Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 20, 2023, 7:29 a.m. | June 20, 2023, 7:40 a.m. |
-
-
juneowar2.1.exe "C:\Users\test22\AppData\Local\Temp\juneowar2.1.exe"
2132
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
ifedinma.duckdns.org | 84.54.50.66 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 84.54.50.66:6060 -> 192.168.56.103:49165 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49165 -> 84.54.50.66:6060 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
domain | ifedinma.duckdns.org |
file | C:\Users\test22\AppData\Local\Temp\nsxC1B7.tmp\kgthrdsiq.dll |
file | C:\Users\test22\AppData\Roaming\rwgclupyien\jscxhqmv.exe |
file | C:\Users\test22\AppData\Roaming\rwgclupyien\jscxhqmv.exe |
file | C:\Users\test22\AppData\Local\Temp\nsxC1B7.tmp\kgthrdsiq.dll |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\rbkgpytdyir | reg_value | C:\Users\test22\AppData\Roaming\rwgclupyien\jscxhqmv.exe "C:\Users\test22\AppData\Local\Temp\juneowar2.1.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Nemesis.22777 |
FireEye | Generic.mg.ec77a84dddf6fef0 |
McAfee | Artemis!EC77A84DDDF6 |
Cylance | unsafe |
VIPRE | Gen:Variant.Nemesis.22777 |
Sangfor | Trojan.Win32.Agent.Vuoz |
Cybereason | malicious.dddf6f |
Arcabit | Trojan.Nemesis.D58F9 [many] |
Cyren | W32/Injector.BOF.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ETBA |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Gen:Variant.Nemesis.22777 |
Avast | FileRepMalware [Trj] |
Emsisoft | Gen:Variant.Nemesis.22777 (B) |
F-Secure | Heuristic.HEUR/AGEN.1337959 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Sophos | Mal/Generic-S |
Ikarus | Trojan.NSIS.Agent |
Webroot | W32.Malware.Gen |
Avira | HEUR/AGEN.1337959 |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Zum.Androm.1 |
Detected | |
AhnLab-V3 | Trojan/Win.NSISInject.R495658 |
MAX | malware (ai score=86) |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R002H07FJ23 |
Rising | Trojan.Avemariarat!8.11CB9 (TFE:6:M0iIpRjbqhI) |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | FileRepMalware [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |