Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 9, 2023, 11:04 a.m. | June 9, 2023, 11:06 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
cloudbase-init.pw | 114.202.175.143 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2016778 | ET DNS Query to a *.pw domain - Likely Hostile | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
packer | Armadillo v1.71 |
resource name | None |
domain | cloudbase-init.pw | description | Palau domain TLD |
file | C:\Program Files (x86)\Google\36061329.dll |
cmdline | cmd.exe /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\64.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\64.exe" |
file | C:\Users\test22\AppData\Local\Temp\64.exe |
cmdline | cmd.exe /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\64.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\64.exe" |
cmdline | ping 127.0.0.1 -n 1 |
service_name | conhost | service_path | C:\Users\test22\AppData\Local\Temp\%SystemRoot%\System32\svchost.exe -k "conhost" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\conhost\Parameters\ServiceDll | reg_value | C:\Program Files (x86)\Google\36061329.dll |
file | C:\Users\test22\AppData\Local\Temp\64.exe |
Bkav | W32.FamVT.Renamer1.Trojan |
Lionic | Trojan.Win32.Siscos.tpvk |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.40455963 |
FireEye | Generic.mg.67dfc7730a6d1471 |
CAT-QuickHeal | Backdoor.VenikRI.S16788663 |
ALYac | Trojan.GenericKD.40455963 |
Cylance | unsafe |
VIPRE | Trojan.GenericKD.40455963 |
Sangfor | Suspicious.Win32.Save.ins |
K7AntiVirus | Trojan ( 00522d7f1 ) |
Alibaba | Malware:Win32/km_2ee9d.None |
K7GW | Trojan ( 00522d7f1 ) |
Cybereason | malicious.30a6d1 |
BitDefenderTheta | Gen:NN.ZexaF.36196.hy0@am1sDGne |
VirIT | Trojan.Win32.Dnldr23.CGCL |
Cyren | W32/Siscos.E.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | Win32/Farfli.CEN |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Dropper.Gh0stRAT-6997745-0 |
Kaspersky | Trojan.Win32.Siscos.wbm |
BitDefender | Trojan.GenericKD.40455963 |
NANO-Antivirus | Trojan.Win32.Siscos.enrcbv |
SUPERAntiSpyware | Adware.Farli/Variant |
Avast | Win32:CoinminerX-gen [Trj] |
Tencent | Trojan.Win32.Siscos.za |
Sophos | Troj/AutoG-AD |
F-Secure | Trojan.TR/AD.Farfli.cznig |
DrWeb | Trojan.DownLoader23.39271 |
Zillya | Trojan.Siscos.Win32.4780 |
TrendMicro | BKDR_ZEGOST.SM35 |
McAfee-GW-Edition | GenericRXBH-NF!67DFC7730A6D |
Emsisoft | Trojan.Farfli (A) |
SentinelOne | Static AI - Suspicious PE |
Jiangmin | Trojan.Siscos.cd |
Webroot | W32.Siscos |
Avira | TR/AD.Farfli.cznig |
Antiy-AVL | Trojan/Win32.Siscos |
Microsoft | Backdoor:Win32/Farfli.BH!MTB |
Gridinsoft | Trojan.Win32.Agent.vb!n |
Xcitium | TrojWare.Win32.GameThief.Magania.~NWABU@18g2sq |
Arcabit | Trojan.Generic.D2694F1B |
ViRobot | Trojan.Win32.Agent.114688.DM |
ZoneAlarm | Trojan.Win32.Siscos.wbm |
GData | Win32.Trojan.Siscos.A |
Detected | |
AhnLab-V3 | Trojan/Win32.Siscos.R199489 |