Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 26, 2023, 7:42 a.m. | July 26, 2023, 7:51 a.m. |
-
-
ChromeSetup.exe "C:\Users\test22\AppData\Local\Temp\ChromeSetup.exe"
2056
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.trishpintar.com |
CNAME
cdn1.wixdns.net
|
34.149.87.45 |
www.hbiwhwr.shop |
CNAME
hbiwhwr.shop
|
34.102.136.180 |
www.sx15k.com |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49165 -> 34.149.87.45:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49165 -> 34.149.87.45:80 | 2031449 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49166 -> 34.102.136.180:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49165 -> 34.149.87.45:80 | 2031453 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49166 -> 34.102.136.180:80 | 2031449 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49166 -> 34.102.136.180:80 | 2031453 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.trishpintar.com/sy22/?XPc=ZcWCyggxITiff9Ntu8frHWICLZ17JBNS5H8XzpbFosEL7RS7W4YHICi5HEs8XFn8+eU3rAdd&Hpq=V6ALd0OhqlATeV | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.hbiwhwr.shop/sy22/?XPc=yd0bSXVZUXdU8qKTRdtZDhtRbXCT/uJkAzwFnTNcMl5wHiXF5PZYexVTbwnTO0CSyNbsU44F&Hpq=V6ALd0OhqlATeV |
request | GET http://www.trishpintar.com/sy22/?XPc=ZcWCyggxITiff9Ntu8frHWICLZ17JBNS5H8XzpbFosEL7RS7W4YHICi5HEs8XFn8+eU3rAdd&Hpq=V6ALd0OhqlATeV |
request | GET http://www.hbiwhwr.shop/sy22/?XPc=yd0bSXVZUXdU8qKTRdtZDhtRbXCT/uJkAzwFnTNcMl5wHiXF5PZYexVTbwnTO0CSyNbsU44F&Hpq=V6ALd0OhqlATeV |
file | C:\Users\test22\AppData\Local\Temp\nsgBE8A.tmp\fiowin.dll |
file | C:\Users\test22\AppData\Local\Temp\nsgBE8A.tmp\fiowin.dll |
Bkav | W32.AIDetectMalware |
MicroWorld-eScan | Trojan.Garf.Gen.14 |
Malwarebytes | Malware.AI.1493217770 |
Cybereason | malicious.2e8646 |
Arcabit | Trojan.Garf.Gen.14 [many] |
Cyren | W32/Injector.AHD.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:Trojan.Win32.Strab.gen |
BitDefender | Trojan.Garf.Gen.14 |
Avast | FileRepMalware [Trj] |
VIPRE | Trojan.Garf.Gen.14 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
FireEye | Generic.mg.22866422e8646352 |
Emsisoft | Trojan.Garf.Gen.14 (B) |
Ikarus | Trojan.NSIS.Guloader |
Microsoft | Trojan:Win32/Sabsik.TE.A!ml |
ZoneAlarm | UDS:Trojan.Win32.Strab.gen |
GData | Zum.Androm.1 |
Detected | |
Acronis | suspicious |
McAfee | Trojan-FVKZ!2D38A6217FBA |
MAX | malware (ai score=86) |
Rising | Trojan.Strab!8.12D03 (TFE:6:YIqdF1It4v) |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | FileRepMalware [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (D) |