HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
| suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:4283709731&cup2hreq=8f893d04b495c829c9f8254720e909a6ebb4fab5cafac48f226f6fb897bb8e7c |
Performs some HTTP requests
(4 个事件)
| request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
| request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619382681&mv=u&mvi=1&pl=23&shardbypass=yes |
| request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=24dda8192328b30d&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619382496&mv=m |
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:4283709731&cup2hreq=8f893d04b495c829c9f8254720e909a6ebb4fab5cafac48f226f6fb897bb8e7c |
Sends data using the HTTP POST Method
(1 个事件)
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:4283709731&cup2hreq=8f893d04b495c829c9f8254720e909a6ebb4fab5cafac48f226f6fb897bb8e7c |
Allocates read-write-execute memory (usually to unpack itself)
(3 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619411692.2705
NtAllocateVirtualMemory
|
process_identifier:
2116
region_size:
36864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x004e0000
|
success
|
0 |
0
|
1619411753.614375
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004090000
|
success
|
0 |
0
|
1619411699.161625
NtAllocateVirtualMemory
|
process_identifier:
2040
region_size:
36864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x021c0000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619411764.958625
Process32NextW
|
process_name:
inject-x64.exe
snapshot_handle:
0x0000039c
process_identifier:
3232
|
success
|
1 |
0
|
Moves the original executable to a new location
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619411692.7865
MoveFileWithProgressW
|
oldfilepath:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\3e586bef51b9bc31a775c16fdd2fd2df.exe
newfilepath:
C:\Windows\SysWOW64\msls31\msorc32r.exe
newfilepath_r:
C:\Windows\SysWOW64\msls31\msorc32r.exe
flags:
3
oldfilepath_r:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\3e586bef51b9bc31a775c16fdd2fd2df.exe
|
success
|
1 |
0
|
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619411713.645625
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
Expresses interest in specific running processes
(1 个事件)
Reads the systems User Agent and subsequently performs requests
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619411712.395625
InternetOpenW
|
proxy_bypass:
access_type:
0
proxy_name:
flags:
0
user_agent:
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
|
success
|
13369348 |
0
|