Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 19, 2023, 7:47 a.m. | Oct. 19, 2023, 7:58 a.m. |
-
-
-
-
BbewQJjIF4TpHgbafcqE8yXQ.exe "C:\Users\test22\Pictures\BbewQJjIF4TpHgbafcqE8yXQ.exe"
2084
-
-
YXnoCa8ogkWmtQBVkyIWVjTu.exe "C:\Users\test22\Pictures\YXnoCa8ogkWmtQBVkyIWVjTu.exe"
2904 -
yA5UHXe5SsWoZZSRhhzJSkKQ.exe "C:\Users\test22\Pictures\yA5UHXe5SsWoZZSRhhzJSkKQ.exe"
2972 -
ofG4l3a49c8jVWMpxDLXRIv2.exe "C:\Users\test22\Pictures\ofG4l3a49c8jVWMpxDLXRIv2.exe"
2964 -
JcZsP3apGXfj5EcWuRtH9Iph.exe "C:\Users\test22\Pictures\JcZsP3apGXfj5EcWuRtH9Iph.exe"
1120 -
Sw3y8W0DslF2ivCXrkg0wwdg.exe "C:\Users\test22\Pictures\Sw3y8W0DslF2ivCXrkg0wwdg.exe" --silent --allusers=0
2064
-
-
IP Address | Status | Action |
---|---|---|
162.159.135.233 | Active | Moloch |
104.20.67.143 | Active | Moloch |
104.21.32.208 | Active | Moloch |
107.167.110.216 | Active | Moloch |
131.153.76.130 | Active | Moloch |
148.251.234.93 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.180.173 | Active | Moloch |
172.67.197.174 | Active | Moloch |
172.67.216.81 | Active | Moloch |
172.67.217.52 | Active | Moloch |
194.169.175.127 | Active | Moloch |
23.67.53.27 | Active | Moloch |
45.130.41.101 | Active | Moloch |
65.109.26.240 | Active | Moloch |
85.143.220.63 | Active | Moloch |
85.217.144.143 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49164 104.20.67.143:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 55:c8:82:61:30:05:42:80:db:47:5e:d0:66:b5:df:ac:14:5b:19:6f |
TLS 1.2 192.168.56.101:49167 172.67.197.174:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=*.grabyourpizza.com | 19:34:3f:f1:b2:75:20:7f:8a:58:d1:fd:26:b2:74:e2:ea:f8:76:e6 |
TLS 1.2 192.168.56.101:49166 172.67.216.81:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=flyawayaero.net | 34:8b:a3:9d:94:c4:8d:02:5c:e1:f1:43:da:57:49:64:a9:1c:b6:fe |
TLS 1.2 192.168.56.101:49173 45.130.41.101:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=laubenstein.space | d4:04:82:56:eb:8d:bb:fd:72:7a:36:fd:90:c1:07:aa:45:ac:92:27 |
TLS 1.2 192.168.56.101:49175 172.67.217.52:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=diplodoka.net | 08:f2:0c:9e:cc:84:cd:91:24:54:d5:fe:5e:3f:a9:46:68:a2:58:33 |
TLS 1.2 192.168.56.101:49176 172.67.180.173:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=potatogoose.com | 0f:a9:ea:9d:3e:af:d2:24:68:a0:8f:b7:58:00:c9:0b:f0:7f:31:37 |
TLS 1.2 192.168.56.101:49168 104.21.32.208:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=lycheepanel.info | 9f:29:fd:d3:0f:46:b4:fc:1f:d0:06:c7:4e:4d:21:d0:21:08:ea:43 |
TLS 1.2 192.168.56.101:49177 107.167.110.216:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 | C=NO, ST=Oslo, L=Oslo, O=Opera Norway AS, CN=net.geo.opera.com | 8b:1e:84:38:9c:97:8c:be:f7:e1:0e:28:14:15:bb:08:cc:fb:ad:af |
TLS 1.3 192.168.56.101:49192 131.153.76.130:80 |
None | None | None |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://85.217.144.143/files/My2.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://galandskiyher5.com/downloads/toolspub1.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://gobo02fc.top/build.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://pastebin.com/raw/xYhKBupz | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://grabyourpizza.com/7a54bdb20779c4359694feaa1398dd25.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://diplodoka.net/4d1aaeb879448e5236e36d2209b40d34/7a54bdb20779c4359694feaa1398dd25.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://potatogoose.com/4d1aaeb879448e5236e36d2209b40d34/baf14778c246e15550645e30ba78ce1c.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 |
request | GET http://85.217.144.143/files/My2.exe |
request | GET http://galandskiyher5.com/downloads/toolspub1.exe |
request | GET http://gobo02fc.top/build.exe |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 |
request | GET https://pastebin.com/raw/xYhKBupz |
request | GET https://grabyourpizza.com/7a54bdb20779c4359694feaa1398dd25.exe |
request | GET https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe |
request | GET https://diplodoka.net/4d1aaeb879448e5236e36d2209b40d34/7a54bdb20779c4359694feaa1398dd25.exe |
request | GET https://potatogoose.com/4d1aaeb879448e5236e36d2209b40d34/baf14778c246e15550645e30ba78ce1c.exe |
request | GET https://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 |
domain | gobo02fc.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\MgMS5OiFfswJFaqP1XJOzDbR.exe |
file | C:\Users\test22\AppData\Local\xBjmmfDRJg2QRIKnPa7ZT3BH.exe |
file | C:\Users\test22\AppData\Local\Y72Obyt28sCjXyOLc6BYYcoK.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nDKrFetzE30B1WCAgFcMXvEc.bat |
file | C:\Users\test22\Pictures\yA5UHXe5SsWoZZSRhhzJSkKQ.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8PHCoENUcAc11lrXF7bGtU9v.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wSFvxIqOzo0PqMDR2GJ84tgr.bat |
file | C:\Users\test22\Pictures\YXnoCa8ogkWmtQBVkyIWVjTu.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2wZUjqKftOgnAMcKsFknTmR8.bat |
file | C:\Users\test22\Pictures\ofG4l3a49c8jVWMpxDLXRIv2.exe |
file | C:\Users\test22\Pictures\BbewQJjIF4TpHgbafcqE8yXQ.exe |
file | C:\Users\test22\AppData\Local\hDZtpwYDwYmUs886OLJTqdVx.exe |
file | C:\Users\test22\AppData\Local\qwJ2mUhoQWAMkbDTaTw6RBQj.exe |
file | C:\Users\test22\AppData\Local\Temp\Opera_installer_2310190107596562064.dll |
file | C:\Users\test22\Pictures\Sw3y8W0DslF2ivCXrkg0wwdg.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nwNnAYrBx2LLdrAT8cxhcInw.bat |
file | C:\Users\test22\AppData\Local\d1qS2B0Pfafjv0YWtkURzyvS.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gAlRn4wMEOFeAqfvXpZufO0E.bat |
file | C:\Users\test22\Pictures\Opera_installer_2310190107596562064.dll |
file | C:\Users\test22\Pictures\JcZsP3apGXfj5EcWuRtH9Iph.exe |
file | C:\Users\test22\AppData\Local\qwJ2mUhoQWAMkbDTaTw6RBQj.exe |
file | C:\Users\test22\AppData\Local\hDZtpwYDwYmUs886OLJTqdVx.exe |
section | {u'size_of_data': u'0x00116600', u'virtual_address': u'0x0030f000', u'entropy': 7.9996915385094, u'name': u'UPX1', u'virtual_size': u'0x00117000'} | entropy | 7.99969153851 | description | A section with a high entropy has been found | |||||||||
entropy | 0.999102736653 | description | Overall entropy of this PE file is high |
url | https://docs.microsoft.com/windows/win32/fileio/maximum-file-path-limitation |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Bypass DEP | rule | disable_dep |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
host | 162.159.135.233 | |||
host | 85.217.144.143 |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wSFvxIqOzo0PqMDR2GJ84tgr.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nDKrFetzE30B1WCAgFcMXvEc.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8PHCoENUcAc11lrXF7bGtU9v.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nwNnAYrBx2LLdrAT8cxhcInw.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2wZUjqKftOgnAMcKsFknTmR8.bat |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gAlRn4wMEOFeAqfvXpZufO0E.bat |
file | C:\Users\test22\Pictures\BbewQJjIF4TpHgbafcqE8yXQ.exe |
file | C:\Users\test22\Pictures\yA5UHXe5SsWoZZSRhhzJSkKQ.exe |
file | C:\Users\test22\Pictures\ofG4l3a49c8jVWMpxDLXRIv2.exe |