Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 29, 2021, 9:48 a.m. | July 29, 2021, 9:51 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\joinpornhub.pdf.exe.dll,StartW
1540-
wermgr.exe C:\Windows\system32\wermgr.exe
1036
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\joinpornhub.pdf.exe.dll,
1064
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49165 45.36.99.184:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.103:49166 217.115.240.248:443 |
C=US, ST=GA, L=Canton, O=LigoWave LLC, OU=R&D, CN=LigoWave SSL CA | C=US, ST=GA, L=Canton, O=LigoWave LLC, OU=R&D, CN=LigoWave SSL CA | d3:39:ab:71:76:bb:9c:d2:1c:3e:b1:17:92:c7:3f:25:1f:25:f8:88 |
TLSv1 192.168.56.103:49168 138.34.28.219:443 |
C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-F4:92:BF:D6:1C:49/emailAddress=support@ubnt.com | C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-F4:92:BF:D6:1C:49/emailAddress=support@ubnt.com | 0f:6c:9c:c8:a9:10:1e:c8:98:3f:01:df:32:ad:f1:7f:5d:d0:4c:54 |
TLSv1 192.168.56.103:49169 38.110.103.124:443 |
C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-78:8A:20:EC:48:A1/emailAddress=support@ubnt.com | C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-78:8A:20:EC:48:A1/emailAddress=support@ubnt.com | e6:60:4a:40:4a:b9:63:85:da:e8:fc:ec:75:e2:1a:7e:85:1f:49:1e |
TLSv1 192.168.56.103:49172 38.110.103.18:443 |
C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-B4:FB:E4:B8:30:7E/emailAddress=support@ubnt.com | C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-B4:FB:E4:B8:30:7E/emailAddress=support@ubnt.com | 2e:0f:ca:9b:3e:95:2e:8f:f6:42:a6:1e:7a:21:66:83:0d:31:cb:c1 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
packer | Armadillo v1.xx - v2.xx |
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://217.115.240.248/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/cookiechecker?uri=/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/index.html | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/login.cgi?uri=/index.html | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://38.110.103.124/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://38.110.103.18/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ |
request | GET https://45.36.99.184/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ |
request | GET https://217.115.240.248/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ |
request | GET https://138.34.28.219/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ |
request | GET https://138.34.28.219/cookiechecker?uri=/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ |
request | GET https://138.34.28.219/index.html |
request | GET https://138.34.28.219/login.cgi?uri=/index.html |
request | GET https://38.110.103.124/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ |
request | GET https://38.110.103.18/rob114/TEST22-PC_W617601.FBFF346F9DD8BB0683FDCCFB7BD71FF1/5/file/ |
description | wermgr.exe tried to sleep 136 seconds, actually delayed analysis time by 136 seconds |
cmdline | C:\Windows\system32\cmd.exe |
host | 138.34.28.219 | |||
host | 154.58.23.192 | |||
host | 185.56.76.94 | |||
host | 217.115.240.248 | |||
host | 38.110.103.124 | |||
host | 38.110.103.18 | |||
host | 45.36.99.184 | |||
host | 68.69.26.182 | |||
host | 74.85.157.139 |
Bkav | W32.AIDetect.malware1 |
MicroWorld-eScan | Trojan.GenericFCA.Agent.11063 |
ESET-NOD32 | a variant of Generik.CEIVFVI |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:Trojan.Win32.Trickpak.gen |
BitDefender | Trojan.GenericFCA.Agent.11063 |
Ad-Aware | Trojan.GenericFCA.Agent.11063 |
TrendMicro | TrojanSpy.Win32.TRICKBOT.TIGOCJS |
FireEye | Trojan.GenericFCA.Agent.11063 |
GData | Win32.Trojan-Spy.TrickBot.CA0SRR |
MAX | malware (ai score=82) |
Kingsoft | Win32.Troj.Undef.(kcloud) |
TrendMicro-HouseCall | TrojanSpy.Win32.TRICKBOT.TIGOCJS |
eGambit | Unsafe.AI_Score_97% |
dead_host | 192.168.56.103:49171 |
dead_host | 74.85.157.139:443 |
dead_host | 68.69.26.182:443 |
dead_host | 185.56.76.94:443 |