Performs some HTTP requests
(4 个事件)
request |
GET http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D |
request |
GET http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOeNRji0LOHG2eICEAgIbaejoEQqkc%2F0cnXxXa0%3D |
request |
GET https://download.mozilla.org/?os=win64&lang=en-US&product=firefox-nightly-latest |
request |
GET https://download-installer.cdn.mozilla.net/pub/firefox/nightly/latest-mozilla-central-l10n/firefox-90.0a1.en-US.win64.installer.exe |
Allocates read-write-execute memory (usually to unpack itself)
(1 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620992339.579126
NtProtectVirtualMemory
|
process_identifier:
2404
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x10004000
|
success
|
0 |
0
|
Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
(2 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620992340.329126
GetDiskFreeSpaceExW
|
root_path:
C:\Program Files\
free_bytes_available:
19612889088
total_number_of_free_bytes:
19612889088
total_number_of_bytes:
34252779520
|
success
|
1 |
0
|
1620992340.407126
GetDiskFreeSpaceExW
|
root_path:
C:\Program Files\
free_bytes_available:
19612889088
total_number_of_free_bytes:
19612889088
total_number_of_bytes:
34252779520
|
success
|
1 |
0
|
Creates executable files on the filesystem
(7 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\7zS8D1BDA26\setup-stub.exe |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\nsDialogs.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\download.exe |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\UAC.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\System.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\InetBgDL.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\UserInfo.dll |
Drops an executable to the user AppData folder
(7 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\InetBgDL.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\System.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\download.exe |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\nsDialogs.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\7zS8D1BDA26\setup-stub.exe |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\UserInfo.dll |
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsq71FF.tmp\UAC.dll |
File has been identified by 2 AntiVirus engines on VirusTotal as malicious
(2 个事件)
Bkav |
W32.AIDetectVM.malware2 |
Jiangmin |
Trojan.Inject.bcbj |
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620992345.704126
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
An executable file was downloaded by the process setup-stub.exe
(1 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620992369.594126
InternetReadFile
|
buffer:
MZ ÿÿ ¸ @ ð º ´ Í!¸LÍ!This program cannot be run in DOS mode.
$ ù
Î`YÎ`YÎ`YMnYÉ`Y&dYÌ`Y
?YÏ`Y
=YÍ`YÎaYb`Y&jYÔ`Y&kY`YvfYÏ`YRichÎ`Y PE L 9m[ à @ O P ` @ ` |´a L[ ´ ` Lû FaÐ& |