Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 30, 2023, 8:55 a.m. | July 30, 2023, 9:08 a.m. |
-
-
woproz2.1.exe "C:\Users\test22\AppData\Local\Temp\woproz2.1.exe"
2056
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
worrynot.duckdns.org | 85.208.139.45 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
Suricata TLS
No Suricata TLS
section | .ndata |
domain | worrynot.duckdns.org |
file | C:\Users\test22\AppData\Local\Temp\nstBDFD.tmp\gyisjg.dll |
file | C:\Users\test22\AppData\Roaming\hmhqavf\oktpyienws.exe |
file | C:\Users\test22\AppData\Local\Temp\nstBDFD.tmp\gyisjg.dll |
file | C:\Users\test22\AppData\Roaming\hmhqavf\oktpyienws.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\cxhq | reg_value | C:\Users\test22\AppData\Roaming\hmhqavf\oktpyienws.exe "C:\Users\test22\AppData\Local\Temp\woproz2.1.exe" |
dead_host | 85.208.139.45:8520 |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.24 |
McAfee | Artemis!9C2B4213A8A1 |
Malwarebytes | Trojan.Injector |
Sangfor | Spyware.Win32.Agent.Vazw |
Arcabit | Trojan.NSISX.Spy.Gen.24 |
Cyren | W32/Ninjector.JU.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ETDU |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.NSISX.Spy.Gen.24 |
Avast | Win32:PWSX-gen [Trj] |
VIPRE | Trojan.NSISX.Spy.Gen.24 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
FireEye | Generic.mg.9c2b4213a8a1a6ba |
Emsisoft | Trojan.NSISX.Spy.Gen.24 (B) |
Avira | TR/AD.GenShell.tmifg |
Microsoft | Trojan:Win32/Sabsik.TE.B!ml |
ViRobot | Trojan.Win.Z.Spy.233619 |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Win32.Trojan.Agent.1BUEGY |
Detected | |
AhnLab-V3 | Infostealer/Win.Generic.C5395778 |
ALYac | Trojan.NSISX.Spy.Gen.24 |
MAX | malware (ai score=87) |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
Rising | Trojan.Lokibot!8.F1B5 (TFE:5:lQY4QMl2gVH) |
Ikarus | Trojan.Win32.Injector |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | Win32:PWSX-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |