HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
| suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:2638715797&cup2hreq=f9f39ac45ddbe7c092b1696cf87ecd3d6da5b9910c5c23242e8ae572c6a9d4ad |
Performs some HTTP requests
(5 个事件)
| request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
| request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619686092&mv=m&mvi=1&pl=23&shardbypass=yes |
| request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=e1a722ceaa122eb&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619686092&mv=m |
| request |
GET http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=e1a722ceaa122eb&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619686092&mv=m |
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:2638715797&cup2hreq=f9f39ac45ddbe7c092b1696cf87ecd3d6da5b9910c5c23242e8ae572c6a9d4ad |
Sends data using the HTTP POST Method
(1 个事件)
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:2638715797&cup2hreq=f9f39ac45ddbe7c092b1696cf87ecd3d6da5b9910c5c23242e8ae572c6a9d4ad |
Allocates read-write-execute memory (usually to unpack itself)
(3 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619715169.854499
NtAllocateVirtualMemory
|
process_identifier:
1320
region_size:
45056
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x004d0000
|
success
|
0 |
0
|
1619715231.745124
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000003e40000
|
success
|
0 |
0
|
1619715176.479001
NtAllocateVirtualMemory
|
process_identifier:
1804
region_size:
45056
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00820000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619715223.463001
Process32NextW
|
process_name:
GoogleUpdate.exe
snapshot_handle:
0x000003c0
process_identifier:
812
|
success
|
1 |
0
|
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619715169.854499
NtProtectVirtualMemory
|
process_identifier:
1320
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
28672
protection:
32
(PAGE_EXECUTE_READ)
process_handle:
0xffffffff
base_address:
0x004f1000
|
success
|
0 |
0
|
Moves the original executable to a new location
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619715170.713499
MoveFileWithProgressW
|
oldfilepath:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\7fdbf8e113c8bef6c80cabeb3b732750.exe
newfilepath:
C:\Windows\SysWOW64\rasctrs\RPCNDFP.exe
newfilepath_r:
C:\Windows\SysWOW64\rasctrs\RPCNDFP.exe
flags:
3
oldfilepath_r:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\7fdbf8e113c8bef6c80cabeb3b732750.exe
|
success
|
1 |
0
|
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619715189.838001
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
The binary likely contains encrypted or compressed data indicative of a packer
(2 个事件)
| entropy |
7.443297969664358 |
section |
{'size_of_data': '0x0000d000', 'virtual_address': '0x00005000', 'entropy': 7.443297969664358, 'name': '.rsrc', 'virtual_size': '0x0000ca48'} |
description |
A section with a high entropy has been found |
| entropy |
0.7647058823529411 |
description |
Overall entropy of this PE file is high |
Expresses interest in specific running processes
(1 个事件)
Reads the systems User Agent and subsequently performs requests
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619715188.791001
InternetOpenW
|
proxy_bypass:
access_type:
0
proxy_name:
flags:
0
user_agent:
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
|
success
|
13369348 |
0
|