Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 18, 2024, 2:11 p.m. | Aug. 18, 2024, 2:15 p.m. |
-
Images.exe "C:\Users\test22\AppData\Local\Temp\Images.exe"
1932 -
x0x.exe C:\Users\test22\AppData\Local\Temp\x0x.exe x -p148ifdh8ajAHAjaa -o+ C:\Users\test22\AppData\Local\Temp\mpc.part01.rar C:\Users\test22\AppData\Local\Temp
2596 -
-
-
-
cmd.exe cmd.exe /c copy /y mpc\41678903251236549780 mpc\mpc.exe
2980
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
raw.githubusercontent.com | 185.199.109.133 | |
github.com | 20.200.245.247 | |
www.heyderw.de | 92.205.208.182 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49195 -> 92.205.208.182:80 | 2013031 | ET POLICY Python-urllib/ Suspicious User Agent | Attempted Information Leak |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49164 20.200.245.247:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo ECC Domain Validation Secure Server CA | CN=github.com | e7:03:5b:cc:1c:18:77:1f:79:2f:90:86:6b:6c:1d:f8:df:aa:bd:c0 |
TLS 1.2 192.168.56.103:49165 185.199.109.133:443 |
C=US, O=DigiCert Inc, CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=*.github.io | 97:d8:c5:70:0f:12:24:6c:88:bc:fa:06:7e:8c:a7:4d:a8:62:67:28 |
TLS 1.2 192.168.56.103:49166 20.200.245.247:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo ECC Domain Validation Secure Server CA | CN=github.com | e7:03:5b:cc:1c:18:77:1f:79:2f:90:86:6b:6c:1d:f8:df:aa:bd:c0 |
TLS 1.2 192.168.56.103:49167 185.199.109.133:443 |
C=US, O=DigiCert Inc, CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=*.github.io | 97:d8:c5:70:0f:12:24:6c:88:bc:fa:06:7e:8c:a7:4d:a8:62:67:28 |
TLS 1.2 192.168.56.103:49169 185.199.109.133:443 |
C=US, O=DigiCert Inc, CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=*.github.io | 97:d8:c5:70:0f:12:24:6c:88:bc:fa:06:7e:8c:a7:4d:a8:62:67:28 |
TLS 1.2 192.168.56.103:49168 20.200.245.247:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo ECC Domain Validation Secure Server CA | CN=github.com | e7:03:5b:cc:1c:18:77:1f:79:2f:90:86:6b:6c:1d:f8:df:aa:bd:c0 |
request | GET http://www.heyderw.de/gpg/mpc-us.php |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfc90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfc90u.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\msvcm90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfcm90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\msvcr90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfcm90u.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\python27.dll |
file | C:\Users\test22\AppData\Local\Temp\mpc.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\msvcp90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\pywintypes27.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\pythoncom27.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\msvcm90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\python27.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\msvcp90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\msvcr90.dll |
file | C:\Users\test22\AppData\Local\Temp\ckz_OE8R\mpc.exe |
cmdline | cmd.exe /c copy /y mpc\41678903251236549780 mpc\mpc.exe |
file | C:\Users\test22\AppData\Local\Temp\ckz_OE8R\mpc.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\bz2.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\_ssl.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\win32ui.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\unicodedata.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfc90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\win32event.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\python27.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\_ctypes.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfcm90u.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\pythoncom27.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\win32process.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\_win32sysloader.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\pywintypes27.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\win32api.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfc90u.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\select.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\_hashlib.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\msvcm90.dll |
file | C:\Users\test22\AppData\Local\Temp\mpc.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\msvcp90.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\mfcm90.dll |
file | C:\Users\test22\AppData\Local\Temp\x0x.exe |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\win32trace.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI27522\_socket.pyd |
file | C:\Users\test22\AppData\Local\Temp\_MEI19322\msvcr90.dll |
file | C:\Users\test22\AppData\Local\Temp\ckz_OE8R\mpc.exe |
section | {u'size_of_data': u'0x00005200', u'virtual_address': u'0x0000c000', u'entropy': 6.940294876766253, u'name': u'.rdata', u'virtual_size': u'0x00005008'} | entropy | 6.94029487677 | description | A section with a high entropy has been found |
url | http://s.symcb.com/universal-root.crl0 |
url | http://s2.symcb.com0 |
url | https://d.symcb.com/cps0% |
url | http://sv.symcb.com/sv.crt0 |
url | http://ts-ocsp.ws.symantec.com0 |
url | http://sv.symcb.com/sv.crl0a |
url | http://s.symcd.com06 |
url | http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0( |
url | http://sv.symcd.com0 |
url | http://www.symauth.com/rpa00 |
url | http://s1.symcb.com/pca3-g5.crl0 |
url | http://www.symauth.com/cps0( |
url | https://d.symcb.com/rpa0. |
url | https://d.symcb.com/rpa0 |
url | http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0 |
description | Checks if being debugged | rule | anti_dbg |
file | C:\Program Files\Malwarebytes\Anti-Malware\mbam.exe |
file | C:\Program Files (x86)\Malwarebytes\Anti-Malware\mbam.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell | reg_value | explorer.exe,"C:\ProgramData\Samsung\svdhost.exe","C:\Users\test22\AppData\Roaming\Fsdisk\Moderax\svdhost.exe","C:\Users\test22\AppData\Roaming\Alexa\Virtual\hostcls.exe" |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Agent.V3yn |
APEX | Malicious |
Avast | Win32:Malware-gen |
ClamAV | Win.Dropper.Detected-9969224-0 |
F-Secure | Trojan.TR/Dropper.Gen |
FireEye | Generic.mg.544fb98f86fbbbfe |
Sophos | Generic Reputation PUA (PUA) |
Detected | |
Avira | TR/Dropper.Gen |
Microsoft | Trojan:Win32/Wacatac.B!ml |
BitDefenderTheta | Gen:NN.ZexaF.36812.@J3@aKsopjyi |
DeepInstinct | MALICIOUS |
AVG | Win32:Malware-gen |