Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 22, 2023, 8:43 a.m. | April 22, 2023, 8:45 a.m. |
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
avarian717.duckdns.org | 193.56.29.183 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 193.56.29.183:5050 -> 192.168.56.103:49166 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49166 -> 193.56.29.183:5050 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
domain | avarian717.duckdns.org |
file | C:\Users\test22\AppData\Local\Temp\ajulw.exe |
file | C:\Users\test22\AppData\Roaming\nwglhqavfo\ktpxhdmv.exe |
file | C:\Users\test22\AppData\Local\Temp\ajulw.exe |
file | C:\Users\test22\AppData\Local\Temp\ajulw.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\rbwgplueajf | reg_value | C:\Users\test22\AppData\Roaming\nwglhqavfo\ktpxhdmv.exe "C:\Users\test22\AppData\Local\Temp\ajulw.exe" C:\Users\test22\AppData\Lo |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.24 |
FireEye | Generic.mg.fcb1534a561fc1fe |
McAfee | Artemis!FCB1534A561F |
Malwarebytes | Generic.Malware/Suspicious |
VIPRE | Trojan.NSISX.Spy.Gen.24 |
Alibaba | Ransom:Win32/GandCrypt.884 |
CrowdStrike | win/malicious_confidence_100% (W) |
Symantec | Packed.NSISPacker!g14 |
ESET-NOD32 | a variant of Win32/Injector.ESWW |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 99) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.NSISX.Spy.Gen.24 |
Avast | Win32:PWSX-gen [Trj] |
Emsisoft | Trojan.NSISX.Spy.Gen.24 (B) |
McAfee-GW-Edition | BehavesLike.Win32.Worm.cc |
Trapmine | malicious.moderate.ml.score |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Inject |
Webroot | W32.Trojan.NSISX.Spy |
Avira | TR/AD.GenShell.xofbd |
Arcabit | Trojan.NSISX.Spy.Gen.24 [many] |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Trojan.NSISX.Spy.Gen.24 (2x) |
Detected | |
AhnLab-V3 | Infostealer/Win.Generic.R563828 |
ALYac | Trojan.NSISX.Spy.Gen.24 |
MAX | malware (ai score=80) |
Cylance | unsafe |
Rising | Trojan.VecStealer!8.180E7 (CLOUD) |
Fortinet | W32/Injector.ESWS!tr |
BitDefenderTheta | Gen:NN.ZexaE.36164.cqW@aiCWzhbi |
AVG | Win32:PWSX-gen [Trj] |
DeepInstinct | MALICIOUS |