Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 10, 2023, 7:37 a.m. | Oct. 10, 2023, 7:39 a.m. |
-
-
-
pwgzoxwn.exe "C:\Users\test22\AppData\Local\Temp\pwgzoxwn.exe"
2696
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
geoplugin.net | 178.237.33.50 | |
sheddy1122.ddns.net | 103.212.81.158 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2028675 | ET POLICY DNS Query to DynDNS Domain *.ddns .net | Potentially Bad Traffic |
TCP 192.168.56.101:49165 -> 103.212.81.158:6524 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49165 103.212.81.158:6524 |
None | None | None |
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geoplugin.net/json.gp |
domain | sheddy1122.ddns.net |
request | GET http://geoplugin.net/json.gp |
file | C:\Users\test22\AppData\Local\Temp\pwgzoxwn.exe |
file | C:\Users\test22\AppData\Roaming\nwgclhhqav\foktpy.exe |
file | C:\Users\test22\AppData\Local\Temp\pwgzoxwn.exe |
file | C:\Users\test22\AppData\Local\Temp\pwgzoxwn.exe |
section | {u'size_of_data': u'0x0000d000', u'virtual_address': u'0x0003a000', u'entropy': 6.9086671767484225, u'name': u'.rsrc', u'virtual_size': u'0x0000cf48'} | entropy | 6.90866717675 | description | A section with a high entropy has been found | |||||||||
entropy | 0.619047619048 | description | Overall entropy of this PE file is high |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\iennrbb | reg_value | C:\Users\test22\AppData\Roaming\nwgclhhqav\foktpy.exe "C:\Users\test22\AppData\Local\Temp\pwgzoxwn.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
FireEye | Generic.mg.4018b3beefce0db0 |
Skyhigh | BehavesLike.Win32.Generic.hc |
Sangfor | Trojan.Win32.Agent.Vpuy |
CrowdStrike | win/malicious_confidence_90% (W) |
K7GW | Trojan ( 0052eef11 ) |
K7AntiVirus | Trojan ( 0052eef11 ) |
BitDefenderTheta | Gen:NN.ZexaF.36738.jmW@aetEEwp |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:Trojan.Win32.Strab.gen |
Avast | Win32:Evo-gen [Trj] |
Trapmine | suspicious.low.ml.score |
Sophos | Mal/Generic-S |
Webroot | W32.Injector.Gen |
Microsoft | Trojan:Win32/Casdet!rfn |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
McAfee | Artemis!4018B3BEEFCE |
VBA32 | BScope.Trojan.Injector |
Cylance | unsafe |
Rising | Trojan.Generic@AI.100 (RDML:TASy/gAfS0SoldBT3LiGKA) |
Fortinet | W32/Injector.ETIY!tr |
AVG | Win32:Evo-gen [Trj] |
DeepInstinct | MALICIOUS |