Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 16, 2023, 10:55 a.m. | Oct. 16, 2023, 11:07 a.m. |
-
-
BUjW8Z15kUVOZ9tRIOoW9DKz.exe "C:\Users\test22\Pictures\BUjW8Z15kUVOZ9tRIOoW9DKz.exe"
2544 -
j9BhD7GZkN6ZLJkG3SQci0cK.exe "C:\Users\test22\Pictures\j9BhD7GZkN6ZLJkG3SQci0cK.exe"
2504 -
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F
1108 -
cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "test22:N"&&CACLS "nhdues.exe" /P "test22:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "test22:N"&&CACLS "..\1ff8bec27e" /P "test22:R" /E&&Exit
1736
-
-
-
vREToto7AIJ9nFpi93ZHsPlH.exe "C:\Users\test22\Pictures\vREToto7AIJ9nFpi93ZHsPlH.exe" --silent --allusers=0
2552 -
zhmN7sLxTTABITlz75PYuip7.exe "C:\Users\test22\Pictures\zhmN7sLxTTABITlz75PYuip7.exe"
2636 -
JasR85FkoNzdmfzKQ2DYJf5k.exe "C:\Users\test22\Pictures\JasR85FkoNzdmfzKQ2DYJf5k.exe"
2744
-
IP Address | Status | Action |
---|---|---|
104.20.68.143 | Active | Moloch |
104.21.35.235 | Active | Moloch |
104.21.79.27 | Active | Moloch |
104.21.93.225 | Active | Moloch |
107.167.110.211 | Active | Moloch |
121.254.136.9 | Active | Moloch |
131.153.76.130 | Active | Moloch |
148.251.234.93 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.186.120 | Active | Moloch |
172.67.187.122 | Active | Moloch |
185.154.192.128 | Active | Moloch |
193.42.32.29 | Active | Moloch |
45.130.41.101 | Active | Moloch |
69.48.143.183 | Active | Moloch |
85.217.144.143 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49162 104.20.68.143:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 55:c8:82:61:30:05:42:80:db:47:5e:d0:66:b5:df:ac:14:5b:19:6f |
TLS 1.2 192.168.56.101:49164 172.67.187.122:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=lycheepanel.info | 9f:29:fd:d3:0f:46:b4:fc:1f:d0:06:c7:4e:4d:21:d0:21:08:ea:43 |
TLS 1.2 192.168.56.101:49166 104.21.93.225:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=flyawayaero.net | 34:8b:a3:9d:94:c4:8d:02:5c:e1:f1:43:da:57:49:64:a9:1c:b6:fe |
TLS 1.2 192.168.56.101:49167 172.67.186.120:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=logicmouse.net | ad:0f:20:8c:93:a2:c4:29:8c:5a:74:17:2b:40:4b:ee:07:0c:c8:e0 |
TLS 1.2 192.168.56.101:49168 45.130.41.101:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=laubenstein.space | d4:04:82:56:eb:8d:bb:fd:72:7a:36:fd:90:c1:07:aa:45:ac:92:27 |
TLS 1.2 192.168.56.101:49175 104.21.79.27:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=thegrandduck.org | 88:18:17:49:0e:b0:fa:c0:a6:7b:3d:0e:36:55:3a:59:1b:5f:1e:57 |
TLS 1.2 192.168.56.101:49174 107.167.110.211:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 | C=NO, ST=Oslo, L=Oslo, O=Opera Norway AS, CN=net.geo.opera.com | 8b:1e:84:38:9c:97:8c:be:f7:e1:0e:28:14:15:bb:08:cc:fb:ad:af |
TLS 1.2 192.168.56.101:49172 104.21.35.235:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=potatogoose.com | 0f:a9:ea:9d:3e:af:d2:24:68:a0:8f:b7:58:00:c9:0b:f0:7f:31:37 |
TLS 1.3 192.168.56.101:49199 131.153.76.130:80 |
