Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 4, 2023, 4:13 p.m. | July 4, 2023, 4:15 p.m. |
-
-
-
powershell.exe powershell Add-MpPreference -ExclusionPath C:\
2336 -
cmd.exe "C:\Windows\System32\cmd.exe"
2384 -
-
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2652 CREDAT:145409
2788
-
-
-
powershell.exe powershell Add-MpPreference -ExclusionPath C:\
2204
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49170 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49185 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49192 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49190 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49175 142.251.220.40:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google-analytics.com | 86:10:90:de:cf:b7:39:f1:b9:ad:dd:6e:b1:eb:f4:dd:1f:87:b7:b9 |
TLSv1 192.168.56.103:49201 142.251.130.14:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google-analytics.com | 86:10:90:de:cf:b7:39:f1:b9:ad:dd:6e:b1:eb:f4:dd:1f:87:b7:b9 |
TLSv1 192.168.56.103:49180 142.250.66.130:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.g.doubleclick.net | 02:21:05:63:22:19:67:74:3c:a2:6b:cd:5e:92:b7:78:d3:18:8f:20 |
TLSv1 192.168.56.103:49191 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49176 142.251.220.40:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google-analytics.com | 86:10:90:de:cf:b7:39:f1:b9:ad:dd:6e:b1:eb:f4:dd:1f:87:b7:b9 |
TLSv1 192.168.56.103:49189 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49188 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49184 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49186 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
TLSv1 192.168.56.103:49200 142.251.130.14:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google-analytics.com | 86:10:90:de:cf:b7:39:f1:b9:ad:dd:6e:b1:eb:f4:dd:1f:87:b7:b9 |
TLSv1 192.168.56.103:49181 142.250.66.130:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.g.doubleclick.net | 02:21:05:63:22:19:67:74:3c:a2:6b:cd:5e:92:b7:78:d3:18:8f:20 |
TLSv1 192.168.56.103:49187 51.91.30.159:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=www.upload.ee | 50:32:93:34:c8:04:2f:84:49:77:0d:c4:dd:ca:79:c9:cb:3e:c0:f4 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe |
resource name | WM_DSP |
request | GET http://serving.bepolite.eu/script?space=50dd7b0f-4105-441f-8f60-18cc3fcb090c&type=direct&page_id=670568&screen_width=1233&screen_height=841&os=Win32&refurl=&pageurl=file%3A%2F%2FC%3A%5CUsers%5Ctest22%5CAppData%5CRoaming%5ChDHm.nson.html&rnd=1688470430209 |
request | GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml |
request | GET https://www.upload.ee/files/15369657/IkemRats.exe.html |
request | GET https://www.googletagmanager.com/gtag/js?id=UA-6703115-1 |
request | GET https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js |
request | GET https://www.upload.ee/static/ubr__style.css |
request | GET https://www.upload.ee/images/dl_.png |
request | GET https://www.upload.ee/images/arrow.gif |
request | GET https://www.upload.ee/images/eng/logo.png |
request | GET https://www.upload.ee/js/js__file_upload.js |
request | GET https://www.upload.ee/images/eng/flag.png |
request | GET https://www.upload.ee/images/rus/flag.png |
request | GET https://www.upload.ee/images/est/flag.png |
request | GET https://www.upload.ee/images/menubg.gif |
request | GET https://www.googletagmanager.com/gtag/js?id=G-LT9YQX0N49&l=dataLayer&cx=c |
request | GET https://www.google-analytics.com/analytics.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Default\Login Data |
name | WM_DSP | language | LANG_ENGLISH | filetype | PE32 executable (GUI) Intel 80386, for MS Windows | sublanguage | SUBLANG_ARABIC_QATAR | offset | 0x0014f070 | size | 0x00002c00 |
