Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 23, 2023, 9:40 a.m. | Oct. 23, 2023, 9:42 a.m. |
-
-
-
ohtfjmxqk.exe "C:\Users\test22\AppData\Local\Temp\ohtfjmxqk.exe"
2692
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.qixservice.online |
CNAME
onstatic-pt.setupdns.net
|
81.88.57.70 |
www.jizihao1.com | 39.101.169.136 | |
www.podplugca.com |
CNAME
ext-sq.squarespace.com
|
198.49.23.144 |
www.displayfridges.fun | 64.225.91.73 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49171 -> 64.225.91.73:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49169 -> 198.185.159.144:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49168 -> 81.88.57.70:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.qixservice.online/sy22/?GVW8=VBKd4i1TBAeTlYBnm9tWLCP4ww2vn+XVFOQPMnsW4AFxqlBX+KApyR5y0aXQ0sSyxSIvT0ne&uzuD=Zld0rPDHNj | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.podplugca.com/sy22/?GVW8=1SbEEVOB0X5p51zw8Y9tIyj0s4wRGWDD/YTF5BQf3aGuyUlv8rzVEk4tRHrNdM/Dikld30uR&uzuD=Zld0rPDHNj | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.jizihao1.com/sy22/?GVW8=3PKlaCPIzU4vEpSTCliM62U/p7q8/wgFKC2xum1ddk3IfpDEo7oK1Mr0Jaw/Go0sFzx2J7Yb&uzuD=Zld0rPDHNj | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.displayfridges.fun/sy22/?GVW8=aXg/rmbVwlFwwtnhCbViqZ1yX+MILNYt2xJKgyzLKbDp+5cOMXOnKyz8SWn7ESolc4/lQPeb&uzuD=Zld0rPDHNj |
request | GET http://www.qixservice.online/sy22/?GVW8=VBKd4i1TBAeTlYBnm9tWLCP4ww2vn+XVFOQPMnsW4AFxqlBX+KApyR5y0aXQ0sSyxSIvT0ne&uzuD=Zld0rPDHNj |
request | GET http://www.podplugca.com/sy22/?GVW8=1SbEEVOB0X5p51zw8Y9tIyj0s4wRGWDD/YTF5BQf3aGuyUlv8rzVEk4tRHrNdM/Dikld30uR&uzuD=Zld0rPDHNj |
request | GET http://www.jizihao1.com/sy22/?GVW8=3PKlaCPIzU4vEpSTCliM62U/p7q8/wgFKC2xum1ddk3IfpDEo7oK1Mr0Jaw/Go0sFzx2J7Yb&uzuD=Zld0rPDHNj |
request | GET http://www.displayfridges.fun/sy22/?GVW8=aXg/rmbVwlFwwtnhCbViqZ1yX+MILNYt2xJKgyzLKbDp+5cOMXOnKyz8SWn7ESolc4/lQPeb&uzuD=Zld0rPDHNj |
file | C:\Users\test22\AppData\Local\Temp\ohtfjmxqk.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Strab.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Garf.Gen.7 |
Skyhigh | BehavesLike.Win32.Generic.gc |
ALYac | Gen:Heur.Mint.Zard.55 |
Malwarebytes | Malware.AI.3433992955 |
K7AntiVirus | Riskware ( 00584baa1 ) |
K7GW | Riskware ( 00584baa1 ) |
Cybereason | malicious.a4b746 |
Arcabit | Trojan.Garf.Gen.7 [many] |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ETKA |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan.Win32.Strab.gen |
BitDefender | Trojan.Garf.Gen.7 |
Avast | FileRepMalware [Pws] |
Tencent | Win32.Trojan.Strab.Ddhl |
Emsisoft | Trojan.Garf.Gen.7 (B) |
VIPRE | Trojan.Garf.Gen.7 |
FireEye | Generic.mg.df247bbfaf91dbe0 |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Detected | |
Avira | TR/Injector.zigjw |
MAX | malware (ai score=82) |
Kingsoft | malware.kb.a.896 |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Microsoft | Trojan:Win32/Formbook.AT!MTB |
ZoneAlarm | HEUR:Trojan.Win32.Strab.gen |
GData | Trojan.NSISX.Spy.Gen.24 |
Varist | W32/ABRisk.XWJV-2760 |
AhnLab-V3 | Malware/Win.Generic.C5520779 |
McAfee | RDN/Generic.dx |
VBA32 | BScope.Trojan.Injector |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
Rising | Trojan.Generic@AI.90 (RDML:xL2rumekJHwIero2WuAZbQ) |
Ikarus | Trojan.Win32.Injector |
Fortinet | NSIS/Agent.DCAC!tr |
BitDefenderTheta | Gen:NN.ZexaF.36738.wqW@aO74qdhi |
AVG | FileRepMalware [Pws] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |