Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 30, 2023, 9:30 a.m. | May 30, 2023, 9:37 a.m. |
-
-
macrigan2.1.exe "C:\Users\test22\AppData\Local\Temp\macrigan2.1.exe"
2176
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
cmark.duckdns.org | 185.206.215.165 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.206.215.165:5165 -> 192.168.56.103:49168 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49168 -> 185.206.215.165:5165 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 185.206.215.165:5165 -> 192.168.56.103:49166 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
domain | cmark.duckdns.org |
file | C:\Users\test22\AppData\Roaming\kktpyhdm\irbwgpl.exe |
file | C:\Users\test22\AppData\Local\Temp\nskC11A.tmp\yaybccuz.dll |
file | C:\Users\test22\AppData\Local\Temp\nskC11A.tmp\yaybccuz.dll |
file | C:\Users\test22\AppData\Roaming\kktpyhdm\irbwgpl.exe |
host | 77.91.68.62 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\uqajfoxtdxhq | reg_value | C:\Users\test22\AppData\Roaming\kktpyhdm\irbwgpl.exe "C:\Users\test22\AppData\Local\Temp\macrigan2.1.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Nemesis.22787 |
Cylance | unsafe |
VIPRE | Gen:Variant.Nemesis.22787 |
Sangfor | Trojan.Win32.Injector.Vp9i |
K7AntiVirus | Trojan ( 005a5fd91 ) |
Alibaba | TrojanPSW:Win32/Stealer.ce9c1144 |
K7GW | Trojan ( 005a5fd91 ) |
Cybereason | malicious.e5682c |
Arcabit | Trojan.Nemesis.D5903 [many] |
Cyren | W32/ABRisk.NIGP-1678 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ESZG |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | HEUR:Trojan-PSW.Win32.Stealer.gen |
BitDefender | Gen:Variant.Nemesis.22787 |
Avast | Win32:InjectorX-gen [Trj] |
Tencent | Win32.Trojan-QQPass.QQRob.Rzfl |
Emsisoft | Gen:Variant.Nemesis.22787 (B) |
F-Secure | Trojan.TR/Redcap.arzob |
DrWeb | Trojan.Uacbypass.28 |
TrendMicro | Backdoor.Win32.WARZONE.YXDE1Z |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
FireEye | Generic.mg.c5f9705e5682c034 |
Sophos | Mal/Generic-S |
Avira | TR/AD.GenShell.uirrr |
MAX | malware (ai score=84) |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Stealer.gen |
GData | Zum.Androm.1 |
Detected | |
AhnLab-V3 | Trojan/Win.NsisInject.C5433582 |
Acronis | suspicious |
McAfee | Artemis!C5F9705E5682 |
Malwarebytes | Generic.Malware/Suspicious |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | Backdoor.Win32.WARZONE.YXDE1Z |
Rising | Trojan.Nsisinject!8.11178 (TFE:5:8WvLT3aNmWT) |
Ikarus | Trojan.Win32.Injector |
Fortinet | W32/Injector.ESYW!tr |
BitDefenderTheta | Gen:NN.ZedlaF.36250.gm4@aKKOiLk |
AVG | Win32:InjectorX-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |