HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
| suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:3816848581&cup2hreq=44b8588026ff305cd11e395cd28f5bd4f3aa637ca2981510d3b80f712d70f669 |
Performs some HTTP requests
(4 个事件)
| request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
| request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619888901&mv=m&mvi=1&pl=23&shardbypass=yes |
| request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=54d898a4b2601e59&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619888901&mv=m |
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:3816848581&cup2hreq=44b8588026ff305cd11e395cd28f5bd4f3aa637ca2981510d3b80f712d70f669 |
Sends data using the HTTP POST Method
(1 个事件)
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:3816848581&cup2hreq=44b8588026ff305cd11e395cd28f5bd4f3aa637ca2981510d3b80f712d70f669 |
Allocates read-write-execute memory (usually to unpack itself)
(2 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619917739.448646
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004160000
|
success
|
0 |
0
|
1619918130.444999
NtAllocateVirtualMemory
|
process_identifier:
376
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x02d10000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Foreign language identified in PE resource
(1 个事件)
| name |
WM_DSP |
language |
LANG_ENGLISH |
offset |
0x0014c070 |
filetype |
PE32 executable (GUI) Intel 80386, for MS Windows |
sublanguage |
SUBLANG_ARABIC_QATAR |
size |
0x00002c00 |
Creates a suspicious process
(1 个事件)
| cmdline |
C:\Windows\System32\cmd.exe |
A process created a hidden window
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619918135.600999
CreateProcessInternalW
|
thread_identifier:
2604
thread_handle:
0x000001c8
process_identifier:
2964
current_directory:
filepath:
C:\Windows\System32\cmd.exe
track:
1
command_line:
filepath_r:
C:\Windows\System32\cmd.exe
stack_pivoted:
0
creation_flags:
134217728
(CREATE_NO_WINDOW)
process_handle:
0x000001c0
inherit_handles:
0
|
success
|
1 |
0
|