Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 25, 2023, 5:35 p.m. | May 25, 2023, 5:46 p.m. |
-
-
PEP2.tmp "C:\Users\test22\AppData\Local\Temp\is-196DR.tmp\PEP2.tmp" /SL5="$80178,140559,56832,C:\Users\test22\AppData\Local\Temp\PEP2.exe"
2604-
-
Kobonewuju.exe "C:\Users\test22\AppData\Local\Temp\ed-57f66-9e7-d698d-a6c0312e1dca6\Kobonewuju.exe"
2080
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49170 185.244.226.4:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=link.storjshare.io | ef:8c:1d:0f:34:70:c2:fe:82:ba:2e:e4:b1:d3:10:79:a3:e4:9b:84 |
TLS 1.2 192.168.56.101:49169 52.219.140.16:443 |
C=US, O=Amazon, CN=Amazon RSA 2048 M01 | CN=*.s3.eu-central-1.amazonaws.com | 0a:60:dd:74:9f:3c:a8:45:07:d7:82:2d:33:8b:29:e1:53:36:f8:c3 |
TLS 1.2 192.168.56.101:49168 172.217.31.4:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=www.google.com | 48:e3:15:66:fc:ea:15:bf:d2:34:c1:dd:60:d4:23:a3:63:57:89:8d |
TLSv1 192.168.56.101:49179 37.230.138.123:443 |
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49 |
TLSv1 192.168.56.101:49167 37.230.138.123:443 |
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49 |
TLS 1.2 192.168.56.101:49171 185.244.226.4:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=link.storjshare.io | ef:8c:1d:0f:34:70:c2:fe:82:ba:2e:e4:b1:d3:10:79:a3:e4:9b:84 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | CODE |
section | DATA |
section | BSS |
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST https://connectini.net/Series/SuperNitouDisc.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://link.storjshare.io/s/jxjnpyegksik26mz4wqismdyexpq/yokoso/fullham/enel/hand-M2u7HcEuL9S7AFLW.exe?download=1 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://link.storjshare.io/jx573tmlnr5wf7adrak4haxbcyra/yokoso/fullham/enel/up-do-dat-M2u7HcEuL9S7AFLW.exe?download=1 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://wewewe.s3.eu-central-1.amazonaws.com/WeUninstalled.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://link.storjshare.io/s/jx573tmlnr5wf7adrak4haxbcyra/yokoso/fullham/enel/up-do-dat-M2u7HcEuL9S7AFLW.exe?download=1 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://www.google.com/ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://connectini.net/S2S/Disc/Disc.php?ezok=flabs2&tesla=7 | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST https://connectini.net/Series/Conumer2kenpachi.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://connectini.net/Series/kenpachi/2/goodchannel/KR.json | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://connectini.net/Series/configPoduct/2/goodchannel.json |
request | HEAD http://link.storjshare.io/juwxjm5rlewtkplox6e4e3btskgq/yokoso%2Ffullham%2Fmanatara%2Fpoweroff.exe?download=1 |
request | GET http://link.storjshare.io/s/juwxjm5rlewtkplox6e4e3btskgq/yokoso/fullham/manatara/poweroff.exe?download=1 |
request | GET http://link.storjshare.io/juwxjm5rlewtkplox6e4e3btskgq/yokoso%2Ffullham%2Fmanatara%2Fpoweroff.exe?download=1 |
request | POST http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies |
request | POST https://connectini.net/Series/SuperNitouDisc.php |
request | GET https://link.storjshare.io/s/jxjnpyegksik26mz4wqismdyexpq/yokoso/fullham/enel/hand-M2u7HcEuL9S7AFLW.exe?download=1 |
