One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:283984113&cup2hreq=6c05253294b199130b1f14f09d122b20981210d27f4e06660e23caa3bc612b7b |
Performs some HTTP requests
(11 个事件)
request |
GET http://c6m7w2m9.ssl.hwcdn.net/playtech_compressed_assets/poker_dafa/index.7ze |
request |
GET http://fallback.playtech-installer.com/playtech_compressed_assets/poker_dafa/index.7ze |
request |
GET http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
request |
GET http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D |
request |
GET http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D |
request |
GET http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEHSfdSPcp6pyLdnEz5lZ6ec%3D |
request |
GET http://fallback.playtech-installer.com/playtech_compressed_assets/poker_dafa/templates/installer/new.7ze |
request |
GET https://t8u4n6u7.ssl.hwcdn.net/stats.gif?data=TCzr%2Fju6EJxvFCU6Cs8AIDiY4zuF%2BBFov3Ul8Pm%2BV9ZzZharSDZmMyP50lFDVNAKalz7FhhTYCYQh2%2BF45TCr%2B4zE9NvV3k%2FAe%2F5DxlqvHHpkuBhC1MLEPxw7ExJFOJTBfkTR0gj8r%2BW25zmwDgH0Tz10FsYh1pw0LifmXvnghGkkHi8KmDEK%2FWPTCBWVMzS522XmxxLdx3PzxAZV%2BQxCRRvKA6vJVz6brAqdavTmD8g1Tb02vfHBF3oWhP7bHiLS1UDR0s811l6ncZ70bC0MbvScz%2FPGkoITcfuCc3q%2BhiEyxtQPRuTbRo99crr3v5dswXWaBSNtu%2BNKKIsAhJJDjtfZZrXqsEFf50t1MyXAB95XW%2Fw7n1iLv2w0dYykJtHBQC72F3VNM0Tdb0DjekWpzDGeLravCIpLjssj3UCuZ%2BsRkiP3WereVgeIH19crZrBfMHn9qhNL6zb4YmTlantiwa0%2FmeE22dq9Ks4CMj7oT4nLcCravdc5nYewUQ5GyBU%2FoHnpt%2FokfNcoSuMTBAUerlXDoV%2FcnC1%2BI2K%2BgB8iFWB8OEPREVBV6mzfmES4oDeyZzGz8OvZd2VQZORThS12L5OghNZiPf%2FhqUzX8P3f49tdOTy8oBRUiAXHtoXPvR0HCRo0jv%2Bsiwn6qfKCKCjSo%2B5TX%2B7xSWD%2FFagw%2B%2FKMA%3D |
request |
GET https://t8u4n6u7.ssl.hwcdn.net/stats.gif?data=UIKD4z75xVYDvHEnZGpFtFVsazLDoHRp5r2PIq5cgeEeagIQEmUMXDzIy%2B9NY4VHBj6E4EZ0t16Hi6wQU9KmRg%2FL6BtZxZwk5a%2BaUthrzdsxtEl4RR9TynFrVX%2Bwu8djU7ccx%2B%2BkF1Cn%2Fe8goafaX%2FU49lfhf947MZhgNtv5eOP95512p2kBZCwflaax0rwd8aNdWhNGX3E3m%2FeqPI1Cfcfx9GVeXI%2FyY%2FszGU4tN6J4kTZoM%2Bfgd5cri7nuiJC8swFbVIL1HNNSm%2B4EtOJGcMZOnplypM7556ZR7qzZoKEQPhlo0%2Bzh0mQqWkwwg8Gee3eeQztmOdX%2BWWZZDVA6zwuaxTD81wUq%2B2jgQ7TB3A%2BiKGimLyy2GCUqRfUY2Omwu1HiPxyHcHSIS9nVCWhZfHrLBd4o1pxZ%2FGePS%2F5nCUVr%2FJ4fZUruFA3gxw%2FGdk320UZu5DR7cnNeywP6SM2wzu21dot0%2ByzOhkWz9BtbxHhE6PqC%2FClIzCY%2BEgD6egm51sRT7SxT6JJy%2BrjEJhhGdtdF0dovjBYGZaLKSLmnWW4SnxmxUrz7wQYyPuzCFcT1PM7GfM6rV9x19oI%2Fxr%2FrJK3mhHivk312z0WCmAGmjtuMwg9RW1bVgUyCzlQ2m7q5kEWuDEtaec7Gna8gRDrdo9S%2BQsT9syD9PA7NXVySfcc%3D |
request |
GET https://c6m7w2m9.ssl.hwcdn.net/playtech_compressed_assets/poker_dafa/templates/installer/new.7ze |
request |
POST https://update.googleapis.com/service/update2?cup2key=10:283984113&cup2hreq=6c05253294b199130b1f14f09d122b20981210d27f4e06660e23caa3bc612b7b |
Sends data using the HTTP POST Method
(1 个事件)
request |
POST https://update.googleapis.com/service/update2?cup2key=10:283984113&cup2hreq=6c05253294b199130b1f14f09d122b20981210d27f4e06660e23caa3bc612b7b |
Allocates read-write-execute memory (usually to unpack itself)
(2 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620982003.646498
NtAllocateVirtualMemory
|
process_identifier:
648
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x02ae0000
|
success
|
0 |
0
|
1620981641.931896
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004820000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Steals private information from local Internet browsers
(2 个事件)
registry |
HKEY_LOCAL_MACHINE\Software\Mozilla\Mozilla Firefox |
registry |
HKEY_CURRENT_USER\Software\Mozilla\Mozilla Firefox |
Creates executable files on the filesystem
(1 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsy5EC6.tmp\internal8c0ba7599a23683d3c4d3b69b169e71a.exe |
Creates a shortcut to an executable file
(1 个事件)
file |
C:\Users\Public\Desktop\Google Chrome.lnk |
Drops an executable to the user AppData folder
(1 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsy5EC6.tmp\internal8c0ba7599a23683d3c4d3b69b169e71a.exe |
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping
(4 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620982070.006498
Process32NextW
|
process_name:
mscorsvw.exe
snapshot_handle:
0x00000774
process_identifier:
2168
|
success
|
1 |
0
|
1620982070.006498
Process32NextW
|
process_name:
GoogleUpdate.exe
snapshot_handle:
0x00000774
process_identifier:
2184
|
success
|
1 |
0
|
1620982070.006498
Process32NextW
|
process_name:
sppsvc.exe
snapshot_handle:
0x00000774
process_identifier:
684
|
success
|
1 |
0
|
1620982070.006498
Process32NextW
|
process_name:
inject-x64.exe
snapshot_handle:
0x00000774
process_identifier:
812
|
success
|
1 |
0
|
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620982005.678498
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
Queries for potentially installed applications
(6 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620982002.568498
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000001
key_handle:
0x00000000
regkey:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
failed
|
2 |
0
|
1620982002.568498
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000002
key_handle:
0x000000dc
regkey:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
success
|
0 |
0
|
1620982070.568498
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000001
key_handle:
0x00000000
regkey:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
failed
|
2 |
0
|
1620982070.568498
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000002
key_handle:
0x00000774
regkey:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
success
|
0 |
0
|
1620982070.584498
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000001
key_handle:
0x00000000
regkey:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
failed
|
2 |
0
|
1620982070.584498
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000002
key_handle:
0x00000774
regkey:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
success
|
0 |
0
|
Reads the systems User Agent and subsequently performs requests
(1 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620982070.740498
InternetOpenW
|
proxy_bypass:
access_type:
0
proxy_name:
flags:
0
user_agent:
Playtech WinClient Downloader/1.0
|
success
|
13369348 |
0
|