None | None | None |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://85.217.144.143/files/My2.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://85.217.144.143/files/Amadey.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://guboh2p.top/build.exe | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://193.42.32.29/9bDc8sQ/index.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://193.42.32.29/9bDc8sQ/index.php?scr=1 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://pastebin.com/raw/V6VJsrV3 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://logicmouse.net/6779d89b7a368f4f3f340b50a9d18d71.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 |
request | GET http://85.217.144.143/files/My2.exe |
request | GET http://85.217.144.143/files/Amadey.exe |
request | GET http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://guboh2p.top/build.exe |
request | POST http://193.42.32.29/9bDc8sQ/index.php |
request | POST http://193.42.32.29/9bDc8sQ/index.php?scr=1 |
request | GET https://pastebin.com/raw/V6VJsrV3 |
request | GET https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe |
request | GET https://logicmouse.net/6779d89b7a368f4f3f340b50a9d18d71.exe |
request | GET https://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 |
request | POST http://193.42.32.29/9bDc8sQ/index.php |
request | POST http://193.42.32.29/9bDc8sQ/index.php?scr=1 |
domain | yip.su | description | Soviet Union domain TLD | ||||||
domain | guboh2p.top | description | Generic top level domain TLD |
file | C:\Users\test22\Pictures\Opera_installer_2310160416561562552.dll |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QFIjjcHQ1ovQ2FNiOlYtJpvC.bat |
file | C:\Users\test22\Pictures\vREToto7AIJ9nFpi93ZHsPlH.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gxtkOdm8JuIMvKINocMwHKZR.bat |
file | C:\Users\test22\AppData\Local\90Jp43fGzN2wAaoDneRxPWDw.exe |
file | C:\Users\test22\Pictures\j9BhD7GZkN6ZLJkG3SQci0cK.exe |
file | C:\Users\test22\AppData\Local\iLwtD8YVYcy6ZTTZFLMnBIkj.exe |
file | C:\Users\test22\AppData\Local\yyyIHm1msWpbfkB5Xs6I62Oe.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wHoBwdBzfDVtf0qc8GPa5JYS.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnwOvRigq6vd753CtxlKRsIq.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NeR8cpItg1Q3D23L524Ffy12.bat |
file | C:\Users\test22\Pictures\zhmN7sLxTTABITlz75PYuip7.exe |
file | C:\Users\test22\AppData\Local\NvnqxWp3Cm1i11cWSqYaLQvf.exe |
file | C:\Users\test22\Pictures\VU7axjpmxW3xOeUWMCQ7F4ix.exe |
file | C:\Users\test22\Pictures\JasR85FkoNzdmfzKQ2DYJf5k.exe |
file | C:\Users\test22\AppData\Local\Temp\Opera_installer_2310160416560932552.dll |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w2N23bNbwJl8vhfKeQE2y20l.bat |
file | C:\Users\test22\Pictures\BUjW8Z15kUVOZ9tRIOoW9DKz.exe |
file | C:\Users\test22\AppData\Local\brzGjuEYnYJ5D5vypdkt21Cl.exe |
file | C:\Users\test22\AppData\Local\RJ3NgZSEeGowPBct0V2u8e0k.exe |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "test22:N"&&CACLS "nhdues.exe" /P "test22:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "test22:N"&&CACLS "..\1ff8bec27e" /P "test22:R" /E&&Exit |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
file | C:\Users\test22\Pictures\j9BhD7GZkN6ZLJkG3SQci0cK.exe |
file | C:\Users\test22\AppData\Local\brzGjuEYnYJ5D5vypdkt21Cl.exe |
file | C:\Users\test22\AppData\Local\NvnqxWp3Cm1i11cWSqYaLQvf.exe |
file | C:\Users\test22\AppData\Local\90Jp43fGzN2wAaoDneRxPWDw.exe |
file | C:\Users\test22\AppData\Local\RJ3NgZSEeGowPBct0V2u8e0k.exe |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