request | GET https://link.storjshare.io/jx573tmlnr5wf7adrak4haxbcyra/yokoso/fullham/enel/up-do-dat-M2u7HcEuL9S7AFLW.exe?download=1 |
request | GET https://wewewe.s3.eu-central-1.amazonaws.com/WeUninstalled.exe |
request | GET https://link.storjshare.io/s/jx573tmlnr5wf7adrak4haxbcyra/yokoso/fullham/enel/up-do-dat-M2u7HcEuL9S7AFLW.exe?download=1 |
request | GET https://www.google.com/ |
request | GET https://connectini.net/S2S/Disc/Disc.php?ezok=flabs2&tesla=7 |
request | POST https://connectini.net/Series/Conumer2kenpachi.php |
request | GET https://connectini.net/Series/kenpachi/2/goodchannel/KR.json |
request | GET https://connectini.net/Series/configPoduct/2/goodchannel.json |
request | POST http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies |
request | POST https://connectini.net/Series/SuperNitouDisc.php |
request | POST https://connectini.net/Series/Conumer2kenpachi.php |
file | C:\Users\test22\AppData\Local\Temp\88-504c6-392-927b3-57722369cb9ad\Qunyjaxory.exe |
file | C:\Users\test22\AppData\Local\Temp\ed-57f66-9e7-d698d-a6c0312e1dca6\Kobonewuju.exe |
file | C:\Users\test22\AppData\Local\Temp\is-AP389.tmp\GABRIEL.exe |
file | C:\Program Files (x86)\Hnc\Waebilopity.exe |
file | C:\Users\test22\AppData\Local\Temp\is-AP389.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-AP389.tmp\idp.dll |
file | C:\Users\test22\AppData\Local\Temp\ed-57f66-9e7-d698d-a6c0312e1dca6\Kobonewuju.exe |
file | C:\Users\test22\AppData\Local\Temp\88-504c6-392-927b3-57722369cb9ad\Qunyjaxory.exe |
file | C:\Users\test22\AppData\Local\Temp\is-AP389.tmp\GABRIEL.exe |
file | C:\Users\test22\AppData\Local\Temp\is-196DR.tmp\PEP2.tmp |
file | C:\Users\test22\AppData\Local\Temp\is-AP389.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\ed-57f66-9e7-d698d-a6c0312e1dca6\Kobonewuju.exe |
file | C:\Users\test22\AppData\Local\Temp\is-AP389.tmp\idp.dll |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover | reg_value | "C:\Program Files (x86)\Hnc\Waebilopity.exe" |
file | C:\Users\test22\AppData\Local\Temp\is-AP389.tmp\GABRIEL.exe |
Lionic | Trojan.Win32.Csdi.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Babar.139346 |
McAfee | Artemis!0B79FBF16B76 |
Cylance | unsafe |
VIPRE | Gen:Variant.Babar.139346 |
Sangfor | Downloader.Win32.Agent.Vdl8 |
K7AntiVirus | Adware ( 0054654b1 ) |
K7GW | Adware ( 0054654b1 ) |
Cybereason | malicious.292f34 |
Arcabit | Trojan.Babar.D22052 |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Adload.NVT |
Cynet | Malicious (score: 99) |
APEX | Malicious |
Kaspersky | UDS:Trojan-Downloader.MSIL.Csdi.hs |
BitDefender | Gen:Variant.Babar.139346 |
Avast | FileRepMalware [Drp] |
Tencent | Win32.Trojan.Agen.Vsmw |
Sophos | Mal/Generic-S |
F-Secure | Heuristic.HEUR/AGEN.1338864 |
DrWeb | Trojan.Siggen16.39632 |
McAfee-GW-Edition | BehavesLike.Win32.AdwareFileTour.fc |
FireEye | Gen:Variant.Babar.139346 |
Emsisoft | Gen:Variant.Babar.139346 (B) |
Avira | HEUR/AGEN.1338864 |
Gridinsoft | Malware.Win32.Gen.bot |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ZoneAlarm | UDS:Trojan-Downloader.MSIL.Csdi.hs |
GData | Gen:Variant.Babar.139346 |
Detected | |
AhnLab-V3 | Trojan/Win.Tnega.C5245603 |
ALYac | Gen:Variant.Babar.139346 |
MAX | malware (ai score=88) |
Ikarus | Win32.Outbreak |
MaxSecure | Trojan.Malware.124227219.susgen |
AVG | FileRepMalware [Drp] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_60% (W) |