Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 8, 2023, 1:59 p.m. | July 8, 2023, 2:05 p.m. |
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Users\test22\AppData\Roaming\Nvidia&&cmd /c timeout 1&&cmd /c reg.exe import add.txt
2188-
-
timeout.exe timeout 1
2292
-
-
-
reg.exe reg.exe import add.txt
2428
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Users\test22\AppData\Roaming\Nvidia&&cmd /c timeout 1&&cmd /c C:\Windows\SysWOW64\rundll32.exe /sta {39980D1E-8C57-42CA-BFBA-2B1DBEDF00F0} 오후 6:19:23
2476-
-
timeout.exe timeout 1
2616
-
-
cmd.exe cmd /c C:\Windows\SysWOW64\rundll32.exe /sta {39980D1E-8C57-42CA-BFBA-2B1DBEDF00F0} 오후 6:19:23
2660-
rundll32.exe C:\Windows\SysWOW64\rundll32.exe /sta {39980D1E-8C57-42CA-BFBA-2B1DBEDF00F0} 오후 6:19:23
2712
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
fkswxfc.com | 45.74.19.119 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | wextract.pdb |
resource name | AVI |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\n1.ocx |
file | C:\Users\test22\AppData\Roaming\Nvidia\Core.ocx |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\n2.ocx |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\AMD.exe |
cmdline | "C:\Windows\System32\cmd.exe" /c cd C:\Users\test22\AppData\Roaming\Nvidia&&cmd /c timeout 1&&cmd /c reg.exe import add.txt |
cmdline | "C:\Windows\System32\cmd.exe" /c cd C:\Users\test22\AppData\Roaming\Nvidia&&cmd /c timeout 1&&cmd /c C:\Windows\SysWOW64\rundll32.exe /sta {39980D1E-8C57-42CA-BFBA-2B1DBEDF00F0} 오후 6:19:23 |
file | C:\Users\test22\AppData\Roaming\Nvidia\Core.ocx |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\AMD.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\n2.ocx |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\n1.ocx |
section | {u'size_of_data': u'0x00146000', u'virtual_address': u'0x0000d000', u'entropy': 7.7806335914796625, u'name': u'.rsrc', u'virtual_size': u'0x00145e8c'} | entropy | 7.78063359148 | description | A section with a high entropy has been found | |||||||||
entropy | 0.970599181243 | description | Overall entropy of this PE file is high |
cmdline | "C:\Windows\System32\cmd.exe" /c cd C:\Users\test22\AppData\Roaming\Nvidia&&cmd /c timeout 1&&cmd /c reg.exe import add.txt |
cmdline | cmd /c reg.exe import add.txt |
cmdline | cmd /c cd C:\Users\test22\AppData\Roaming\Nvidia&&cmd /c timeout 1&&cmd /c reg.exe import add.txt |
cmdline | reg.exe import add.txt |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 | reg_value | rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP000.TMP\" | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Logintech_000001 | reg_value | C:\Windows\SysWOW64\rundll32.exe /sta {39980D1E-8C57-42CA-BFBA-2B1DBEDF00F0} "Keyboard" |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\AMD.exe |
wmi | Select * from AntiVirusProduct |
Bkav | W32.AIDetectMalware |
FireEye | Generic.mg.c3baac987bee5800 |
McAfee | Artemis!C3BAAC987BEE |
Malwarebytes | Malware.AI.1989220308 |
Sangfor | Trojan.Win32.Agent.Vxo4 |
Cybereason | malicious.a453cb |
Cyren | W32/Kryptik.AUI.gen!Eldorado |
Elastic | malicious (high confidence) |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Avast | Win32:Malware-gen |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.tc |
Trapmine | malicious.high.ml.score |
Antiy-AVL | Trojan/Win32.SGeneric |
Detected | |
VBA32 | BScope.Trojan.Wacatac |
Cylance | unsafe |
Rising | Trojan.Injector!8.C4 (CLOUD) |
Fortinet | Malicious_Behavior.SB |
AVG | Win32:Malware-gen |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_60% (W) |