 -
cacls.exe CACLS "oneetx.exe" /P "test22:R" /E
2396 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2444 -
cacls.exe CACLS "..\fd369298e4" /P "test22:N"
2480 -
cacls.exe CACLS "..\fd369298e4" /P "test22:R" /E
2536
-
-
RedHat.exe "C:\Users\test22\AppData\Local\Temp\1000091001\RedHat.exe"
3060 -
Lamb.exe "C:\Users\test22\AppData\Local\Temp\1000092001\Lamb.exe"
2356
-
-
IP Address | Status | Action |
---|---|---|
121.254.136.27 | Active | Moloch |
142.250.204.142 | Active | Moloch |
142.250.204.65 | Active | Moloch |
142.250.204.67 | Active | Moloch |
142.250.66.138 | Active | Moloch |
142.251.220.3 | Active | Moloch |
142.251.220.45 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.217.24.68 | Active | Moloch |
172.217.27.35 | Active | Moloch |
34.120.48.173 | Active | Moloch |
78.46.242.112 | Active | Moloch |
79.137.248.23 | Active | Moloch |
91.107.196.27 | Active | Moloch |
Suricata Alerts
Suricata TLS
section | rdata0 |
section | rdata1 |
section | rdata2 |
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://78.46.242.112/so57Nst/index.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://78.46.242.112/so57Nst/index.php?scr=1 | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://79.137.248.23/RedHat.exe | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://91.107.196.27/75e7ead3c17835de.php | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://79.137.248.23/Lamb.pif.exe |
request | POST http://78.46.242.112/so57Nst/index.php |
request | POST http://78.46.242.112/so57Nst/index.php?scr=1 |
request | GET http://79.137.248.23/RedHat.exe |
request | POST http://91.107.196.27/75e7ead3c17835de.php |
request | GET http://79.137.248.23/Lamb.pif.exe |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://clients2.google.com/time/1/current?cup2key=4:1168666890&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
request | GET http://www.gstatic.com/generate_204 |
request | POST http://78.46.242.112/so57Nst/index.php |
request | POST http://78.46.242.112/so57Nst/index.php?scr=1 |
request | POST http://91.107.196.27/75e7ead3c17835de.php |
file | C:\Users\test22\AppData\Local\Temp\1000092001\Lamb.exe |
file | C:\Users\test22\AppData\Local\Temp\1000091001\RedHat.exe |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\fd369298e4\oneetx.exe" /F |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "test22:N"&&CACLS "oneetx.exe" /P "test22:R" /E&&echo Y|CACLS "..\fd369298e4" /P "test22:N"&&CACLS "..\fd369298e4" /P "test22:R" /E&&Exit |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\test22\AppData\Local\Temp\fd369298e4\oneetx.exe" /F |
file | C:\Users\test22\AppData\Local\Temp\1000091001\RedHat.exe |
file | C:\Users\test22\AppData\Local\Temp\1000091001\RedHat.exe |