Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 1, 2025, 9:59 a.m. | May 1, 2025, 10:06 a.m. |
-
-
-
conhost.exe C:\Windows\Fonts\conhost.exe install NetTcpConnection svchost
2152 -
sc.exe sc config "NetTcpConnection" DisplayName= "NetTcpConnection"
2228 -
sc.exe sc description "NetTcpConnection" "Microsoft .NetTcpConnection"
2288 -
sc.exe sc config NetTcpConnection start= auto
2344 -
sc.exe sc failure NetTcpConnection reset= 86400 actions= restart/60000/restart/60000/restart/60000
2392 -
timeout.exe timeout /T 3
2440 -
conhost.exe C:\Windows\Fonts\conhost.exe start NetTcpConnection
2492 -
attrib.exe attrib +a +s +r +h C:\Windows\Fonts\config.json
2724 -
attrib.exe attrib +a +s +r +h C:\Windows\Fonts\conhost.exe
2780 -
attrib.exe attrib +a +s +r +h C:\Windows\Fonts\svchost.exe
2840 -
attrib.exe attrib +a +s +r +h C:\Windows\Fonts\WinRing0x64.sys
2888
-
-
xsfxdel~.exe "C:\Users\test22\AppData\Local\Temp\xsfxdel~.exe" "C:\Users\test22\AppData\Local\Temp\Zc3.exe"
2940
-
Name | Response | Post-Analysis Lookup |
---|---|---|
gulf.moneroocean.stream |
CNAME
monerooceans.stream
|
5.104.84.79 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49171 -> 5.104.84.79:10128 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
TCP 192.168.56.103:49171 -> 5.104.84.79:10128 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
Suricata TLS
No Suricata TLS
section | CODE |
section | DATA |
section | BSS |
file | C:\Windows\Fonts\clean.cmd |
file | C:\Users\test22\AppData\Local\Temp\xsfxdel~.exe |
file | C:\Windows\Fonts\svchost.exe |
file | C:\Windows\Fonts\conhost.exe |
cmdline | C:\Windows\Fonts\conhost.exe install NetTcpConnection svchost |
cmdline | attrib +a +s +r +h C:\Windows\Fonts\svchost.exe |
file | C:\Windows\Fonts\clean.cmd |
file | C:\Users\test22\AppData\Local\Temp\xsfxdel~.exe |
file | C:\Windows\Fonts\conhost.exe |
file | C:\Users\test22\AppData\Local\Temp\xsfxdel~.exe |
file | C:\Users\test22\AppData\Local\Temp\Zc3.exe |
cmdline | attrib +a +s +r +h C:\Windows\Fonts\conhost.exe |
cmdline | sc failure NetTcpConnection reset= 86400 actions= restart/60000/restart/60000/restart/60000 |
cmdline | attrib +a +s +r +h C:\Windows\Fonts\config.json |
cmdline | sc config NetTcpConnection start= auto |
cmdline | attrib +a +s +r +h C:\Windows\Fonts\svchost.exe |
cmdline | attrib +a +s +r +h C:\Windows\Fonts\WinRing0x64.sys |
cmdline | sc description "NetTcpConnection" "Microsoft .NetTcpConnection" |
cmdline | sc config "NetTcpConnection" DisplayName= "NetTcpConnection" |
service_name | NetTcpConnection | service_path | C:\Windows\Fonts\conhost.exe |
Skyhigh | BehavesLike.Win32.HLLPPhilis.vc |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_60% (D) |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win64/CoinMiner.RO potentially unwanted |
APEX | Malicious |
Avast | Win32:MalwareX-gen [Drp] |
Kaspersky | HEUR:Trojan.Win64.Reincarnation.gen |
Alibaba | Trojan:Win32/Miners.32339c82 |
Rising | HackTool.XMRMiner!1.C2EC (CLASSIC) |
DrWeb | Tool.InstSrv.10 |
Zillya | Trojan.SchoolGirl.Win32.86 |
McAfeeD | Real Protect-LS!427B11F7F59E |
Trapmine | malicious.moderate.ml.score |
Sophos | Generic ML PUA (PUA) |
SentinelOne | Static AI - Suspicious PE |
Antiy-AVL | Trojan/Win32.ShadowBrokers.gg |
McAfee | GenericRXAA-FA!427B11F7F59E |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Trojan.Qhost |
Malwarebytes | Generic.Trojan.Malicious.DDS |
Ikarus | PUA.CoinMiner |
Tencent | Malware.Win32.Gencirc.10bffc62 |
AVG | Win32:MalwareX-gen [Drp] |