One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
HTTP traffic contains suspicious features which may be indicative of malware related traffic
(2 个事件)
suspicious_features |
HTTP version 1.0 used |
suspicious_request |
GET http://post.securestudies.com/packages/RI1034/ContentI3.exe |
suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:3926651059&cup2hreq=93cc7984910928127d345d4c5c614badd80c135e3cc517ddac26b5246d5afd91 |
Performs some HTTP requests
(5 个事件)
request |
GET http://post.securestudies.com/packages/RI1034/ContentI3.exe |
request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620961938&mv=m&mvi=1&pl=23&shardbypass=yes |
request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=86d7823a13b0c855&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620961938&mv=m&mvi=3 |
request |
POST https://update.googleapis.com/service/update2?cup2key=10:3926651059&cup2hreq=93cc7984910928127d345d4c5c614badd80c135e3cc517ddac26b5246d5afd91 |
Sends data using the HTTP POST Method
(1 个事件)
request |
POST https://update.googleapis.com/service/update2?cup2key=10:3926651059&cup2hreq=93cc7984910928127d345d4c5c614badd80c135e3cc517ddac26b5246d5afd91 |
Allocates read-write-execute memory (usually to unpack itself)
(5 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620990936.87025
NtProtectVirtualMemory
|
process_identifier:
2260
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1620990936.88625
NtProtectVirtualMemory
|
process_identifier:
2260
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
69632
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00401000
|
success
|
0 |
0
|
1620990936.88625
NtProtectVirtualMemory
|
process_identifier:
2260
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
49152
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041b000
|
success
|
0 |
0
|
1620990937.52675
NtAllocateVirtualMemory
|
process_identifier:
2056
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x01fe0000
|
success
|
0 |
0
|
1620991009.714125
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004010000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Creates executable files on the filesystem
(1 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-DVPEC.tmp\itdownload.dll |
Drops an executable to the user AppData folder
(2 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-6EM8S.tmp\aa469d5317c6bfc72b87c4fdd5dd97ce.tmp |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-DVPEC.tmp\itdownload.dll |
File has been identified by 7 AntiVirus engines on VirusTotal as malicious
(7 个事件)
McAfee |
Artemis!AA469D5317C6 |
Avast |
Win32:VSok-A [PUP] |
DrWeb |
Adware.Downware.932 |
McAfee-GW-Edition |
BehavesLike.Win32.AdwareFileTour.vc |
Antiy-AVL |
GrayWare[AdWare:not-a-virus]/Win32.InnoAdware.RKAW |
Microsoft |
Trojan:Win32/Bitrep.A |
AVG |
Win32:VSok-A [PUP] |
An executable file was downloaded by the process aa469d5317c6bfc72b87c4fdd5dd97ce.tmp
(1 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620990943.60475
recv
|
buffer:
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Last-Modified: Mon, 27 Jul 2020 21:58:47 GMT
Accept-Ranges: bytes
ETag: "8054f1a6164d61:0"
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Date: Fri, 14 May 2021 03:17:10 GMT
Connection: close
Content-Length: 3119472
MZ ÿÿ ¸ @ º ´ Í!¸LÍ!This program cannot be run in DOS mode.
$ ä: óÿi óÿi óÿi3½gi¦óÿi»naióÿi»nTiõóÿi©|i¥óÿi»nUiîðÿi óÿi¶óÿiÏ
Ti¥óÿi©li¿óÿi óþiÛòÿi»nPióÿi»nei¡óÿi»nbi¡óÿiRich óÿi PE L N_ à
(' |