HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
| suspicious_features |
GET method with no useragent header, Connection to IP address |
suspicious_request |
GET http://1.1.1.1/file1.exe |
Performs some HTTP requests
(1 个事件)
| request |
GET http://1.1.1.1/file1.exe |
Allocates read-write-execute memory (usually to unpack itself)
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619149116.951876
NtAllocateVirtualMemory
|
process_identifier:
3188
region_size:
20480
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00450000
|
success
|
0 |
0
|
Steals private information from local Internet browsers
(10 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\Cookies |
| file |
C:\Users\All Users\AppData\Local\Google\Chrome\User Data\Default\Cookies |
| file |
C:\Users\Public\AppData\Local\Google\Chrome\User Data\Default\Cookies |
| file |
C:\Users\Oskar\AppData\Local\Google\Chrome\User Data\Default\Cookies |
| file |
C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Cookies |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Local State |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\Cookies-wal |
| file |
C:\Users\Default User\AppData\Local\Google\Chrome\User Data\Default\Cookies |
| file |
C:\Users\Default\AppData\Local\Google\Chrome\User Data\Default\Cookies |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\Cookies-journal |
Creates executable files on the filesystem
(10 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\wyfdggaa.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\id6.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\BTRSetp.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\Setup.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\DreamTrips.bat |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\Data.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\Data Files.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\driverbridge.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\lunch.bat |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\Files.exe |
Creates a suspicious process
(1 个事件)
| cmdline |
cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\ADMINI~1.OSK\AppData\Local\Temp\RarSFX3\driverbridge.exe" |
Drops a binary and executes it
(3 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\Data.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\driverbridge.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\BTRSetp.exe |
Drops an executable to the user AppData folder
(8 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\driverbridge.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\wyfdggaa.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\Data.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\Setup.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\id6.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\Files.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX3\BTRSetp.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\RarSFX2\Data Files.exe |
A process created a hidden window
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619149110.951626
CreateProcessInternalW
|
thread_identifier:
880
thread_handle:
0x000000f4
process_identifier:
2420
current_directory:
filepath:
track:
1
command_line:
cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\ADMINI~1.OSK\AppData\Local\Temp\RarSFX3\driverbridge.exe"
filepath_r:
stack_pivoted:
0
creation_flags:
134217728
(CREATE_NO_WINDOW)
process_handle:
0x0000010c
inherit_handles:
0
|
success
|
1 |
0
|
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619149117.935876
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
The binary likely contains encrypted or compressed data indicative of a packer
(1 个事件)
| entropy |
7.384313436211137 |
section |
{'size_of_data': '0x00009200', 'virtual_address': '0x00067000', 'entropy': 7.384313436211137, 'name': '.rsrc', 'virtual_size': '0x000090f0'} |
description |
A section with a high entropy has been found |
Uses Windows utilities for basic Windows functionality
(2 个事件)
| cmdline |
cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\ADMINI~1.OSK\AppData\Local\Temp\RarSFX3\driverbridge.exe" |
| cmdline |
ping 1.1.1.1 -n 1 -w 3000 |