Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 18, 2023, 7:16 a.m. | July 18, 2023, 7:25 a.m. |
-
-
csrssfs.exe "C:\Users\test22\AppData\Local\Temp\csrssfs.exe"
2652
-
IP Address | Status | Action |
---|---|---|
103.127.237.208 | Active | Moloch |
152.228.216.134 | Active | Moloch |
154.204.233.149 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.96.191.121 | Active | Moloch |
18.214.48.22 | Active | Moloch |
185.104.28.238 | Active | Moloch |
192.254.233.88 | Active | Moloch |
198.177.123.159 | Active | Moloch |
217.194.134.187 | Active | Moloch |
43.129.164.18 | Active | Moloch |
45.33.6.223 | Active | Moloch |
93.125.99.130 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.wtwbenefitsapp.com/6tjv/?vv-9CC=ZekHcMczm1dRtokxNZDo90S9mkxwTcZYZfHK9EQ1vrBiXxapRt+GBgnIAZ7NmICX8PlBD4kZJKEGkx1iFxsaaM15ARq/tjezy4yawwM=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ready-sim.com/6tjv/?vv-9CC=vP6NfS7dbW4c/VsB/A1JURezZpJQ8nsbdWFTlOVf6iuLILrS76/L187Vau3Zr+6SA7xbkoW8K+sU0FMWlbfewoyXotU6Wa8RuVm/2CU=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ioddinemax.info/6tjv/?vv-9CC=fT/TJdNtCaICjnQUbIUnRDxeECYphy4YrVvAjvU+q1IskcVwc07AsJLK3tqtGnkOp8a2PyJB1vyRLc2GY7t3W09lxia7P5+VAS1NVX4=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.unrushlagos.life/6tjv/?vv-9CC=xlJUlHglSOoU+WCfb7fTPB0ne55wcB2OinDKM2+2ognpQIYysf1z9BtCtwIQWly94RFYkrYMsBdvlNEOmEGbARRcASpMTevagbuBWCs=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.innerpeasnutrition.com/6tjv/?vv-9CC=WCkonbtgklsJqt3U5AwYJ1vBQL+yzEkdXA8xucMJZCRnQC5eVhyQZD76BbsvWN4F2+2X9EJdLRzHIYbKsSuvhyO7xMyIhyiPV1yBlVw=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fokusdongs89.click/6tjv/?vv-9CC=lddPhGieQ3lEt24wxfGSZqEKUhgeh07HzuUXm/iAUma5yHruZSDAYtghKLMKtfuJW8oz7rp+ckpMDOoMhDPkb2WQy1Gqr+rGodidlkk=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.pzr9.com/6tjv/?vv-9CC=Xe+4czuF8BNTvCl2jtutD0nc61uG19PQTHhiWjCSfHaBQ4NOq8i8K6quZY+U+HiY2tqWNVv2/OiMBhH2zz7G+0xdm39gVqvBoSlQlAk=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.subicpearlresorthotel.com/6tjv/?vv-9CC=z8EanEHhaicdSPwbUmMymlHZg3JWg4d9/pg0TpyNm6NFsGct/BtDMX7PWnf5Qsg1SQP92ELHhW5VyKkGW4ou1D5KNmy23lxxfwDNRJc=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.touslesjeudis-test2.ovh/6tjv/?vv-9CC=/1l307yFeMFeHrk4mAgZBkH4SykpTjYiA/5hCG+BMYVXlwubXDmDfEwOCf1sFfh9qMjxTdQuOFbq+mW+2MyEO3xWCYiKD3QyLOwlqdk=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.minsk-adstr.pro/6tjv/?vv-9CC=Plpwe/Vj3Si6m7s4WjkFQxqA5vT0CFMrYA9s5aV5DJ4PZlRiX3dSCC0X24ZLQNtV+tbWCzZMNx9DmPvcY1vaNPprvVENxM3YounydDs=&pq2FH=S4AijUGo | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.jsmaiyou.com/6tjv/?vv-9CC=GT7mDBetp/BsCYP1aTCFpL/ADJtJH8x8/gvfm7l4NLF0tD2iOM8XYGcDii6V0tjr8Xc6kwylBNXtOHbYpVwzl/f1TWI72f0ir/DsOw8=&pq2FH=S4AijUGo |
