Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 1, 2023, 6:36 p.m. | June 1, 2023, 6:46 p.m. |
-
-
dd.exe "C:\Users\test22\AppData\Local\Temp\dd.exe"
2052
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
www.google.com | 142.250.207.100 | |
killabean.duckdns.org | 91.228.10.173 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 91.228.10.173:3203 -> 192.168.56.103:49165 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
TCP 192.168.56.103:49165 -> 91.228.10.173:3203 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe |
section | .ndata |
domain | killabean.duckdns.org |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Temp\nsqC11A.tmp\cboxe.dll |
file | C:\Users\test22\AppData\Roaming\uennjsooxhddm\vrrbwggplttdy.exe |
file | C:\Users\test22\AppData\Local\Temp\nsqC11A.tmp\cboxe.dll |
file | C:\Users\test22\AppData\Roaming\uennjsooxhddm\vrrbwggplttdy.exe |
host | 5.206.225.104 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\yiennwscclhqqm | reg_value | C:\Users\test22\AppData\Roaming\uennjsooxhddm\vrrbwggplttdy.exe "C:\Users\test22\AppData\Local\Temp\dd.exe" |
file | C:\Users\test22\AppData\Roaming\Thunderbird\profiles.ini |
registry | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003 |
process | dd.exe | useragent | Internal | ||||||
process | dd.exe | useragent | Mozilla/32.0 (compatible) |
dead_host | 5.206.225.104:80 |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Generic.33845441 |
FireEye | Generic.mg.6ea6237fd00b52f5 |
McAfee | Artemis!6EA6237FD00B |
Cylance | unsafe |
VIPRE | Gen:Variant.Nemesis.22835 |
Sangfor | Trojan.Win32.Injector.V5jy |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | Trojan:Win32/Injector.15901841 |
Arcabit | Trojan.Generic.D20470C1 |
Cyren | W32/Injector.BNP.gen!Eldorado |
Symantec | Trojan Horse |
ESET-NOD32 | a variant of Win32/Injector.ESZN |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan-PSW.Win32.Stealer.gen |
BitDefender | Trojan.Generic.33845441 |
Avast | Win32:PWSX-gen [Trj] |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/AD.GenShell.hljqx |
McAfee-GW-Edition | BehavesLike.Win32.Generic.cc |
Trapmine | malicious.moderate.ml.score |
Emsisoft | Trojan.Generic.33845441 (B) |
Ikarus | Trojan.NSIS.Agent |
Webroot | W32.Trojan.FL |
Avira | TR/AD.GenShell.hljqx |
MAX | malware (ai score=84) |
Antiy-AVL | Trojan/Win32.Injector |
Microsoft | Trojan:Win32/Woreflint.A!cl |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Stealer.gen |
GData | Win32.Backdoor.AMRat.15OBZH |
Detected | |
AhnLab-V3 | Backdoor/Win.AveMaria.C5435795 |
BitDefenderTheta | Gen:NN.ZedlaF.36250.fq4@aWiCB!f |
ALYac | Trojan.NSISX.Spy.Gen.24 |
Malwarebytes | Trojan.AgentTesla |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R002H0DEV23 |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/Injector.ESZJ!tr |
AVG | Win32:PWSX-gen [Trj] |
Cybereason | malicious.952726 |
DeepInstinct | MALICIOUS |