Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 19, 2023, 7:47 a.m. | Oct. 19, 2023, 7:58 a.m. |
-
-
-
dalqyf.exe "C:\Users\test22\AppData\Local\Temp\dalqyf.exe"
2172
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.vaskaworldairways.com |
CNAME
fletchto99.com
|
97.118.134.29 |
www.docomo-mobileconsulting.com | 185.53.177.52 | |
www.zhperviepixie.com |
CNAME
zhperviepixie.com
|
167.172.228.26 |
www.vinteligencia.com | 172.67.198.50 | |
www.gracefullytouchedartistry.com |
CNAME
cdn1.wixdns.net
|
34.149.87.45 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49168 -> 172.67.198.50:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49166 -> 97.118.134.29:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49167 -> 167.172.228.26:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49169 -> 34.149.87.45:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49170 -> 185.53.177.52:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.vaskaworldairways.com/sy22/?Dxlpd=0xwPlKA6nfVb2/YVENf+IWv5xvicy/R8paHQQCrWR7ymRnci8vQj1/jQPH6Z9LiVJHGqShyE&mnSh=Txlhkdx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.zhperviepixie.com/sy22/?Dxlpd=hdFL0kwy0tP2Sq5zkMkXOvLbydzGG5NDjXbLdYDkA/+zwUFtuqh4YP0DuyJcd4UMQHwk1geg&mnSh=Txlhkdx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.vinteligencia.com/sy22/?Dxlpd=bFBzPUMpurqsSaAEhywdCFYwBQqPS0zKvFatuRp4xXu+SuvLn4C9Xg+acXGhzE1ceHoH+Iro&mnSh=Txlhkdx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gracefullytouchedartistry.com/sy22/?Dxlpd=32OyyUZHwqvJixPuiOQtM5MnMYIWhWk0yyAoMHrFdBB4wJvVGBkivZFh4+NGsLP7HahAbSBt&mnSh=Txlhkdx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.docomo-mobileconsulting.com/sy22/?Dxlpd=lVM1xi/uUQcXVrGb3v1MnIj4JTU8QNZxAwtnBLuxN6GTboe8PABHdOr2nABXcw5/boXeCr4R&mnSh=Txlhkdx |
request | GET http://www.vaskaworldairways.com/sy22/?Dxlpd=0xwPlKA6nfVb2/YVENf+IWv5xvicy/R8paHQQCrWR7ymRnci8vQj1/jQPH6Z9LiVJHGqShyE&mnSh=Txlhkdx |
request | GET http://www.zhperviepixie.com/sy22/?Dxlpd=hdFL0kwy0tP2Sq5zkMkXOvLbydzGG5NDjXbLdYDkA/+zwUFtuqh4YP0DuyJcd4UMQHwk1geg&mnSh=Txlhkdx |
request | GET http://www.vinteligencia.com/sy22/?Dxlpd=bFBzPUMpurqsSaAEhywdCFYwBQqPS0zKvFatuRp4xXu+SuvLn4C9Xg+acXGhzE1ceHoH+Iro&mnSh=Txlhkdx |
request | GET http://www.gracefullytouchedartistry.com/sy22/?Dxlpd=32OyyUZHwqvJixPuiOQtM5MnMYIWhWk0yyAoMHrFdBB4wJvVGBkivZFh4+NGsLP7HahAbSBt&mnSh=Txlhkdx |
request | GET http://www.docomo-mobileconsulting.com/sy22/?Dxlpd=lVM1xi/uUQcXVrGb3v1MnIj4JTU8QNZxAwtnBLuxN6GTboe8PABHdOr2nABXcw5/boXeCr4R&mnSh=Txlhkdx |
file | C:\Users\test22\AppData\Local\Temp\dalqyf.exe |
host | 131.153.76.130 |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Convagent.4!c |
MicroWorld-eScan | Trojan.Garf.Gen.10 |
FireEye | Generic.mg.d7bde041b821e3b3 |
Skyhigh | BehavesLike.Win32.Trojan.fc |
McAfee | Artemis!D7BDE041B821 |
Malwarebytes | Malware.AI.16081259 |
Sangfor | Trojan.Win32.Agent.V1za |
Alibaba | Trojan:Win32/Strab.8a611332 |
Cybereason | malicious.2a21aa |
Arcabit | Trojan.Garf.Gen.10 [many] |
BitDefenderTheta | Gen:NN.ZexaF.36738.luW@a4haPHci |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ETJW |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:Trojan.Win32.Strab |
BitDefender | Trojan.Garf.Gen.10 |
Avast | Win32:Evo-gen [Trj] |
Emsisoft | Trojan.Garf.Gen.10 (B) |
VIPRE | Trojan.Garf.Gen.10 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Injector |
Detected | |
Kingsoft | malware.kb.a.982 |
Microsoft | Trojan:Win32/Sabsik.TE.B!ml |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Trojan.Garf.Gen.10 |
AhnLab-V3 | Win-Trojan/Gandcrab08.Exp |
VBA32 | BScope.Trojan.Injector |
ALYac | Gen:Variant.Jaik.185139 |
MAX | malware (ai score=83) |
Cylance | unsafe |
Rising | Trojan.Generic@AI.93 (RDML:cAYMevCeN6jb8rNjQttN9w) |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/Kryptik.HDLS!tr |
AVG | Win32:Evo-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |