Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 8, 2023, 10:40 a.m. | Oct. 8, 2023, 10:42 a.m. |
-
-
-
dslwsx.exe "C:\Users\test22\AppData\Local\Temp\dslwsx.exe"
2708
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.kimgj.com |
CNAME
kimgj.com
|
99.83.196.71 |
www.kwamitikki.com | 195.216.243.33 | |
www.podplugca.com |
CNAME
ext-sq.squarespace.com
|
198.49.23.144 |
www.displayfridges.fun | 64.225.91.73 | |
www.qixservice.online |
CNAME
onstatic-pt.setupdns.net
|
81.88.57.70 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49166 -> 195.216.243.33:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49169 -> 198.185.159.145:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49170 -> 81.88.57.70:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49168 -> 75.2.85.42:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49167 -> 64.225.91.73:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.kwamitikki.com/sy22/?GFNl=ayc0h3zWsM+s/UZ3LUjJJuwK+un3y5jAnwaTGnQTjoBH3sQruTiuCMTcn690zSCGQsaDZ/V1&Rlj=YVFTx4dp | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.displayfridges.fun/sy22/?GFNl=aXg/rmbVwlFwwtnhCbViqZ1yX+MILNYt2xJKgyzLKbDp+5cOMXOnKyz8SWn7ESolc4/lQPeb&Rlj=YVFTx4dp | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.kimgj.com/sy22/?GFNl=3SPsA2Ss8I6lJqBAUfWjnvopZUchcaiATf/poqfUwjZ4JN2yY1pEd2m56Et1bCNhcUG3dZ4S&Rlj=YVFTx4dp | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.podplugca.com/sy22/?GFNl=1SbEEVOB0X5p51zw8Y9tIyj0s4wRGWDD/YTF5BQf3aGuyUlv8rzVEk4tRHrNdM/Dikld30uR&Rlj=YVFTx4dp | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.qixservice.online/sy22/?GFNl=VBKd4i1TBAeTlYBnm9tWLCP4ww2vn+XVFOQPMnsW4AFxqlBX+KApyR5y0aXQ0sSyxSIvT0ne&Rlj=YVFTx4dp |
request | GET http://www.kwamitikki.com/sy22/?GFNl=ayc0h3zWsM+s/UZ3LUjJJuwK+un3y5jAnwaTGnQTjoBH3sQruTiuCMTcn690zSCGQsaDZ/V1&Rlj=YVFTx4dp |
request | GET http://www.displayfridges.fun/sy22/?GFNl=aXg/rmbVwlFwwtnhCbViqZ1yX+MILNYt2xJKgyzLKbDp+5cOMXOnKyz8SWn7ESolc4/lQPeb&Rlj=YVFTx4dp |
request | GET http://www.kimgj.com/sy22/?GFNl=3SPsA2Ss8I6lJqBAUfWjnvopZUchcaiATf/poqfUwjZ4JN2yY1pEd2m56Et1bCNhcUG3dZ4S&Rlj=YVFTx4dp |
request | GET http://www.podplugca.com/sy22/?GFNl=1SbEEVOB0X5p51zw8Y9tIyj0s4wRGWDD/YTF5BQf3aGuyUlv8rzVEk4tRHrNdM/Dikld30uR&Rlj=YVFTx4dp |
request | GET http://www.qixservice.online/sy22/?GFNl=VBKd4i1TBAeTlYBnm9tWLCP4ww2vn+XVFOQPMnsW4AFxqlBX+KApyR5y0aXQ0sSyxSIvT0ne&Rlj=YVFTx4dp |
file | C:\Users\test22\AppData\Local\Temp\dslwsx.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Strab.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.69627851 |
Skyhigh | BehavesLike.Win32.Generic.fc |
McAfee | Artemis!90F56EEFB533 |
Malwarebytes | Trojan.MalPack.RND |
VIPRE | Trojan.NSISX.Spy.Gen.24 |
Sangfor | Suspicious.Win32.Save.ins |
K7AntiVirus | Trojan ( 005ac27e1 ) |
BitDefender | Trojan.NSISX.Spy.Gen.24 |
K7GW | Trojan ( 005ac27e1 ) |
Cybereason | malicious.682bb0 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ETIW |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Win32/FormBook.780f20dc |
Avast | Win32:TrojanX-gen [Trj] |
Tencent | Win32.Trojan.Strab.Ojgl |
Emsisoft | Trojan.NSISX.Spy.Gen.24 (B) |
F-Secure | Trojan.TR/Injector.jcfou |
DrWeb | Trojan.Siggen21.36843 |
Trapmine | malicious.moderate.ml.score |
FireEye | Generic.mg.90f56eefb533c21d |
Sophos | Generic Reputation PUA (PUA) |
SentinelOne | Static AI - Suspicious PE |
Detected | |
Avira | TR/AD.Swotter.kijak |
Varist | W32/Trojan.KRJE-9145 |
Antiy-AVL | Trojan/Win32.Injector |
Microsoft | Trojan:Win32/FormBook.RVAE!MTB |
Gridinsoft | Trojan.Win32.FormBook.bot |
Arcabit | Trojan.NSISX.Spy.Gen.24 [many] |
ViRobot | Trojan.Win.Z.Spy.311061 |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Trojan.GenericKD.69627851 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Win-Trojan/Gandcrab08.Exp |
ALYac | Gen:Variant.Midie.132251 |
MAX | malware (ai score=87) |
Cylance | unsafe |
TrendMicro-HouseCall | TROJ_GEN.R002H0DJ623 |
Rising | Trojan.Injector!8.C4 (TFE:5:D0R9bJufesD) |
Ikarus | Trojan.Win32.Injector |
Fortinet | W32/Injector.ETIW!tr |
BitDefenderTheta | Gen:NN.ZexaF.36738.kuW@aOL3yoki |
AVG | Win32:TrojanX-gen [Trj] |
Panda | Trj/Chgt.AD |
CrowdStrike | win/malicious_confidence_100% (W) |