Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 28, 2023, 12:40 p.m. | Oct. 28, 2023, 12:45 p.m. |
-
-
-
umesd.exe "C:\Users\test22\AppData\Local\Temp\umesd.exe"
2164
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.ficylkghv.com | ||
www.promushealth.com | 81.17.29.148 | |
www.517912.com |
CNAME
y.ya-bo888.com
|
38.47.227.76 |
www.uzmayaqoob.com |
CNAME
uzmayaqoob.com
|
154.49.142.142 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49166 -> 38.47.227.76:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49168 -> 63.141.242.46:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49167 -> 154.49.142.142:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.517912.com/t6tg/?9r4P2=x+Kv6xpWcNesBkKfTwjNPM0LnGFvN7+CPVZKKdjbvYvOGsJKnhF5jBVeRF44UVI4ghuUdA3c&EjU4Sz=fdMTVRIPlB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.uzmayaqoob.com/t6tg/?9r4P2=XP7jkasqkgrWx1C3rIh2LMmDsrx9AEXuv+yJvInbJHFGDwSK0i3nVRBGHVeWBLS+d5Gq1e4Y&EjU4Sz=fdMTVRIPlB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.promushealth.com/t6tg/?9r4P2=7tYymCvuwOydaUuPNkovhG/t52+K0Kp+Kp8xcgM9C2uQN+XKa74YZrRvofV08ZJStB5H4sxz&EjU4Sz=fdMTVRIPlB |
request | GET http://www.517912.com/t6tg/?9r4P2=x+Kv6xpWcNesBkKfTwjNPM0LnGFvN7+CPVZKKdjbvYvOGsJKnhF5jBVeRF44UVI4ghuUdA3c&EjU4Sz=fdMTVRIPlB |
request | GET http://www.uzmayaqoob.com/t6tg/?9r4P2=XP7jkasqkgrWx1C3rIh2LMmDsrx9AEXuv+yJvInbJHFGDwSK0i3nVRBGHVeWBLS+d5Gq1e4Y&EjU4Sz=fdMTVRIPlB |
request | GET http://www.promushealth.com/t6tg/?9r4P2=7tYymCvuwOydaUuPNkovhG/t52+K0Kp+Kp8xcgM9C2uQN+XKa74YZrRvofV08ZJStB5H4sxz&EjU4Sz=fdMTVRIPlB |
file | C:\Users\test22\AppData\Local\Temp\umesd.exe |
Lionic | Trojan.Win32.Strab.4!c |
MicroWorld-eScan | Gen:Variant.Midie.135986 |
FireEye | Generic.mg.1b4bc7eb054142c7 |
Skyhigh | BehavesLike.Win32.Generic.gc |
Malwarebytes | Malware.AI.2421161474 |
VIPRE | Gen:Variant.Midie.135986 |
Sangfor | Trojan.Win32.Agent.Vgo2 |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Midie.135986 |
K7GW | Trojan ( 005ad2291 ) |
K7AntiVirus | Trojan ( 005ad2291 ) |
VirIT | Trojan.Win32.GenusT.DTHX |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ETKM |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:Trojan.Win32.Strab.gen |
Alibaba | Trojan:Win32/FormBook.26b16eb7 |
Emsisoft | Gen:Variant.Midie.135986 (B) |
F-Secure | Heuristic.HEUR/AGEN.1337943 |
DrWeb | Trojan.Siggen21.52418 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Injector |
GData | Gen:Variant.Midie.135986 |
Jiangmin | Trojan.Generic.cfksz |
Detected | |
Avira | HEUR/AGEN.1337943 |
Antiy-AVL | Trojan/Win32.Injector |
Gridinsoft | Trojan.Win32.FormBook.bot |
Arcabit | Trojan.Midie.D21332 |
ZoneAlarm | UDS:Trojan.Win32.Strab.gen |
Microsoft | Trojan:Win32/Vigorf.A |
Varist | W32/ABRisk.WEKL-4169 |
AhnLab-V3 | Trojan/Win.MalwareX-gen.R618381 |
BitDefenderTheta | Gen:NN.ZexaF.36792.pyW@aKTUBFai |
MAX | malware (ai score=81) |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Trojan.Strab |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R06CH07JQ23 |
Rising | Trojan.Formbook!8.F858 (TFE:5:qqrzCAtliq) |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | Win32:MalwareX-gen [Trj] |
Cybereason | malicious.3d2371 |
Avast | Win32:MalwareX-gen [Trj] |