Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 11, 2023, 10:52 p.m. | June 11, 2023, 11:18 p.m. |
-
-
ojawar2.1.exe "C:\Users\test22\AppData\Local\Temp\ojawar2.1.exe"
2056
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
hightense.duckdns.org | 84.54.50.66 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 84.54.50.66:6060 -> 192.168.56.103:49165 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 192.168.56.103:49165 -> 84.54.50.66:6060 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
domain | hightense.duckdns.org |
file | C:\Users\test22\AppData\Roaming\ravfbktpyie\njscxhqmv.exe |
file | C:\Users\test22\AppData\Local\Temp\nslBEA9.tmp\svyoyx.dll |
file | C:\Users\test22\AppData\Roaming\ravfbktpyie\njscxhqmv.exe |
file | C:\Users\test22\AppData\Local\Temp\nslBEA9.tmp\svyoyx.dll |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\qajfoxtdyir | reg_value | C:\Users\test22\AppData\Roaming\ravfbktpyie\njscxhqmv.exe "C:\Users\test22\AppData\Local\Temp\ojawar2.1.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
MicroWorld-eScan | Trojan.Generic.33921099 |
McAfee | Artemis!6B43C223D7BF |
Malwarebytes | Generic.Malware/Suspicious |
Sangfor | Infostealer.Win32.Agent.Vo1z |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | TrojanPSW:Win32/Stealer.386515a4 |
K7GW | Trojan ( 005a6cb51 ) |
Arcabit | Trojan.Generic.D205984B |
Cyren | W32/ABTrojan.ACUL-0640 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/Warzone.A |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | HEUR:Trojan-PSW.Win32.Stealer.gen |
BitDefender | Trojan.Generic.33921099 |
Avast | Win32:InjectorX-gen [Trj] |
Emsisoft | Trojan.Generic.33921099 (B) |
F-Secure | Trojan.TR/Injector.udwwj |
DrWeb | Trojan.PWS.Maria.3 |
VIPRE | Trojan.Generic.33921099 |
TrendMicro | Backdoor.Win32.WARZONE.YXDFJZ |
McAfee-GW-Edition | BehavesLike.Win32.Generic.cc |
FireEye | Generic.mg.6b43c223d7bf1db3 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Injector |
Avira | TR/AD.GenShell.sarlx |
Microsoft | Trojan:Win32/Casdet!rfn |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Stealer.gen |
GData | Win32.Backdoor.AMRat.BMUOCS |
Detected | |
AhnLab-V3 | Infostealer/Win.Generic.C5395778 |
ALYac | Trojan.Generic.33921099 |
MAX | malware (ai score=85) |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Backdoor.Win32.WARZONE.YXDFJZ |
Rising | Trojan.Injector!8.C4 (CLOUD) |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | Win32:InjectorX-gen [Trj] |
DeepInstinct | MALICIOUS |