Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 25, 2023, 7:35 a.m. | July 25, 2023, 7:44 a.m. |
-
KavachAuthentication%20Updater.exe "C:\Users\test22\AppData\Local\Temp\KavachAuthentication%20Updater.exe"
300-
irsetup.exe "C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:5626914 "__IRAFN:C:\Users\test22\AppData\Local\Temp\KavachAuthentication%20Updater.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-3832866432-4053218753-3017428901-1001"
2180-
-
cmd.exe cmd ver
2892
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
6jxbmkpe.torontobotdns.com | 104.194.8.112 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49180 -> 172.96.140.157:44441 | 2024897 | ET USER_AGENTS Go HTTP Client User-Agent | Misc activity |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe |
file | C:\Program Files\KavachAuthentication\ApplicPywizable.exe |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\KavachAuthentication\ApplicPywizable.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\KavachAuthentication\ApplicPywizable.lnk |
url | http://www.indigorose.com/route.php?pid=suf9buy |
url | http://www.indigorose.com |
url | https://github.com/imroc/req)runtime.minit: |
url | http://hybull |
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Disable AntiVirus | rule | disable_antivirus | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Install itself for autorun at Windows startup | rule | Persistence | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Install itself for autorun at Windows startup | rule | Persistence | ||||||
description | Run a KeyLogger | rule | KeyLogger |
file | C:\Users\test22\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe |
file | C:\Program Files\KavachAuthentication\ApplicPywizable.exe |
Elastic | malicious (moderate confidence) |
McAfee | Artemis!2E66189AA1B6 |
Sangfor | Trojan.Win32.Agent.V9fv |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
F-Secure | Heuristic.HEUR/AGEN.1363328 |
McAfee-GW-Edition | BehavesLike.Win64.Dropper.rc |
Sophos | Generic ML PUA (PUA) |
Webroot | Pua.Gen |
Avira | HEUR/AGEN.1363328 |
Gridinsoft | Trojan.Win64.CoinMiner.dd!s1 |
Microsoft | Trojan:Win32/Casdet!rfn |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
Detected | |
Ikarus | Trojan-Dropper.SparkRat |
Fortinet | W64/Biodata.GNVQ1TR |
DeepInstinct | MALICIOUS |