Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 26, 2023, 5:10 p.m. | Oct. 26, 2023, 5:16 p.m. |
-
-
-
pznhcda.exe "C:\Users\test22\AppData\Local\Temp\pznhcda.exe"
2220
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.sunspotplumbing.com |
CNAME
sunspotplumbing.com
|
15.197.148.33 |
www.dryadai.com | 3.64.163.50 | |
www.sarthaksrishticreation.com | 119.18.49.69 | |
www.fuhouse.link |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49166 -> 119.18.49.69:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49167 -> 3.33.130.190:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49168 -> 3.64.163.50:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.sarthaksrishticreation.com/sy22/?tZUT=++s7hqRnDFs/g5YbNhmDQGydnZIcmR65wuKS6+wpOQxc/+r74UhYv08VjUB0PTEo7NuOximl&9r48E=FdC4E0Y | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.sunspotplumbing.com/sy22/?tZUT=d6AqkGJ7bunbgmizHHRyxSnS+cE7N+DoqWC4nPxnpUsdFYm3pr534s62tX1C6jkDEl4YnzCY&9r48E=FdC4E0Y | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.dryadai.com/sy22/?tZUT=T4nku/U6fUoiT4V699ActYtDMjyavvK02m+fxEC1q0+DSMs1WUMajGSqA4Kum2DGC179VQvP&9r48E=FdC4E0Y |
request | GET http://www.sarthaksrishticreation.com/sy22/?tZUT=++s7hqRnDFs/g5YbNhmDQGydnZIcmR65wuKS6+wpOQxc/+r74UhYv08VjUB0PTEo7NuOximl&9r48E=FdC4E0Y |
request | GET http://www.sunspotplumbing.com/sy22/?tZUT=d6AqkGJ7bunbgmizHHRyxSnS+cE7N+DoqWC4nPxnpUsdFYm3pr534s62tX1C6jkDEl4YnzCY&9r48E=FdC4E0Y |
request | GET http://www.dryadai.com/sy22/?tZUT=T4nku/U6fUoiT4V699ActYtDMjyavvK02m+fxEC1q0+DSMs1WUMajGSqA4Kum2DGC179VQvP&9r48E=FdC4E0Y |
file | C:\Users\test22\AppData\Local\Temp\pznhcda.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Strab.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.70042484 |
FireEye | Generic.mg.5a7848fdbc0ca7ba |
Skyhigh | BehavesLike.Win32.Generic.fc |
ALYac | Gen:Variant.Jaik.182440 |
VIPRE | Trojan.Garf.Gen.10 |
Sangfor | Trojan.Win32.Injector.Vb6s |
K7AntiVirus | Trojan ( 005ad15f1 ) |
BitDefender | Trojan.GenericKD.70042484 |
K7GW | Trojan ( 005ad15f1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector_AGen.ADX |
APEX | Malicious |
Kaspersky | HEUR:Trojan.Win32.Strab.gen |
Rising | Trojan.Generic@AI.90 (RDML:eestCTKhkN64RBWOCbjvfQ) |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/Injector_AGen.fnogn |
DrWeb | Trojan.Loader.1797 |
Emsisoft | Trojan.GenericKD.70042484 (B) |
SentinelOne | Static AI - Suspicious PE |
GData | Trojan.GenericKD.70042484 |
Detected | |
Avira | HEUR/AGEN.1337943 |
Varist | W32/Injector.BRW.gen!Eldorado |
Antiy-AVL | Trojan/Win32.Injector |
Kingsoft | malware.kb.a.726 |
Xcitium | Malware@#1unkggprgst7p |
Arcabit | Trojan.Generic.D42CC374 |
ZoneAlarm | HEUR:Trojan.Win32.Strab.gen |
Microsoft | Trojan:Win32/Leonem |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.Wacatac.C5531410 |
McAfee | Artemis!5A7848FDBC0C |
MAX | malware (ai score=84) |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Trojan.Strab |
Cylance | unsafe |
TrendMicro-HouseCall | TROJ_GEN.F0D1C00JP23 |
Tencent | Win32.Trojan.Strab.Gplw |
Ikarus | Trojan.Win32.Injector |
Fortinet | NSIS/Agent.DCAC!tr |
BitDefenderTheta | Gen:NN.ZexaF.36792.nqW@aOpaH8ki |
AVG | Win32:AdwareX-gen [Adw] |
Cybereason | malicious.71054b |
Avast | Win32:AdwareX-gen [Adw] |