C:\Users\user\Desktop\gI5xZdIxUs.exe
|
"C:\Users\user\Desktop\gI5xZdIxUs.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
false
|
PID: |
5280
|
Target ID: |
1
|
Parent PID: |
5364
|
Name: |
gI5xZdIxUs.exe
|
Path: |
C:\Users\user\Desktop\gI5xZdIxUs.exe
|
Commandline: |
"C:\Users\user\Desktop\gI5xZdIxUs.exe"
|
Size: |
101710
|
MD5: |
98A12EC721C098842FBFD7384D5A72AE
|
Time: |
23:57:53
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
low
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0xfc60000
|
Modulesize: |
94208
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Antivirus / Scanner detection for submitted sample |
AV Detection |
|
Multi AV Scanner detection for submitted file |
AV Detection |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Yara detected ReflectiveLoader |
Data Obfuscation |
|
Found Tor onion address |
Networking |
|
Machine Learning detection for sample |
AV Detection |
|
PE file contains sections with non-standard names |
Data Obfuscation |
|
Uses 32bit PE files |
Compliance, System Summary |
|
PE file has an executable .text section and no other executable section |
System Summary |
|
Sample is known by Antivirus |
System Summary |
|
Spawns processes |
System Summary |
|
Contains modern PE file flags such as dynamic base (ASLR) or NX |
Compliance, System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5960
|
Target ID: |
5
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:02
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4684
|
Target ID: |
11
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:05
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
true
|
PID: |
5464
|
Target ID: |
14
|
Parent PID: |
3452
|
Name: |
isqmkp.exe
|
Path: |
C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe
|
Commandline: |
"C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
|
Size: |
101710
|
MD5: |
F4758788F11A0DE8D11EB4B8C515FFBD
|
Time: |
23:58:08
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
low
|
Is admin: |
false
|
Is elevated: |
false
|
Modulebase: |
0xf9d0000
|
Modulesize: |
94208
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Yara detected ReflectiveLoader |
Data Obfuscation |
|
Drops PE files |
Persistence and Installation Behavior |
|
Creates files inside the user directory |
System Summary |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4596
|
Target ID: |
15
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:08
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6112
|
Target ID: |
17
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:16
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
moderate
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
|
 |
|
Is windows: |
false
|
Is dropped: |
true
|
PID: |
1572
|
Target ID: |
20
|
Parent PID: |
3452
|
Name: |
isqmkp.exe
|
Path: |
C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe
|
Commandline: |
"C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
|
Size: |
101710
|
MD5: |
F4758788F11A0DE8D11EB4B8C515FFBD
|
Time: |
23:58:17
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
false
|
Is elevated: |
false
|
Modulebase: |
0xf9d0000
|
Modulesize: |
94208
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Gandcrab |
Spam, unwanted Advertisements and Ransom Demands |
|
Yara detected ReflectiveLoader |
Data Obfuscation |
|
Drops PE files |
Persistence and Installation Behavior |
|
Creates files inside the user directory |
System Summary |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1916
|
Target ID: |
21
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:19
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5244
|
Target ID: |
23
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:22
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6028
|
Target ID: |
25
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:25
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5116
|
Target ID: |
27
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:28
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff651c80000
|
Modulesize: |
65536
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
680
|
Target ID: |
30
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:34
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5124
|
Target ID: |
33
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:37
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4972
|
Target ID: |
36
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:40
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5604
|
Target ID: |
39
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:44
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
736
|
Target ID: |
41
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:48
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4460
|
Target ID: |
43
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:53
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6052
|
Target ID: |
45
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:55
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5424
|
Target ID: |
47
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:58:57
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4364
|
Target ID: |
49
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:59:00
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5188
|
Target ID: |
51
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:59:02
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.coin dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1164
|
Target ID: |
53
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.coin dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:59:04
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1092
|
Target ID: |
58
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup nomoreransom.bit dns1.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:59:07
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns2.soprodns.ru
|
 |
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
968
|
Target ID: |
60
|
Parent PID: |
5280
|
Name: |
nslookup.exe
|
Path: |
C:\Windows\SysWOW64\nslookup.exe
|
Commandline: |
nslookup gandcrab.bit dns2.soprodns.ru
|
Size: |
78336
|
MD5: |
8E82529D1475D67615ADCB4E1B8F4EEC
|
Time: |
23:59:13
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x140000
|
Modulesize: |
98304
|
Wow64: |
true
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Performs many domain queries via nslookup |
Networking |
|
Uses nslookup.exe to query domains |
Networking |
System Network Configuration Discovery
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Too many similar processes found |
DDoS |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
792
|
Target ID: |
7
|
Parent PID: |
5960
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:03
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5556
|
Target ID: |
13
|
Parent PID: |
4684
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:06
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1920
|
Target ID: |
16
|
Parent PID: |
4596
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:13
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4624
|
Target ID: |
18
|
Parent PID: |
6112
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:16
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
high
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5388
|
Target ID: |
22
|
Parent PID: |
1916
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:19
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
4592
|
Target ID: |
24
|
Parent PID: |
5244
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:23
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff68f300000
|
Modulesize: |
114688
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
1012
|
Target ID: |
26
|
Parent PID: |
6028
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:26
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5552
|
Target ID: |
28
|
Parent PID: |
5116
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:31
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
496
|
Target ID: |
31
|
Parent PID: |
680
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:34
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
5484
|
Target ID: |
34
|
Parent PID: |
5124
|
Name: |
conhost.exe
|
Path: |
C:\Windows\System32\conhost.exe
|
Commandline: |
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Size: |
625664
|
MD5: |
EA777DEEA782E8B4D7C7C33BBF8A4496
|
Time: |
23:58:37
|
Date: |
31/08/2022
|
Reason: |
newprocess
|
Reputation: |
timeout
|
Is admin: |
true
|
Is elevated: |
true
|
Modulebase: |
0x7ff745070000
|
Modulesize: |
651264
|
Wow64: |
false
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
|
|
Is windows: |
true
|
Is dropped: |
false
|
PID: |
6096
|
Target ID: |
37
|
Parent PID: |
4972
|
Name: |
conhost.exe | |