file | C:\Users\test22\AppData\Local\Temp\softokn3.dll |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\js[1].js |
file | C:\Users\test22\AppData\Local\Temp\mozglue.dll |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\analytics[1].js |
file | C:\Users\test22\AppData\Local\Temp\nss3.dll |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\js[1].js |
file | C:\Users\test22\AppData\Local\Temp\vcruntime140.dll |
file | C:\Users\test22\AppData\Local\Temp\msvcp140.dll |
file | C:\Program Files\Microsoft DN1\sqlmap.dll |
file | C:\Users\test22\AppData\Local\Temp\freebl3.dll |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\js__file_upload[1].js |
file | C:\Windows\System32\rfxvmt.dll |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | C:\Windows\System32\cmd.exe |
cmdline | powershell Add-MpPreference -ExclusionPath C:\ |
file | C:\Users\test22\AppData\Roaming\hDHm.nson.html |
file | C:\Users\test22\AppData\Local\Temp\freebl3.dll |
file | C:\Users\test22\AppData\Local\Temp\mozglue.dll |
file | C:\Users\test22\AppData\Local\Temp\vcruntime140.dll |
file | C:\Users\test22\AppData\Local\Temp\msvcp140.dll |
file | C:\Users\test22\AppData\Local\Temp\nss3.dll |
file | C:\Users\test22\AppData\Local\Temp\softokn3.dll |
wmi |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2652 CREDAT:145409 |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome |
host | 117.18.232.200 | |||
host | 172.93.222.150 |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images | reg_value | C:\ProgramData\images.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll | reg_value | %ProgramFiles%\Microsoft DN1\sqlmap.dll |
file | C:\Users\test22\AppData\Roaming\Thunderbird\profiles.ini |
registry | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
file | C:\ProgramData\images.exe:Zone.Identifier |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agentb.trG2 |
Elastic | Windows.Trojan.AveMaria |
MicroWorld-eScan | Trojan.GenericKD.48410254 |
FireEye | Generic.mg.9e82efab8cc5b74a |
CAT-QuickHeal | Trojan.GenericRI.S22016029 |
McAfee | PWS-FDNF!9E82EFAB8CC5 |
Cylance | unsafe |
Zillya | Trojan.Agent.Win32.1391531 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0054d10e1 ) |
Alibaba | Malware:Win32/km_2ec7e.None |
K7GW | Trojan ( 0054d10e1 ) |
Cybereason | malicious.b8cc5b |
Arcabit | Trojan.Generic.D2E2AE8E |
BitDefenderTheta | Gen:NN.ZexaF.36270.hyW@aC46ikhi |
VirIT | Trojan.Win32.PSWStealer.CPI |
Cyren | W32/Antiav.INDT-0919 |
Symantec | Infostealer |
ESET-NOD32 | Win32/Warzone.A |
Cynet | Malicious (score: 100) |
APEX | Malicious |
ClamAV | Win.Malware.AveMaria-8799014-1 |
Kaspersky | Trojan.Win32.Agentb.jiad |
BitDefender | Trojan.GenericKD.48410254 |
NANO-Antivirus | Trojan.Win32.AntiAV.fljpfv |
SUPERAntiSpyware | Trojan.Agent/Gen-Kryptik |
Avast | Win32:Malware-gen |
Tencent | Trojan.Win32.Agentb.fba |
TACHYON | Trojan-PWS/W32.WarzoneRat.115712 |
Emsisoft | Trojan.Agent (A) |
F-Secure | Trojan.TR/Redcap.ghjpt |
DrWeb | Trojan.Uacbypass.28 |
VIPRE | Trojan.GenericKD.48410254 |
TrendMicro | TrojanSpy.Win32.MOCRT.SM |
McAfee-GW-Edition | BehavesLike.Win32.Generic.ch |
Trapmine | malicious.high.ml.score |
Sophos | Troj/Mocrt-A |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan.Agentb.eab |
Webroot | W32.Trojan.Gen |
Avira | TR/Redcap.ghjpt |
Antiy-AVL | Trojan/Win32.Agent |
Gridinsoft | Trojan.Win32.WarzoneRAT.bot |
Xcitium | TrojWare.Win32.AntiAV.VA@81mmki |
Microsoft | Trojan:Win32/Avemaria!ic |
ViRobot | Trojan.Win32.Agent.1392640.E |
ZoneAlarm | Trojan.Win32.Agentb.jiad |
GData | Win32.Backdoor.AveMaria.A |
Detected |