Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 2, 2023, 10:04 a.m. | Nov. 2, 2023, 10:07 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Main
2564-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Main
2796-
netsh.exe netsh wlan show profiles
2940
-
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Save
2648-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Save
2832
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,
2740 -
explorer.exe C:\Windows\Explorer.EXE
1452
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
167.235.20.126 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
pdb_path | D:\Mktmp\Amadey\StealerDLL\x64\Release\STEALERDLL.pdb |
file | C:\Program Files (x86)\Google\Chrome\Application\Psi\profiles\default\accounts.xml |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe\Path |
section | _RDATA |
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://167.235.20.126/bjdm32DP/index.php |
request | POST http://167.235.20.126/bjdm32DP/index.php |
request | POST http://167.235.20.126/bjdm32DP/index.php |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-wal |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Default\Login Data |
cmdline | netsh wlan show profiles |
host | 167.235.20.126 |
file | C:\Users\test22\AppData\Roaming\Electrum\wallets |
file | C:\Users\test22\AppData\Roaming\Litecoin\wallets |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
registry | HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions |
file | C:\Windows\.purple\accounts.xml |
file | C:\util\Office.2010.Toolkit.and.EZ-Activator.v2.1.5.Final\.purple\accounts.xml |
file | C:\Windows\System32\.purple\accounts.xml |
file | C:\Program Files\Windows Photo Viewer\.purple\accounts.xml |
file | C:\.purple\accounts.xml |
file | C:\SystemRoot\System32\.purple\accounts.xml |
file | C:\Program Files\_Sandboxie\.purple\accounts.xml |
file | C:\Program Files (x86)\Internet Explorer\.purple\accounts.xml |
file | C:\Program Files\Windows NT\Accessories\.purple\accounts.xml |
file | C:\util\.purple\accounts.xml |
file | C:\Python27\.purple\accounts.xml |
file | C:\Program Files (x86)\Microsoft Office\Office12\.purple\accounts.xml |
file | C:\Users\test22\Downloads\.purple\accounts.xml |
file | C:\Program Files (x86)\Google\Chrome\Application\.purple\accounts.xml |
file | C:\Program Files (x86)\Hnc\Hwp80\.purple\accounts.xml |
file | C:\Program Files\_Wireshark\.purple\accounts.xml |
file | C:\Windows\SysWOW64\.purple\accounts.xml |
file | C:\Program Files (x86)\EditPlus\.purple\accounts.xml |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Zusy.477261 |
Skyhigh | BehavesLike.Win64.Dropper.th |
McAfee | Artemis!0111E5A2A499 |
VIPRE | Gen:Variant.Zusy.477261 |
Sangfor | Trojan.Win32.Save.a |
BitDefender | Gen:Variant.Zusy.477261 |
CrowdStrike | win/malicious_confidence_90% (W) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Amadey.G |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:Trojan-Spy.Win32.Stealer |
FireEye | Gen:Variant.Zusy.477261 |
Emsisoft | Gen:Variant.Zusy.477261 (B) |
Ikarus | Trojan-PSW.Agent |
GData | Gen:Variant.Zusy.477261 |
Detected | |
Arcabit | Trojan.Zusy.D7484D |
ZoneAlarm | UDS:Trojan-Spy.Win32.Stealer |
Microsoft | Trojan:Win32/Wacatac.B!ml |
AhnLab-V3 | Trojan/Win.Generic.C5288456 |
ALYac | Gen:Variant.Zusy.477261 |
MAX | malware (ai score=87) |
DeepInstinct | MALICIOUS |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | Win64:PWSX-gen [Trj] |
Avast | Win64:PWSX-gen [Trj] |