Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 11, 2024, 9:40 a.m. | Nov. 11, 2024, 9:57 a.m. |
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\xKtzvdEoDAjLmvN.exe"
2436 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\uXVGwksuXiVBy.exe"
2496 -
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmpF69F.tmp"
2556 -
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"
2992 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\uXVGwksuXiVBy.exe"
3040 -
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmp34C2.tmp"
2104 -
-
-
-
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2660 CREDAT:145409
2800 -
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2660 CREDAT:79875
2980
-
-
-
svchost.exe svchost.exe
2132 -
svchost.exe svchost.exe
2404
-
-
-
-
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | VCV.pdb |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmpF69F.tmp" |
cmdline | schtasks.exe /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmpF69F.tmp" |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\xKtzvdEoDAjLmvN.exe" |
cmdline | http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0 |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\uXVGwksuXiVBy.exe" |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmp34C2.tmp" |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\uXVGwksuXiVBy.exe" |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe" |
cmdline | schtasks.exe /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmp34C2.tmp" |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe" |
cmdline | svchost.exe |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\xKtzvdEoDAjLmvN.exe" |
section | {u'size_of_data': u'0x00103200', u'virtual_address': u'0x00002000', u'entropy': 7.763201519088053, u'name': u'.text', u'virtual_size': u'0x001031f0'} | entropy | 7.76320151909 | description | A section with a high entropy has been found | |||||||||
entropy | 0.997593840231 | description | Overall entropy of this PE file is high |
description | Create a windows service | rule | Create_Service | ||||||
description | Client_SW_User_Data_Stealer | rule | Client_SW_User_Data_Stealer | ||||||
description | Win Backdoor RemcosRAT | rule | Win_Backdoor_RemcosRAT | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Client_SW_User_Data_Stealer | rule | Client_SW_User_Data_Stealer | ||||||
description | Win Backdoor RemcosRAT | rule | Win_Backdoor_RemcosRAT | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmpF69F.tmp" |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2660 CREDAT:145409 |
cmdline | schtasks.exe /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmpF69F.tmp" |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmp34C2.tmp" |
cmdline | schtasks.exe /Create /TN "Updates\uXVGwksuXiVBy" /XML "C:\Users\test22\AppData\Local\Temp\tmp34C2.tmp" |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:2660 CREDAT:79875 |
cmdline | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome |
host | 66.63.162.79 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-1CY96M | reg_value | "C:\ProgramData\Remcos\remcos.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-1CY96M | reg_value | "C:\ProgramData\Remcos\remcos.exe" | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-1CY96M | reg_value | "C:\ProgramData\Remcos\remcos.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-1CY96M | reg_value | "C:\ProgramData\Remcos\remcos.exe" |