C:\Users\user\Desktop\BUgAyPXboK.exe
|
"C:\Users\user\Desktop\BUgAyPXboK.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
false
|
PID: |
868
|
Target ID: |
0
|
Parent PID: |
5332
|
Name: |
BUgAyPXboK.exe
|
Path: |
C:\Users\user\Desktop\BUgAyPXboK.exe
|
Commandline: |
"C:\Users\user\Desktop\BUgAyPXboK.exe"
|
Size: |
75264
|
MD5: |
DDE91B6947D2B726E5BB8F5852CECB76
|
Time: |
23:43:19
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
low
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x400000
|
Modulesize: |
90112
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Antivirus / Scanner detection for submitted sample |
AV Detection |
|
Multi AV Scanner detection for submitted file |
AV Detection |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Found Tor onion address |
Networking |
|
Machine Learning detection for sample |
AV Detection |
|
Uses 32bit PE files |
Compliance, System Summary |
|
PE file has an executable .text section and no other executable section |
System Summary |
|
Sample is known by Antivirus |
System Summary |
|
Spawns processes |
System Summary |
|
Contains modern PE file flags such as dynamic base (ASLR) or NX |
Compliance, System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5424
|
Target ID: |
2
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:28
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1576
|
Target ID: |
4
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:29
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5356
|
Target ID: |
7
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:31
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5360
|
Target ID: |
9
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:32
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
true
|
PID: |
5500
|
Target ID: |
12
|
Parent PID: |
3452
|
Name: |
ykbxzh.exe
|
Path: |
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
|
Commandline: |
"C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe"
|
Size: |
75264
|
MD5: |
EE7A320AB14366D36D44CDC33B5E8238
|
Time: |
23:43:35
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
false
|
Is elevated: |
false
|
Modulebase: |
0x400000
|
Modulesize: |
90112
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Drops PE files |
Persistence and Installation Behavior |
|
Creates files inside the user directory |
System Summary |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4876
|
Target ID: |
14
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:35
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5796
|
Target ID: |
19
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:39
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5224
|
Target ID: |
23
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:41
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
true
|
PID: |
4784
|
Target ID: |
25
|
Parent PID: |
3452
|
Name: |
ykbxzh.exe
|
Path: |
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
|
Commandline: |
"C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe"
|
Size: |
75264
|
MD5: |
EE7A320AB14366D36D44CDC33B5E8238
|
Time: |
23:43:43
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
false
|
Is elevated: |
false
|
Modulebase: |
0x400000
|
Modulesize: |
90112
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Drops PE files |
Persistence and Installation Behavior |
|
Creates files inside the user directory |
System Summary |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5572
|
Target ID: |
26
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:44
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
2912
|
Target ID: |
29
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:46
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4228
|
Target ID: |
31
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:48
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
2464
|
Target ID: |
34
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:50
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
3824
|
Target ID: |
36
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:51
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
2208
|
Target ID: |
39
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:56
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
2852
|
Target ID: |
41
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:43:58
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4628
|
Target ID: |
43
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:01
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4908
|
Target ID: |
45
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:02
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
3096
|
Target ID: |
47
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:04
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
644
|
Target ID: |
49
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:07
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5964
|
Target ID: |
51
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:09
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4064
|
Target ID: |
53
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:10
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
2360
|
Target ID: |
55
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:14
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5728
|
Target ID: |
57
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:15
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5940
|
Target ID: |
59
|
Parent PID: |
868
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup emsisoft.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:44:17
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xd60000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5500
|
Target ID: |
3
|
Parent PID: |
5424
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:43:28
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6da640000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5276
|
Target ID: |
6
|
Parent PID: |
1576
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:43:30
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6da640000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5336
|
Target ID: |
8
|
Parent PID: |
5356
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:43:31
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6da640000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5340
|
Target ID: |
10
|
Parent PID: |
5360
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:43:32
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6da640000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
812
|
Target ID: |
15
|
Parent PID: |
4876
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:43:37
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6da640000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6128
|
Target ID: |
21
|
Parent PID: |
5796
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:43:40
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6da640000
|
Modulesize: |
651264
|
Wow64: |
false
|
|