host | 193.42.32.29 | |||
host | 85.217.144.143 |
file | C:\ProgramData\AVAST Software |
file | C:\ProgramData\Avira |
file | C:\ProgramData\Kaspersky Lab |
file | C:\ProgramData\Panda Security |
file | C:\ProgramData\Bitdefender |
file | C:\ProgramData\AVG |
file | C:\ProgramData\Doctor Web |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QFIjjcHQ1ovQ2FNiOlYtJpvC.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gxtkOdm8JuIMvKINocMwHKZR.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnwOvRigq6vd753CtxlKRsIq.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wHoBwdBzfDVtf0qc8GPa5JYS.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NeR8cpItg1Q3D23L524Ffy12.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w2N23bNbwJl8vhfKeQE2y20l.bat |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
cmdline | cmd /k echo Y|CACLS "nhdues.exe" /P "test22:N"&&CACLS "nhdues.exe" /P "test22:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "test22:N"&&CACLS "..\1ff8bec27e" /P "test22:R" /E&&Exit |
cmdline | CACLS "..\1ff8bec27e" /P "test22:N" |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "test22:N"&&CACLS "nhdues.exe" /P "test22:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "test22:N"&&CACLS "..\1ff8bec27e" /P "test22:R" /E&&Exit |
cmdline | CACLS "..\1ff8bec27e" /P "test22:R" /E |
cmdline | CACLS "nhdues.exe" /P "test22:R" /E |
cmdline | CACLS "nhdues.exe" /P "test22:N" |
Bkav | W32.Common.D753F82A |
Lionic | Trojan.Win32.Upatre.1j!c |
tehtris | Generic.Malware |
MicroWorld-eScan | Gen:Variant.Zusy.502235 |
CAT-QuickHeal | Trojan.IGENERIC |
Skyhigh | Downloader-FCID!D334FDBE7080 |
McAfee | Artemis!D334FDBE7080 |
Malwarebytes | Malware.AI.3634750077 |
Zillya | Downloader.Upatre.Win32.77227 |
Sangfor | Downloader.Msil.Tiny.Vfvp |
K7AntiVirus | Trojan-Downloader ( 005abba61 ) |
Alibaba | TrojanDownloader:MSIL/Upatre.87a12464 |
K7GW | Trojan-Downloader ( 005abba61 ) |
Cybereason | malicious.e8de42 |
Arcabit | Trojan.Zusy.D7A9DB |
VirIT | Trojan.Win32.MSIL_Heur.A |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of MSIL/TrojanDownloader.Tiny.CIQ |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan-Downloader.MSIL.Upatre.gen |
BitDefender | Gen:Variant.Zusy.502235 |
NANO-Antivirus | Trojan.Win32.Upatre.kccben |
Avast | Win32:DropperX-gen [Drp] |
Tencent | Malware.Win32.Gencirc.13f1cb2e |
Emsisoft | Gen:Variant.Zusy.502235 (B) |
F-Secure | Trojan.TR/Dldr.Tiny.jftmx |
DrWeb | Trojan.DownLoaderNET.786 |
VIPRE | Gen:Variant.Zusy.502235 |
TrendMicro | TROJ_GEN.R002C0XJ923 |
FireEye | Generic.mg.d334fdbe7080a9e3 |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
Detected | |
Avira | TR/Dldr.Tiny.jftmx |
MAX | malware (ai score=80) |
Antiy-AVL | Trojan[Downloader]/MSIL.Tiny |
Kingsoft | malware.kb.c.977 |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Microsoft | Trojan:Win32/Znyonm |
ZoneAlarm | HEUR:Trojan-Downloader.MSIL.Upatre.gen |
GData | Gen:Variant.Zusy.502235 |
Varist | W32/ABRisk.LPSU-0582 |
AhnLab-V3 | Downloader/Win.FCID.C5496363 |
BitDefenderTheta | Gen:NN.ZemsilF.36738.am0@amCu6ff |
ALYac | Gen:Variant.Marsilia.75727 |
VBA32 | Downloader.MSIL.Pabin.Heur |
Cylance | unsafe |
Panda | Trj/RnkBend.A |