HTTP traffic contains suspicious features which may be indicative of malware related traffic
(1 个事件)
| suspicious_features |
POST method with no referer header |
suspicious_request |
POST https://update.googleapis.com/service/update2?cup2key=10:3069734113&cup2hreq=da38985711276672bae56d4279c88f7a4f43ea747633115ab0c15f4ca8a500c7 |
Performs some HTTP requests
(4 个事件)
| request |
HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
| request |
HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619889141&mv=m&mvi=1&pl=23&shardbypass=yes |
| request |
HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=5a225f6048b045bb&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619889141&mv=m |
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:3069734113&cup2hreq=da38985711276672bae56d4279c88f7a4f43ea747633115ab0c15f4ca8a500c7 |
Sends data using the HTTP POST Method
(1 个事件)
| request |
POST https://update.googleapis.com/service/update2?cup2key=10:3069734113&cup2hreq=da38985711276672bae56d4279c88f7a4f43ea747633115ab0c15f4ca8a500c7 |
Allocates read-write-execute memory (usually to unpack itself)
(3 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619918237.282625
NtAllocateVirtualMemory
|
process_identifier:
2128
region_size:
36864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x004f0000
|
success
|
0 |
0
|
1619917868.942271
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004090000
|
success
|
0 |
0
|
1619918240.470625
NtAllocateVirtualMemory
|
process_identifier:
1888
region_size:
36864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x01e00000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping
(2 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619918240.501625
Process32NextW
|
process_name:
psr.exe
snapshot_handle:
0x0000013c
process_identifier:
1888
|
success
|
1 |
0
|
1619918306.251625
Process32NextW
|
process_name:
sppsvc.exe
snapshot_handle:
0x00000398
process_identifier:
2848
|
success
|
1 |
0
|
Moves the original executable to a new location
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619918238.001625
MoveFileWithProgressW
|
oldfilepath:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\cd0c8b894386abb591b4f1eb5166d848.exe
newfilepath:
C:\Windows\SysWOW64\winsockhc\psr.exe
newfilepath_r:
C:\Windows\SysWOW64\winsockhc\psr.exe
flags:
3
oldfilepath_r:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\cd0c8b894386abb591b4f1eb5166d848.exe
|
success
|
1 |
0
|
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619918256.532625
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
The binary likely contains encrypted or compressed data indicative of a packer
(3 个事件)
| entropy |
7.263229979770701 |
section |
{'size_of_data': '0x00001000', 'virtual_address': '0x00004000', 'entropy': 7.263229979770701, 'name': '.data', 'virtual_size': '0x0000024c'} |
description |
A section with a high entropy has been found |
| entropy |
7.432347819533883 |
section |
{'size_of_data': '0x0000a000', 'virtual_address': '0x00005000', 'entropy': 7.432347819533883, 'name': '.rsrc', 'virtual_size': '0x00009268'} |
description |
A section with a high entropy has been found |
| entropy |
0.7857142857142857 |
description |
Overall entropy of this PE file is high |
Expresses interest in specific running processes
(1 个事件)
Reads the systems User Agent and subsequently performs requests
(1 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619918255.907625
InternetOpenW
|
proxy_bypass:
access_type:
0
proxy_name:
flags:
0
user_agent:
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
|
success
|
13369348 |
0
|