Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 4, 2023, 5:54 p.m. | May 4, 2023, 5:58 p.m. |
-
-
-
-
RegSvcs.exe "C:\Users\test22\AppData\Local\Temp\RegSvcs.exe"
2980
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
report1.duckdns.org | 185.16.38.253 | |
geoplugin.net | 178.237.33.50 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:54148 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.101:54148 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 192.168.56.101:49169 -> 185.16.38.253:3380 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49169 185.16.38.253:3380 |
None | None | None |
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
section | .didat |
resource name | PNG |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geoplugin.net/json.gp |
domain | report1.duckdns.org |
request | GET http://geoplugin.net/json.gp |
description | RegSvcs.exe tried to sleep 328 seconds, actually delayed analysis time by 328 seconds |
file | C:\eegv\suqw.pdf |
file | C:\eegv\vxeodm.xls |
file | C:\eegv\wesaswarpm.xls |
file | C:\eegv\pxxt.docx |
file | C:\eegv\gwvkihgbth.ppt |
file | C:\eegv\fvkctce.pdf |
file | C:\eegv\mvjxf.xls |
file | C:\eegv\jolojgkvt.pdf |
file | C:\eegv\hfdmlkv.xls |
file | C:\eegv\pcgh.docx |
file | C:\eegv\oqpg.docx |
file | C:\eegv\cqmorjr.docx |
file | C:\eegv\qwquwr.pdf |
file | C:\eegv\crupx.xls |
file | C:\eegv\gitpqumj.docx |
file | C:\eegv\dwktvnq.ppt |
file | C:\eegv\oked.ppt |
file | C:\eegv\ncvwgifaxh.pdf |
file | C:\eegv\eepvjjf.pif |
file | C:\eegv\Update-ia.c.vbe |
file | C:\eegv\reujc.dll |
file | C:\eegv\buge.exe |
file | C:\Users\test22\temp\nulfijae.exe |
file | C:\eegv\wcnortcu.exe |
file | C:\eegv\nulfijae.exe |
file | C:\eegv\kcuvdpkpmh.dll |
file | C:\eegv\fmdx.exe |
file | C:\eegv\eepvjjf.pif |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Win.Trojan.agentTesla | rule | Win_Trojan_agentTesla_Zero | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Run a KeyLogger | rule | KeyLogger |
buffer | Buffer with sha1: 4ac9fbf738fde247afd4049ae3b4bf8a9a099cf2 |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate | reg_value | c:\eegv\eepvjjf.pif c:\eegv\buge.exe |