One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
HTTP traffic contains suspicious features which may be indicative of malware related traffic
(2 个事件)
suspicious_features |
HTTP version 1.0 used |
suspicious_request |
GET http://post.securestudies.com/packages/RI1034/ContentI3.exe |
suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:2351768206&cup2hreq=078e97feea0ab05daf3fc1d5856cd2040e80891b486686cbb55c7f71b2bb06ee |
Performs some HTTP requests
(5 个事件)
request |
GET http://post.securestudies.com/packages/RI1034/ContentI3.exe |
request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620978974&mv=m&mvi=1&pl=23&shardbypass=yes |
request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=9b3cf0520fb2dba5&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620978974&mv=m&mvi=3 |
request |
POST https://update.googleapis.com/service/update2?cup2key=10:2351768206&cup2hreq=078e97feea0ab05daf3fc1d5856cd2040e80891b486686cbb55c7f71b2bb06ee |
Sends data using the HTTP POST Method
(1 个事件)
request |
POST https://update.googleapis.com/service/update2?cup2key=10:2351768206&cup2hreq=078e97feea0ab05daf3fc1d5856cd2040e80891b486686cbb55c7f71b2bb06ee |
Allocates read-write-execute memory (usually to unpack itself)
(5 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620985520.796625
NtProtectVirtualMemory
|
process_identifier:
2424
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1620985520.796625
NtProtectVirtualMemory
|
process_identifier:
2424
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
69632
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00401000
|
success
|
0 |
0
|
1620985520.796625
NtProtectVirtualMemory
|
process_identifier:
2424
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
49152
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041b000
|
success
|
0 |
0
|
1621007947.618125
NtAllocateVirtualMemory
|
process_identifier:
1544
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x01fe0000
|
success
|
0 |
0
|
1621008009.650125
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000003e60000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
(2 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1621008045.618125
GetDiskFreeSpaceExW
|
root_path:
C:\Program Files (x86)\Cut The Apple\
free_bytes_available:
5692838488353227304
total_number_of_free_bytes:
0
total_number_of_bytes:
7019368171899656
|
failed
|
0 |
0
|
1621008045.618125
GetDiskFreeSpaceExW
|
root_path:
C:\Program Files (x86)\
free_bytes_available:
19385454592
total_number_of_free_bytes:
0
total_number_of_bytes:
34252779520
|
success
|
1 |
0
|
Creates executable files on the filesystem
(1 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-BIVSO.tmp\itdownload.dll |
Creates a shortcut to an executable file
(1 个事件)
file |
C:\Users\Public\Desktop\Google Chrome.lnk |
File has been identified by 5 AntiVirus engines on VirusTotal as malicious
(5 个事件)
Avast |
Win32:VSok-A [PUP] |
DrWeb |
Adware.Downware.932 |
McAfee-GW-Edition |
BehavesLike.Win32.Dropper.vc |
Antiy-AVL |
GrayWare[AdWare:not-a-virus]/Win32.InnoAdware.RKAW |
AVG |
Win32:VSok-A [PUP] |
An executable file was downloaded by the process b5ea107531eb1aee4d0a7d23748c4727.tmp
(2 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1621007957.931125
recv
|
buffer:
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Last-Modified: Mon, 27 Jul 2020 21:58:47 GMT
Accept-Ranges: bytes
ETag: "8054f1a6164d61:0"
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Date: Fri, 14 May 2021 08:00:44 GMT
Connection: close
Content-Length: 3119472
MZ ÿÿ ¸ @ º ´ Í!¸LÍ!This program cannot be run in DOS mode.
$ ä: óÿi óÿi óÿi3½gi¦óÿi»naióÿi»nTiõóÿi©|i¥óÿi»nUiîðÿi óÿi¶óÿiÏ
Ti¥óÿi©li¿óÿi óþiÛòÿi»nPióÿi»nei¡óÿi»nbi¡óÿiRich óÿi PE L N_ à
(' |