Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 26, 2024, 9:49 a.m. | Sept. 26, 2024, 10:03 a.m. |
-
-
._cache_win11.exe "C:\Users\test22\AppData\Local\Temp\._cache_win11.exe"
2116 -
Synaptics.exe "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
2168
-
Name | Response | Post-Analysis Lookup |
---|---|---|
docs.google.com | 172.217.25.174 | |
xred.mooo.com | ||
drive.usercontent.google.com | 142.250.206.193 | |
www.dropbox.com |
CNAME
www-env.dropbox-dns.com
|
162.125.84.18 |
freedns.afraid.org | 69.42.215.252 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2015633 | ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com | Misc activity |
TCP 192.168.56.103:49174 -> 162.125.84.18:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49172 -> 142.250.197.97:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49173 -> 162.125.84.18:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49171 -> 142.250.199.110:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49172 142.250.197.97:443 |
C=US, O=Google Trust Services, CN=WR2 | CN=*.usercontent.google.com | f5:54:6d:c6:4a:e9:8d:11:08:42:db:d8:ab:93:c6:b2:fc:80:da:78 |
TLSv1 192.168.56.103:49171 142.250.199.110:443 |
C=US, O=Google Trust Services, CN=WR2 | CN=*.google.com | 99:1a:e6:c6:9b:04:87:74:e3:da:97:c8:29:09:15:16:cf:1f:6a:78 |
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
domain | xred.mooo.com |
request | GET http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978 |
request | GET https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download |
request | GET https://drive.usercontent.google.com/download?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download |
request | GET https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download |
request | GET https://drive.usercontent.google.com/download?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download |
name | RT_ICON | language | LANG_TURKISH | filetype | dBase IV DBT of @.DBF, block length 8192, next free block index 40 | sublanguage | SUBLANG_DEFAULT | offset | 0x000b39f8 | size | 0x000010a8 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | dBase IV DBT of @.DBF, block length 8192, next free block index 40 | sublanguage | SUBLANG_DEFAULT | offset | 0x000b39f8 | size | 0x000010a8 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000d81b8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_TURKISH | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x000dca18 | size | 0x00000014 | ||||||||||||||||||
name | RT_VERSION | language | LANG_TURKISH | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x000dca2c | size | 0x00000304 |
domain | docs.google.com |
file | C:\ProgramData\Synaptics\Synaptics.dll |
file | C:\Users\test22\AppData\Local\Temp\._cache_win11.exe |
domain | www.dropbox.com |
host | 38.147.172.248 |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver | reg_value | C:\ProgramData\Synaptics\Synaptics.exe | ||||||
service_name | Jklmno | service_path | C:\Windows\pohbcu.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
process | Synaptics.exe | useragent | MyApp | ||||||
process | Synaptics.exe | useragent | Synaptics.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.DarkKomet.tp6k |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Sus.Nocivo.E0011 |
Skyhigh | BehavesLike.Win32.Synaptics.ch |
ALYac | Win32.Comet.A |
Cylance | Unsafe |
VIPRE | Win32.Comet.A |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Win32.Comet.A |
K7GW | Trojan ( 000112511 ) |
K7AntiVirus | Trojan ( 000112511 ) |
Arcabit | HEUR.VBA.Trojan.d |
Symantec | W32.Zorex |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/Delf.NBX |
APEX | Malicious |
Avast | Win32:RATX-gen [Trj] |
ClamAV | Win.Trojan.Emotet-9850453-0 |
Kaspersky | Backdoor.Win32.DarkKomet.hqxy |
Alibaba | Backdoor:Win32/DarkKomet.353 |
NANO-Antivirus | Trojan.Win32.DarkKomet.fazbwq |
SUPERAntiSpyware | Adware.FileTour/Variant |
MicroWorld-eScan | Win32.Comet.A |
Rising | Virus.Synaptics!1.E51C (CLASSIC) |
Emsisoft | Win32.Comet.A (B) |
F-Secure | Trojan:W97M/MaliciousMacro.GEN |
DrWeb | Win32.HLLW.Siggen.10555 |
Zillya | Trojan.Delf.Win32.76144 |
TrendMicro | Virus.Win32.NAPWHICH.B |
McAfeeD | ti!E9C81976F863 |
CTX | exe.trojan.generic |
Sophos | Troj/Farfli-DZ |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.613d958a64df2e88 |
Jiangmin | Win32/Synaptics.Gen |
Webroot | W32.Malware.gen |
Detected | |
Avira | TR/Injector.wqufb |
Antiy-AVL | Virus/Win32.DarkKomet.a |
Kingsoft | Win32.Infected.AutoInfector.a |
Gridinsoft | Trojan.Win32.Downloader.mz!n |
Xcitium | Virus.Win32.Agent.DE@74b38h |
Microsoft | Worm:Win32/AutoRun!atmn |
ViRobot | Win32.Zorex.A |
ZoneAlarm | Backdoor.Win32.DarkKomet.hqxy |
GData | Win32.Backdoor.Agent.AXS |
Varist | W32/Backdoor.OAZM-5661 |
AhnLab-V3 | Win32/Zorex.X1799 |
dead_host | 192.168.56.103:49181 |
dead_host | 192.168.56.103:49180 |
dead_host | 192.168.56.103:49182 |
dead_host | 192.168.56.103:49177 |
dead_host | 192.168.56.103:49165 |
dead_host | 38.147.172.248:8001 |
dead_host | 192.168.56.103:49179 |
dead_host | 192.168.56.103:49178 |
dead_host | 192.168.56.103:49167 |