Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 26, 2023, 7:36 a.m. | June 26, 2023, 7:38 a.m. |
-
-
-
netsh.exe netsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=3389
2344
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
microsoft.com | 20.112.250.133 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 179.43.162.58:5200 -> 192.168.56.103:49163 | 2038897 | ET MALWARE Warzone RAT Response (Inbound) | A Network Trojan was detected |
TCP 179.43.162.58:5200 -> 192.168.56.103:49163 | 2038897 | ET MALWARE Warzone RAT Response (Inbound) | A Network Trojan was detected |
TCP 192.168.56.103:49168 -> 20.70.246.20:80 | 2260002 | SURICATA Applayer Detect protocol only one direction | Generic Protocol Command Decode |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe |
resource name | WM_DSP |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 3\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 11\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 20\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 1\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 5\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 10\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 8\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 4\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 15\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 18\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 9\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 2\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 13\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 16\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 7\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 6\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 17\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 12\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 14\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 19\Login Data |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Default\Login Data |
name | WM_DSP | language | LANG_ENGLISH | filetype | PE32 executable (GUI) Intel 80386, for MS Windows | sublanguage | SUBLANG_ARABIC_QATAR | offset | 0x00156070 | size | 0x00002c00 |
file | C:\Users\test22\AppData\Local\Temp\softokn3.dll |
file | C:\Users\test22\AppData\Local\Temp\vcruntime140.dll |
file | C:\Users\test22\AppData\Local\Temp\mozglue.dll |
file | C:\Users\test22\AppData\Local\Temp\nss3.dll |
file | C:\Program Files\Microsoft DN1\sqlmap.dll |
file | C:\Users\test22\AppData\Local\Temp\msvcp140.dll |
file | C:\Users\test22\AppData\Local\Temp\freebl3.dll |
file | C:\Users\test22\AppData\Local\Temp\172.exe |
file | C:\Windows\System32\rfxvmt.dll |
file | C:\Users\test22\AppData\Local\Temp\172.exe |
file | C:\Users\test22\AppData\Local\Temp\freebl3.dll |
file | C:\Users\test22\AppData\Local\Temp\mozglue.dll |
file | C:\Users\test22\AppData\Local\Temp\vcruntime140.dll |
file | C:\Users\test22\AppData\Local\Temp\172.exe |
file | C:\Users\test22\AppData\Local\Temp\msvcp140.dll |
file | C:\Users\test22\AppData\Local\Temp\nss3.dll |
file | C:\Users\test22\AppData\Local\Temp\softokn3.dll |
wmi |
cmdline | netsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=3389 |
host | 179.43.162.58 |
reg_key | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll | reg_value | %ProgramFiles%\Microsoft DN1\sqlmap.dll |
cmdline | netsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=3389 |
file | C:\Users\test22\AppData\Roaming\Thunderbird\profiles.ini |
registry | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003 |
file | C:\Users\test22\AppData\Local\Temp\wa.exe:Zone.Identifier |
Bkav | W32.AIDetectMalware |
Elastic | Windows.Trojan.AveMaria |
MicroWorld-eScan | Generic.Dacic.B09FDD2A.A.194148F5 |
McAfee | PWS-FDNF!4A04139D91DF |
Malwarebytes | Generic.Malware.AI.DDS |
Zillya | Trojan.Agent.Win32.3406532 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0054d10e1 ) |
K7GW | Trojan ( 0054d10e1 ) |
Cybereason | malicious.d91df7 |
Arcabit | Generic.Dacic.B09FDD2A.A.194148F5 |
VirIT | Trojan.Win32.Genus.QJS |
Cyren | W32/Antiav.INDT-0919 |
Symantec | Infostealer |
ESET-NOD32 | a variant of Win32/Warzone.A |
Cynet | Malicious (score: 100) |
APEX | Malicious |
ClamAV | Win.Downloader.Powershell-9856919-0 |
Kaspersky | Trojan.Win32.Agentb.jiad |
BitDefender | Generic.Dacic.B09FDD2A.A.194148F5 |
NANO-Antivirus | Trojan.Win32.AntiAV.fljpfv |
Avast | Win32:Malware-gen |
Tencent | Malware.Win32.Gencirc.10bebf78 |
Emsisoft | Generic.Dacic.B09FDD2A.A.194148F5 (B) |
F-Secure | Trojan.TR/Redcap.ghjpt |
DrWeb | Trojan.Uacbypass.28 |
VIPRE | Generic.Dacic.B09FDD2A.A.194148F5 |
TrendMicro | TrojanSpy.Win32.MOCRT.SM |
McAfee-GW-Edition | BehavesLike.Win32.Upatre.ch |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.4a04139d91df7de0 |
Sophos | Mal/EncPk-MP |
Ikarus | Trojan.Win32.Warzone |
Avira | TR/Redcap.ghjpt |
Antiy-AVL | Trojan[APT]/Win32.Confucius |
Microsoft | Trojan:Win32/Guildma!ic |
ZoneAlarm | Trojan.Win32.Agentb.jiad |
GData | Win32.Trojan.PSE.38UUO1 |
Detected | |
AhnLab-V3 | Trojan/Win32.AveMaria.R263895 |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaF.36270.iyW@ayAdNKci |
ALYac | Generic.Dacic.B09FDD2A.A.194148F5 |
MAX | malware (ai score=87) |
Cylance | unsafe |
Panda | Trj/Genetic.gen |
Zoner | Trojan.Win32.74962 |
TrendMicro-HouseCall | TrojanSpy.Win32.MOCRT.SM |
Rising | Stealer.AveMaria!1.E64D (CLASSIC) |
SentinelOne | Static AI - Malicious PE |