C:\Users\user\Desktop\O8ZHhytWhn.exe
|
"C:\Users\user\Desktop\O8ZHhytWhn.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
false
|
PID: |
5900
|
Target ID: |
0
|
Parent PID: |
5348
|
Name: |
O8ZHhytWhn.exe
|
Path: |
C:\Users\user\Desktop\O8ZHhytWhn.exe
|
Commandline: |
"C:\Users\user\Desktop\O8ZHhytWhn.exe"
|
Size: |
71168
|
MD5: |
B39FEBF7440B58A6CD15AE9F01916F98
|
Time: |
23:48:39
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
low
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xf1d0000
|
Modulesize: |
90112
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Antivirus / Scanner detection for submitted sample |
AV Detection |
|
Multi AV Scanner detection for submitted file |
AV Detection |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Yara detected ReflectiveLoader |
Data Obfuscation |
|
Found Tor onion address |
Networking |
|
Machine Learning detection for sample |
AV Detection |
|
Uses 32bit PE files |
Compliance, System Summary |
|
PE file has an executable .text section and no other executable section |
System Summary |
|
Sample is known by Antivirus |
System Summary |
|
Spawns processes |
System Summary |
|
Contains modern PE file flags such as dynamic base (ASLR) or NX |
Compliance, System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
3600
|
Target ID: |
3
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:48:48
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5496
|
Target ID: |
5
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:48:50
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
3220
|
Target ID: |
7
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:48:52
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
true
|
PID: |
5444
|
Target ID: |
9
|
Parent PID: |
3320
|
Name: |
wjaoab.exe
|
Path: |
C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe
|
Commandline: |
"C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
|
Size: |
71168
|
MD5: |
A1E6F4D9E1AF5740E07B86A42C6C430B
|
Time: |
23:48:56
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
low
|
Is admin: |
false
|
Is elevated: |
false
|
Modulebase: |
0xfbc0000
|
Modulesize: |
90112
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Yara detected ReflectiveLoader |
Data Obfuscation |
|
Drops PE files |
Persistence and Installation Behavior |
|
Creates files inside the user directory |
System Summary |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4404
|
Target ID: |
10
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:48:58
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5224
|
Target ID: |
16
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:02
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4508
|
Target ID: |
21
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:04
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5732
|
Target ID: |
23
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:06
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
true
|
PID: |
2888
|
Target ID: |
25
|
Parent PID: |
3320
|
Name: |
wjaoab.exe
|
Path: |
C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe
|
Commandline: |
"C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
|
Size: |
71168
|
MD5: |
A1E6F4D9E1AF5740E07B86A42C6C430B
|
Time: |
23:49:07
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
false
|
Is elevated: |
false
|
Modulebase: |
0xfbc0000
|
Modulesize: |
90112
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Yara detected ReflectiveLoader |
Data Obfuscation |
|
Drops PE files |
Persistence and Installation Behavior |
|
Creates files inside the user directory |
System Summary |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4540
|
Target ID: |
26
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:09
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6132
|
Target ID: |
28
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:11
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6ef7a0000
|
Modulesize: |
57344
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5896
|
Target ID: |
31
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:14
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1548
|
Target ID: |
33
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:20
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5864
|
Target ID: |
36
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:23
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
3840
|
Target ID: |
38
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:26
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4412
|
Target ID: |
40
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:29
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4928
|
Target ID: |
42
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:33
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5972
|
Target ID: |
44
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:36
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5164
|
Target ID: |
47
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:42
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5644
|
Target ID: |
50
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:45
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5860
|
Target ID: |
52
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:48
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6052
|
Target ID: |
54
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:50
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
540
|
Target ID: |
56
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:49:53
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6072
|
Target ID: |
58
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:50:00
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4324
|
Target ID: |
60
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:50:02
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x2f0000
|
Modulesize: |
933888
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1252
|
Target ID: |
62
|
Parent PID: |
5900
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:50:04
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x10000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
3116
|
Target ID: |
4
|
Parent PID: |
3600
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:48:48
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6edaf0000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5928
|
Target ID: |
6
|
Parent PID: |
5496
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:48:50
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6edaf0000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5184
|
Target ID: |
8
|
Parent PID: |
3220
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:48:52
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff6edaf0000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
|