request | POST http://www.wtwbenefitsapp.com/6tjv/ |
request | GET http://www.wtwbenefitsapp.com/6tjv/?vv-9CC=ZekHcMczm1dRtokxNZDo90S9mkxwTcZYZfHK9EQ1vrBiXxapRt+GBgnIAZ7NmICX8PlBD4kZJKEGkx1iFxsaaM15ARq/tjezy4yawwM=&pq2FH=S4AijUGo |
request | GET http://www.sqlite.org/2019/sqlite-dll-win32-x86-3280000.zip |
request | POST http://www.ready-sim.com/6tjv/ |
request | GET http://www.ready-sim.com/6tjv/?vv-9CC=vP6NfS7dbW4c/VsB/A1JURezZpJQ8nsbdWFTlOVf6iuLILrS76/L187Vau3Zr+6SA7xbkoW8K+sU0FMWlbfewoyXotU6Wa8RuVm/2CU=&pq2FH=S4AijUGo |
request | POST http://www.ioddinemax.info/6tjv/ |
request | GET http://www.ioddinemax.info/6tjv/?vv-9CC=fT/TJdNtCaICjnQUbIUnRDxeECYphy4YrVvAjvU+q1IskcVwc07AsJLK3tqtGnkOp8a2PyJB1vyRLc2GY7t3W09lxia7P5+VAS1NVX4=&pq2FH=S4AijUGo |
request | POST http://www.unrushlagos.life/6tjv/ |
request | GET http://www.unrushlagos.life/6tjv/?vv-9CC=xlJUlHglSOoU+WCfb7fTPB0ne55wcB2OinDKM2+2ognpQIYysf1z9BtCtwIQWly94RFYkrYMsBdvlNEOmEGbARRcASpMTevagbuBWCs=&pq2FH=S4AijUGo |
request | POST http://www.innerpeasnutrition.com/6tjv/ |
request | GET http://www.innerpeasnutrition.com/6tjv/?vv-9CC=WCkonbtgklsJqt3U5AwYJ1vBQL+yzEkdXA8xucMJZCRnQC5eVhyQZD76BbsvWN4F2+2X9EJdLRzHIYbKsSuvhyO7xMyIhyiPV1yBlVw=&pq2FH=S4AijUGo |
request | POST http://www.fokusdongs89.click/6tjv/ |
request | GET http://www.fokusdongs89.click/6tjv/?vv-9CC=lddPhGieQ3lEt24wxfGSZqEKUhgeh07HzuUXm/iAUma5yHruZSDAYtghKLMKtfuJW8oz7rp+ckpMDOoMhDPkb2WQy1Gqr+rGodidlkk=&pq2FH=S4AijUGo |
request | POST http://www.pzr9.com/6tjv/ |
request | GET http://www.pzr9.com/6tjv/?vv-9CC=Xe+4czuF8BNTvCl2jtutD0nc61uG19PQTHhiWjCSfHaBQ4NOq8i8K6quZY+U+HiY2tqWNVv2/OiMBhH2zz7G+0xdm39gVqvBoSlQlAk=&pq2FH=S4AijUGo |
request | POST http://www.subicpearlresorthotel.com/6tjv/ |
request | GET http://www.subicpearlresorthotel.com/6tjv/?vv-9CC=z8EanEHhaicdSPwbUmMymlHZg3JWg4d9/pg0TpyNm6NFsGct/BtDMX7PWnf5Qsg1SQP92ELHhW5VyKkGW4ou1D5KNmy23lxxfwDNRJc=&pq2FH=S4AijUGo |
request | POST http://www.touslesjeudis-test2.ovh/6tjv/ |
request | GET http://www.touslesjeudis-test2.ovh/6tjv/?vv-9CC=/1l307yFeMFeHrk4mAgZBkH4SykpTjYiA/5hCG+BMYVXlwubXDmDfEwOCf1sFfh9qMjxTdQuOFbq+mW+2MyEO3xWCYiKD3QyLOwlqdk=&pq2FH=S4AijUGo |
request | POST http://www.minsk-adstr.pro/6tjv/ |
