HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
| suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:227239989&cup2hreq=3ff77fa67cfcac6fae50b5c11f3d156d5737a05720be3d07af17e36f179f8149 |
Performs some HTTP requests
(4 个事件)
| request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
| request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619370495&mv=m&mvi=1&pl=23&shardbypass=yes |
| request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=4369ff64dcc6010a&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619370495&mv=m |
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:227239989&cup2hreq=3ff77fa67cfcac6fae50b5c11f3d156d5737a05720be3d07af17e36f179f8149 |
Sends data using the HTTP POST Method
(1 个事件)
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:227239989&cup2hreq=3ff77fa67cfcac6fae50b5c11f3d156d5737a05720be3d07af17e36f179f8149 |
Allocates read-write-execute memory (usually to unpack itself)
(3 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619399675.6165
NtAllocateVirtualMemory
|
process_identifier:
2236
region_size:
36864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00510000
|
success
|
0 |
0
|
1619399727.163125
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004020000
|
success
|
0 |
0
|
1619399682.116
NtAllocateVirtualMemory
|
process_identifier:
2260
region_size:
36864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00580000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Moves the original executable to a new location
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619399676.5065
MoveFileWithProgressW
|
oldfilepath:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\3fc7309cfcf7640cd8d38c24af7e749b.exe
newfilepath:
C:\Windows\SysWOW64\filemgmt\comcat.exe
newfilepath_r:
C:\Windows\SysWOW64\filemgmt\comcat.exe
flags:
3
oldfilepath_r:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\3fc7309cfcf7640cd8d38c24af7e749b.exe
|
success
|
1 |
0
|
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619399695.022
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
The binary likely contains encrypted or compressed data indicative of a packer
(2 个事件)
| entropy |
7.427959110276362 |
section |
{'size_of_data': '0x00033000', 'virtual_address': '0x0003d000', 'entropy': 7.427959110276362, 'name': '.rsrc', 'virtual_size': '0x00032230'} |
description |
A section with a high entropy has been found |
| entropy |
0.4766355140186916 |
description |
Overall entropy of this PE file is high |
Expresses interest in specific running processes
(1 个事件)
Reads the systems User Agent and subsequently performs requests
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619399694.788
InternetOpenW
|
proxy_bypass:
access_type:
0
proxy_name:
flags:
0
user_agent:
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
|
success
|
13369348 |
0
|
Uses Windows utilities for basic Windows functionality
(1 个事件)
| cmdline |
C:\Windows\SysWOW64\filemgmt\comcat.exe |