Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 31, 2025, 12:07 p.m. | March 31, 2025, 12:22 p.m. |
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy unrestricted -File C:\Users\test22\AppData\Local\Temp\pdf.ps1
2544-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\tmpF8C7.exe"
2904 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\gFnEPEuEhX.exe"
2960 -
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmp581D.tmp"
3000 -
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmpB0BD.tmp"
2784 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\gFnEPEuEhX.exe"
2612 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Tencent\process.exe"
2716 -
-
recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\test22\AppData\Local\Temp\vyfeuhxwjibvrjt"
2760 -
recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\test22\AppData\Local\Temp\fasonaiqxqtibpizyt"
2084 -
recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\test22\AppData\Local\Temp\quyhostrlzlneeedpehqj"
3008 -
recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\test22\AppData\Local\Temp\ndzrljywndhla"
2664 -
recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\test22\AppData\Local\Temp\xgeklcjyjlzycrsr"
828 -
recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\test22\AppData\Local\Temp\hajumutsxtrdnxgvappx"
2696
-
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
geoplugin.net | 178.237.33.50 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49182 -> 103.28.89.34:10101 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49180 -> 103.28.89.34:10101 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49183 -> 103.28.89.34:10101 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49184 -> 103.28.89.34:10101 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | Malware Command and Control Activity Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49182 103.28.89.34:10101 |
None | None | None |
TLS 1.3 192.168.56.101:49183 103.28.89.34:10101 |
None | None | None |
TLS 1.3 192.168.56.101:49180 103.28.89.34:10101 |
None | None | None |
TLS 1.3 192.168.56.101:49184 103.28.89.34:10101 |
None | None | None |
file | C:\Program Files\Google\Chrome\Application\Chrome.exe |
file | C:\Program Files (x86)\Mozilla Firefox\nss3.dll |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geoplugin.net/json.gp |
request | GET http://geoplugin.net/json.gp |
description | process.exe tried to sleep 229 seconds, actually delayed analysis time by 229 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 39 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 38 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 35 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 34 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 37 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 36 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 31 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 30 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 33 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 32 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\ |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data-wal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 28 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 29 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 22 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 23 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 20 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 21 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 26 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 27 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 24 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 25 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 59 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 58 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 53 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 52 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 51 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 50 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 57 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 56 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 55 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 54 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Login Data |
file | C:\Users\test22\AppData\Local\Temp\tmpF8C7.exe |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | schtasks.exe /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmpB0BD.tmp" |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\gFnEPEuEhX.exe" |
cmdline | schtasks.exe /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmp581D.tmp" |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\gFnEPEuEhX.exe" |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Tencent\process.exe" |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\tmpF8C7.exe" |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmpB0BD.tmp" |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmp581D.tmp" |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\ProgramData\Tencent\process.exe" |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\tmpF8C7.exe" |
file | C:\Users\test22\AppData\Local\Temp\tmpF8C7.exe |
Skyhigh | BehavesLike.PS.Dropper.tn |
Symantec | Scr.Malcode!gdn34 |
ESET-NOD32 | a variant of MSIL/Kryptik.ANKQ |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Microsoft | Trojan:MSIL/AgentTesla!rfn |
Tencent | Msil.Trojan-Spy.Noon.Bujl |
huorong | Trojan/PS.Encpe.a |
alibabacloud | Trojan[spy]:MSIL/AgentTesla.RBS2XJC |
description | Create a windows service | rule | Create_Service | ||||||
description | Client_SW_User_Data_Stealer | rule | Client_SW_User_Data_Stealer | ||||||
description | Win Backdoor RemcosRAT | rule | Win_Backdoor_RemcosRAT | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Client_SW_User_Data_Stealer | rule | Client_SW_User_Data_Stealer | ||||||
description | Win Backdoor RemcosRAT | rule | Win_Backdoor_RemcosRAT | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | browser info stealer | rule | infoStealer_browser_Zero | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Google Chrome User Data Check | rule | Chrome_User_Data_Check_Zero | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg |
cmdline | schtasks.exe /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmpB0BD.tmp" |
cmdline | schtasks.exe /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmp581D.tmp" |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmpB0BD.tmp" |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\test22\AppData\Local\Temp\tmp581D.tmp" |
host | 103.28.89.34 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-HP44IR | reg_value | "C:\ProgramData\Tencent\process.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-HP44IR | reg_value | "C:\ProgramData\Tencent\process.exe" | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-HP44IR | reg_value | "C:\ProgramData\Tencent\process.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-HP44IR | reg_value | "C:\ProgramData\Tencent\process.exe" |
file | C:\Users\test22\AppData\Local\Temp\tmpF8C7.exe |
file | C:\Users\test22\AppData\Roaming\Digsby\digsby.dat |
file | C:\Users\test22\AppData\Roaming\MySpace\IM\users.txt |
registry | HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords |
registry | HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts |
registry | HKEY_CURRENT_USER\Software\Paltalk |