Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 18, 2023, 7:49 a.m. | Dec. 18, 2023, 7:53 a.m. |
-
-
-
drnzy.exe "C:\Users\test22\AppData\Local\Temp\drnzy.exe"
2220
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
akcay.duckdns.org | 91.92.243.245 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
UDP 192.168.56.103:52760 -> 8.8.8.8:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 8.8.8.8:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 91.92.243.245:3245 -> 192.168.56.103:49166 | 2036735 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49166 -> 91.92.243.245:3245 | 2036734 | ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
domain | akcay.duckdns.org |
file | C:\Users\test22\AppData\Local\Temp\drnzy.exe |
file | C:\Users\test22\AppData\Roaming\wggclluqaavffo\kttdyyie.exe |
file | C:\Users\test22\AppData\Local\Temp\drnzy.exe |
file | C:\Users\test22\AppData\Local\Temp\drnzy.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\enwss | reg_value | C:\Users\test22\AppData\Roaming\wggclluqaavffo\kttdyyie.exe "C:\Users\test22\AppData\Local\Temp\drnzy.exe" |