Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 6, 2023, 11:56 a.m. | May 6, 2023, 12:03 p.m. |
-
-
ostaj2.1.exe "C:\Users\test22\AppData\Local\Temp\ostaj2.1.exe"
2056
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
jeron7.duckdns.org | 212.8.244.201 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 212.8.244.201:2905 -> 192.168.56.103:49165 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49165 -> 212.8.244.201:2905 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
domain | jeron7.duckdns.org |
file | C:\Users\test22\AppData\Roaming\wwgclluqqajjf\okktdyyhqq.exe |
file | C:\Users\test22\AppData\Local\Temp\nsbBF65.tmp\graaj.dll |
file | C:\Users\test22\AppData\Roaming\wwgclluqqajjf\okktdyyhqq.exe |
file | C:\Users\test22\AppData\Local\Temp\nsbBF65.tmp\graaj.dll |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\mvvrbbkgp | reg_value | C:\Users\test22\AppData\Roaming\wwgclluqqajjf\okktdyyhqq.exe "C:\Users\test22\AppData\Local\Temp\ostaj2.1.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
MicroWorld-eScan | Trojan.Generic.33633730 |
FireEye | Generic.mg.c544c36f9031c1c1 |
Malwarebytes | Trojan.Injector.NSIS |
Sangfor | Backdoor.Win32.Injector.Vk65 |
K7AntiVirus | Trojan ( 005a4efb1 ) |
Alibaba | Trojan:Win32/InjectorX.27cbd176 |
K7GW | Trojan ( 005a4efb1 ) |
Cybereason | malicious.f9031c |
Cyren | W32/Injector.BMS.gen!Eldorado |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ESXU |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 99) |
BitDefender | Trojan.Generic.33633730 |
Emsisoft | Trojan.Generic.33633730 (B) |
F-Secure | Trojan.TR/Redcap.bwlpo |
VIPRE | Gen:Variant.Nemesis.22799 |
TrendMicro | Backdoor.Win32.WARZONE.YXDEEZ |
McAfee-GW-Edition | BehavesLike.Win32.Generic.cc |
Trapmine | malicious.moderate.ml.score |
Sophos | Mal/Generic-S |
Webroot | W32.Malware.Gen |
Avira | TR/AD.MortyStealer.sogyy |
MAX | malware (ai score=85) |
Gridinsoft | Trojan.Win32.WarzoneRAT.bot |
Arcabit | Trojan.Generic.D20135C2 |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Stealer.gen |
Microsoft | Backdoor:Win32/WarzoneRAT.GA!MTB |
Detected | |
AhnLab-V3 | Infostealer/Win.Generic.R563828 |
Acronis | suspicious |
McAfee | Artemis!C544C36F9031 |
Cylance | unsafe |
TrendMicro-HouseCall | Backdoor.Win32.WARZONE.YXDEEZ |
Rising | Dropper.Nuldrop!8.12FBE (TFE:6:JVqELmcccnI) |
Ikarus | Trojan.Inject |
Fortinet | W32/Injector_AGen.WA!tr |
DeepInstinct | MALICIOUS |