Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Dec. 14, 2023, 6:52 p.m. | Dec. 14, 2023, 7:18 p.m. |
-
-
upsync.exe "C:\Users\test22\AppData\Local\Temp\upsync.exe"
2644 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" -- "C:\Users\test22\AppData\Local\Temp\sample.pdf"
2688-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef42ef1e8,0x7fef42ef1f8,0x7fef42ef208
2776 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2692 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6
2876
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
66.228.60.47 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49212 66.228.60.47:443 |
C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | bb:9a:7f:1c:3f:0d:23:07:8e:c9:10:9f:2e:a1:af:cd:a4:86:b4:ea |
TLSv1 192.168.56.101:49169 66.228.60.47:443 |
C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | bb:9a:7f:1c:3f:0d:23:07:8e:c9:10:9f:2e:a1:af:cd:a4:86:b4:ea |
TLSv1 192.168.56.101:49213 66.228.60.47:443 |
C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | bb:9a:7f:1c:3f:0d:23:07:8e:c9:10:9f:2e:a1:af:cd:a4:86:b4:ea |
TLSv1 192.168.56.101:49210 66.228.60.47:443 |
C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | C=US, ST=Florida, L=Tampa, unknown=, unknown=4652, O=LLC, CN=66.228.60.47 | bb:9a:7f:1c:3f:0d:23:07:8e:c9:10:9f:2e:a1:af:cd:a4:86:b4:ea |
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe\PATH |
section | .didat |
resource name | PNG |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\2d61ad42-e909-47d9-b320-e533262c495d.dmp |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Bloom Prefix Set |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing IP Blacklist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Module Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\ChromeFilenameClientIncident.store |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Side-Effect Free Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing UwS List Prefix Set |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Inclusion Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Csd Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Extension Blacklist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-63327DF3-A54.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Resource Blacklist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-657AEC6D-A80.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\First Run |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Download Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Download |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Stability\2688-1702547526093750.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\AnyIpMalware.store |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing UwS List |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Bloom |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3 |
file | C:\Users\test22\AppData\Local\Temp\sample.pdf |
file | C:\Users\test22\AppData\Local\Temp\upsync.exe |
file | C:\Users\test22\AppData\Local\Temp\upsync.exe |
file | C:\Users\test22\AppData\Local\Temp\sample.pdf |
section | {u'size_of_data': u'0x00006200', u'virtual_address': u'0x00068000', u'entropy': 6.865232871115746, u'name': u'.rsrc', u'virtual_size': u'0x000060c8'} | entropy | 6.86523287112 | description | A section with a high entropy has been found |
url | https://crashpad.chromium.org/bug/new |
url | https://crashpad.chromium.org/ |
url | https://clients4.google.com/invalidation/android/request/ |
url | http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
url | http://services.ukrposhta.com/postindex_new/ |
url | http://dts.search-results.com/sr?lng= |
url | http://inposdom.gob.do/codigo-postal/ |
url | http://creativecommons.org/ns |
url | http://www.postur.fo/ |
url | https://qc.search.yahoo.com/search?ei= |
url | https://cacert.omniroot.com/baltimoreroot.crt09 |
url | https://codereview.chromium.org/25305002). |
url | https://search.yahoo.com/search?ei= |
url | http://t1.symcb.com/ThawtePCA.crl0/ |
url | http://crbug.com/31395. |
url | https://support.google.com/chrome/answer/165139 |
url | https://ct.googleapis.com/aviator/ |
url | https://datasaver.googleapis.com/v1/clientConfigs |
url | http://crl.starfieldtech.com/sfroot-g2.crl0L |
url | https://ct.startssl.com/ |
url | https://suggest.yandex.com.tr/suggest-ff.cgi?part= |
url | https://de.search.yahoo.com/favicon.ico |
url | https://github.com/GoogleChrome/Lighthouse/issues |
url | http://www.searchnu.com/favicon.ico |
url | https://support.google.com/installer/?product= |
url | http://msdn.microsoft.com/en-us/library/ms792901.aspx |
url | https://www.najdi.si/search.jsp?q= |
url | http://x.ss2.us/x.cer0 |
url | http://crl.geotrust.com/crls/gtglobal.crl04 |
url | https://accounts.google.com/ServiceLogin |
url | https://accounts.google.com/OAuthLogin |
url | https://c.android.clients.google.com/ |
url | https://www.google.com/tools/feedback/chrome/__submit |
url | https://chrome.google.com/webstore/category/collection/dark_themes |
url | http://check.googlezip.net/generate_204 |
url | http://ocsp.starfieldtech.com/08 |
url | http://www.guernseypost.com/postcode_finder/ |
url | http://crl.certum.pl/ca.crl0h |
url | http://ator |
url | https://suggest.yandex.by/suggest-ff.cgi?part= |
url | http://feed.snap.do/?q= |
url | https://sp.uk.ask.com/sh/i/a16/favicon/favicon.ico |
url | http://www.language |
url | https://support.google.com/chrome/ |
url | http://developer.chrome.com/apps/declare_permissions.html |
url | http://www.google.com/chrome/intl/ko/eula_text.html |
url | https://www.globalsign.com/repository/03 |
url | http://www.startssl.com/sfsca.crl0 |
url | http://UA-Compatible |
url | https://se.search.yahoo.com/search?ei= |
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Client_SW_User_Data_Stealer | rule | Client_SW_User_Data_Stealer | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Perform crypto currency mining | rule | BitCoin | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Install itself for autorun at Windows startup | rule | Persistence | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Virtual currency | rule | Virtual_currency_Zero |
host | 66.228.60.47 |
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef42ef1e8,0x7fef42ef1f8,0x7fef42ef208 | ||||||
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1264,6964131211983040097,3362168137386831340,131072 --gpu-preferences=KAAAAAAAAAAABwAAAQAAAAAAAAAAAGAAAQAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x80ee --gpu-device-id=0xbeef --gpu-driver-vendor=Microsoft --gpu-driver-version=6.1.7600.16385 --gpu-driver-date=6-21-2006 --service-request-channel-token=736DA18E4D5D86E8281BEA2F69F81FBC --mojo-platform-channel-handle=1280 --ignored=" --type=renderer " /prefetch:2 | ||||||
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2692 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6 |
url | http://127.0.0.1 |
cmdline | "C:\Users\test22\AppData\Local\Temp\upsync.exe" |
cmdline | C:\Users\test22\AppData\Local\Temp\upsync.exe |
Bkav | W32.AIDetectMalware |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Generic.fh |
ALYac | Generic.Trojan.Havokiz.Marte.D.28F89B35 |
Cylance | unsafe |
VIPRE | Generic.Trojan.Havokiz.Marte.D.28F89B35 |
Sangfor | Backdoor.Win64.Havoc.Vq4k |
BitDefender | Generic.Trojan.Havokiz.Marte.D.28F89B35 |
Cybereason | malicious.fae9b8 |
Arcabit | Generic.Trojan.Havokiz.Marte.D.28F89B35 |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | a variant of Win64/Havoc_AGen.E |
Avast | Win64:Evo-gen [Trj] |
ClamAV | Win.Trojan.Nsisx-9979076-0 |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Backdoor:Win64/Havokiz.f443c9e5 |
MicroWorld-eScan | Generic.Trojan.Havokiz.Marte.D.28F89B35 |
Rising | Backdoor.Havoc!8.970A (TFE:4:Muj2LsPTQQM) |
Emsisoft | Generic.Trojan.Havokiz.Marte.D.28F89B35 (B) |
F-Secure | Heuristic.HEUR/AGEN.1368308 |
Zillya | Trojan.Generic.Win32.1827528 |
FireEye | Generic.mg.55461180284dcdf6 |
Sophos | Mal/Generic-S |
Detected | |
Avira | HEUR/AGEN.1368308 |
MAX | malware (ai score=80) |
Antiy-AVL | Trojan/Win64.Havoc |
Kingsoft | Win32.Troj.Unknown.a |
Microsoft | VirTool:Win64/Havokiz.E!MTB |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Generic.Trojan.Havokiz.Marte.D.28F89B35 |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware/Suspicious |
Tencent | Win64.Backdoor.C2.Kcnw |
SentinelOne | Static AI - Malicious SFX |
AVG | Win64:Evo-gen [Trj] |
CrowdStrike | win/malicious_confidence_90% (W) |