request | GET http://www.minsk-adstr.pro/6tjv/?vv-9CC=Plpwe/Vj3Si6m7s4WjkFQxqA5vT0CFMrYA9s5aV5DJ4PZlRiX3dSCC0X24ZLQNtV+tbWCzZMNx9DmPvcY1vaNPprvVENxM3YounydDs=&pq2FH=S4AijUGo |
request | POST http://www.jsmaiyou.com/6tjv/ |
request | GET http://www.jsmaiyou.com/6tjv/?vv-9CC=GT7mDBetp/BsCYP1aTCFpL/ADJtJH8x8/gvfm7l4NLF0tD2iOM8XYGcDii6V0tjr8Xc6kwylBNXtOHbYpVwzl/f1TWI72f0ir/DsOw8=&pq2FH=S4AijUGo |
request | POST http://www.wtwbenefitsapp.com/6tjv/ |
request | POST http://www.ready-sim.com/6tjv/ |
request | POST http://www.ioddinemax.info/6tjv/ |
request | POST http://www.unrushlagos.life/6tjv/ |
request | POST http://www.innerpeasnutrition.com/6tjv/ |
request | POST http://www.fokusdongs89.click/6tjv/ |
request | POST http://www.pzr9.com/6tjv/ |
request | POST http://www.subicpearlresorthotel.com/6tjv/ |
request | POST http://www.touslesjeudis-test2.ovh/6tjv/ |
request | POST http://www.minsk-adstr.pro/6tjv/ |
request | POST http://www.jsmaiyou.com/6tjv/ |
file | C:\Users\test22\AppData\Local\Temp\nscF08C.tmp\zqsexr.dll |
file | C:\Users\test22\AppData\Local\Temp\nscF08C.tmp\zqsexr.dll |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Nemesis.25268 |
FireEye | Generic.mg.2bdd38681778a2be |
McAfee | RDN/Generic.dx |
Malwarebytes | Trojan.Injector.NSIS |
Sangfor | Trojan.Win32.Injector.Vsw0 |
Cybereason | malicious.81778a |
Arcabit | Trojan.Nemesis.D62B4 [many] |
Cyren | W32/Injector.BOS.gen!Eldorado |
Symantec | Trojan Horse |
ESET-NOD32 | a variant of Win32/Injector.ETCV |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | Trojan.Win32.Strab.bup |
BitDefender | Gen:Variant.Nemesis.25268 |
Avast | Win32:InjectorX-gen [Trj] |
Emsisoft | Gen:Variant.Nemesis.25268 (B) |
F-Secure | Heuristic.HEUR/AGEN.1300644 |
VIPRE | Gen:Variant.Nemesis.25268 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Trapmine | malicious.moderate.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Webroot | W32.Infostealer.Formbook |
Avira | HEUR/AGEN.1300644 |
MAX | malware (ai score=85) |
Microsoft | Trojan:Win32/Casdet!rfn |
ZoneAlarm | HEUR:Trojan-Spy.Win32.Noon.gen |
GData | Zum.Androm.1 |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R585815 |
Acronis | suspicious |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R002H0DGH23 |
Rising | Trojan.Injector!1.E835 (CLASSIC) |
Ikarus | Trojan.Win32.Injector |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | Win32:InjectorX-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |