One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
| suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:1447161241&cup2hreq=4aa6d1fe3c1b12ca94668c2e7161c878db5f7be1d13536e1c4555e9ba6292760 |
Connects to a Dynamic DNS Domain
(1 个事件)
| domain |
rem-pounds.ddns.net |
Performs some HTTP requests
(5 个事件)
| request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
| request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619484744&mv=m&mvi=1&pl=23&shardbypass=yes |
| request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=9857fb184c0e48b3&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619484744&mv=m |
| request |
GET http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=9857fb184c0e48b3&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619484744&mv=m |
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:1447161241&cup2hreq=4aa6d1fe3c1b12ca94668c2e7161c878db5f7be1d13536e1c4555e9ba6292760 |
Sends data using the HTTP POST Method
(1 个事件)
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:1447161241&cup2hreq=4aa6d1fe3c1b12ca94668c2e7161c878db5f7be1d13536e1c4555e9ba6292760 |
Allocates read-write-execute memory (usually to unpack itself)
(3 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619513315.02985
NtAllocateVirtualMemory
|
process_identifier:
912
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00e90000
|
success
|
0 |
0
|
1619513315.12385
NtAllocateVirtualMemory
|
process_identifier:
912
region_size:
131072
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x02a00000
|
success
|
0 |
0
|
1619513968.946
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004150000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
A process attempted to delay the analysis task.
(1 个事件)
| description |
615e5dd905741e5d1b836a26ac3d255c.exe tried to sleep 247 seconds, actually delayed analysis time by 247 seconds |
Creates executable files on the filesystem
(2 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMPDMC.lnk |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\klist\drvinst.exe.bat |
Creates a shortcut to an executable file
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMPDMC.lnk |
Drops an executable to the user AppData folder
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\klist\drvinst.exe.bat |
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping
(7 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619513301.68585
Process32NextW
|
process_name:
pythonw.exe
snapshot_handle:
0x0000012c
process_identifier:
2236
|
success
|
1 |
0
|
1619513301.68585
Process32NextW
|
process_name:
dllhost.exe
snapshot_handle:
0x0000012c
process_identifier:
1108
|
success
|
1 |
0
|
1619513301.68585
Process32NextW
|
process_name:
sdclt.exe
snapshot_handle:
0x0000012c
process_identifier:
2868
|
success
|
1 |
0
|
1619513301.68585
Process32NextW
|
process_name:
taskhost.exe
snapshot_handle:
0x0000012c
process_identifier:
364
|
success
|
1 |
0
|
1619513301.68585
Process32NextW
|
process_name:
mobsync.exe
snapshot_handle:
0x0000012c
process_identifier:
2244
|
success
|
1 |
0
|
1619513301.68585
Process32NextW
|
process_name:
615e5dd905741e5d1b836a26ac3d255c.exe
snapshot_handle:
0x0000012c
process_identifier:
912
|
success
|
1 |
0
|
1619513325.52985
Process32NextW
|
process_name:
GoogleUpdate.exe
snapshot_handle:
0x00000284
process_identifier:
648
|
success
|
1 |
0
|
Expresses interest in specific running processes
(1 个事件)
| process |
615e5dd905741e5d1b836a26ac3d255c.exe |