Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 8, 2024, 4:48 p.m. | Aug. 8, 2024, 4:50 p.m. |
-
카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.exe "C:\Users\test22\AppData\Local\Temp\카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.exe"
2540-
카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.tmp "C:\Users\test22\AppData\Local\Temp\is-NMQ0M.tmp\카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.tmp" /SL5="$80178,1572778,839680,C:\Users\test22\AppData\Local\Temp\카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.exe"
2620-
카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.exe "C:\Users\test22\AppData\Local\Temp\카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.exe" /VERYSILENT /NORESTART
2692-
카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.tmp "C:\Users\test22\AppData\Local\Temp\is-BEJMA.tmp\카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.tmp" /SL5="$90178,1572778,839680,C:\Users\test22\AppData\Local\Temp\카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.exe" /VERYSILENT /NORESTART
2764-
PING.EXE "ping" -n 11 127.0.0.1
2816 -
-
tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
2996 -
find.exe find /I "wrsa.exe"
3032
-
-
-
tasklist.exe tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
2068 -
find.exe find /I "opssvc.exe"
2192
-
-
cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
2408-
tasklist.exe tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
2480 -
find.exe find /I "avastui.exe"
2572
-
-
-
tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
2756 -
find.exe find /I "avgui.exe"
2828
-
-
cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
648-
tasklist.exe tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
1512 -
find.exe find /I "nswscsvc.exe"
1064
-
-
cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
2976-
tasklist.exe tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
1864 -
find.exe find /I "sophoshealth.exe"
1216
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\\RudderOverlap.bat"
2220-
chcp.com chcp.com 437
2260 -
find.exe fiNd
2444 -
findstr.exe findstr /L /I set "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\\RudderOverlap.bat"
2652 -
findstr.exe findstr /L /I goto "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\\RudderOverlap.bat"
2688 -
findstr.exe findstr /L /I echo "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\\RudderOverlap.bat"
2496 -
findstr.exe findstr /L /I pause "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\\RudderOverlap.bat"
2784 -
cmd.exe C:\Windows\system32\cmd.exe /c type tmp
300 -
find.exe find
2604 -
cmd.exe C:\Windows\system32\cmd.exe /c type tmp
1792 -
AutoIt3.exe "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\AutoIt3.exe" "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\mssign32.sys"
2956-
rundll32.exe C:\Windows\SysWOW64\rundll32.exe
812
-
-
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .itext |
section | .didata |
file | C:\Users\test22\AppData\Local\Temp\is-HV0UU.tmp\_isetup\_iscrypt.dll |
file | C:\Users\test22\AppData\Local\Temp\is-BLI8T.tmp\_isetup\_iscrypt.dll |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe" |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe" |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe" |
cmdline | C:\Windows\system32\cmd.exe /c type tmp |
cmdline | cmd.exe /c "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\\RudderOverlap.bat" |
cmdline | "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Realtek HD Audio Universal Service\\RudderOverlap.bat" |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe" |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe" |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe" |
file | C:\Users\test22\AppData\Local\Temp\is-HV0UU.tmp\_isetup\_iscrypt.dll |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'SOPHOSHEALTH.EXE' |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'WRSA.EXE' |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'AVGUI.EXE' |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'NSWSCSVC.EXE' |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'OPSSVC.EXE' |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'AVASTUI.EXE' |
cmdline | tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe" |
cmdline | chcp.com 437 |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe" |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe" |
cmdline | tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH |
cmdline | tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH |
cmdline | tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe" |
cmdline | tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe" |
cmdline | "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe" |
cmdline | tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH |
file | C:\Users\test22\AppData\Local\Temp\is-BEJMA.tmp\카카오 엔터테인먼트의 지식재산권 침해 내용.PDF.tmp |
Bkav | W32.AIDetectMalware |
ALYac | Spyware.Infostealer.Lumma |
Sangfor | Trojan.Win32.Agent.Vz0j |
Symantec | Trojan.Gen.MBT |
McAfee | Artemis!6EAF878C7F14 |
Avast | FileRepMalware [Misc] |
Kaspersky | Trojan.Win32.Strab.nni |
Alibaba | Trojan:Win32/Generic.5fccfb25 |
TrendMicro | TrojanSpy.Win32.LUMMASTEALER.YXEHEZ |
McAfeeD | ti!719BE172D349 |
Sophos | Mal/Generic-S |
Microsoft | Trojan:Win32/Razy!MTB |
ZoneAlarm | Trojan.Win32.Strab.nni |
DeepInstinct | MALICIOUS |
Ikarus | Trojan.Win32.Razy |
TrendMicro-HouseCall | TrojanSpy.Win32.LUMMASTEALER.YXEHEZ |
AVG | FileRepMalware [Misc] |
CrowdStrike | win/grayware_confidence_60% (D) |