Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 29, 2021, 9:51 a.m. | July 29, 2021, 9:55 a.m. |
-
file.exe "C:\Users\test22\AppData\Local\Temp\file.exe"
1772
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
45.140.17.74 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49164 -> 45.140.17.74:443 | 2028401 | ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex | Unknown Traffic |
TCP 192.168.56.102:49162 -> 45.140.17.74:443 | 2028401 | ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex | Unknown Traffic |
TCP 192.168.56.102:49163 -> 45.140.17.74:443 | 2028401 | ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex | Unknown Traffic |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49164 45.140.17.74:443 |
C=, ST=, L=, O=, OU=, CN= | C=, ST=, L=, O=, OU=, CN= | 6e:ce:5e:ce:41:92:68:3d:2d:84:e2:5b:0b:a7:e0:4f:9c:b7:eb:7c |
TLSv1 192.168.56.102:49162 45.140.17.74:443 |
C=, ST=, L=, O=, OU=, CN= | C=, ST=, L=, O=, OU=, CN= | 6e:ce:5e:ce:41:92:68:3d:2d:84:e2:5b:0b:a7:e0:4f:9c:b7:eb:7c |
TLSv1 192.168.56.102:49163 45.140.17.74:443 |
C=, ST=, L=, O=, OU=, CN= | C=, ST=, L=, O=, OU=, CN= | 6e:ce:5e:ce:41:92:68:3d:2d:84:e2:5b:0b:a7:e0:4f:9c:b7:eb:7c |
suspicious_features | Connection to IP address | suspicious_request | GET https://45.140.17.74/aPr9 | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.140.17.74/cx |
request | GET https://45.140.17.74/aPr9 |
request | GET https://45.140.17.74/cx |
description | file.exe tried to sleep 171 seconds, actually delayed analysis time by 171 seconds |
host | 45.140.17.74 |
process | file.exe | useragent | |||||||
process | file.exe | useragent | Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 6.0) |
DrWeb | Trojan.Inject3.2700 |
MicroWorld-eScan | Trojan.GenericKD.37289622 |
FireEye | Generic.mg.6cac30135f4d5639 |
ALYac | Trojan.GenericKD.37289622 |
Cylance | Unsafe |
Zillya | Trojan.Rozena.Win32.99309 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 005622831 ) |
Alibaba | Trojan:Win32/Rozena.132cfc78 |
K7GW | Trojan ( 005622831 ) |
Cybereason | malicious.35f4d5 |
Arcabit | Trojan.Generic.D238FE96 |
Cyren | W32/Diple.G.gen!Eldorado |
Symantec | Backdoor.Cobalt |
ESET-NOD32 | a variant of Win32/Rozena.AMZ |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Trojan.CobaltStrike-7899872-1 |
BitDefender | Trojan.GenericKD.37289622 |
NANO-Antivirus | Trojan.Win32.Inject3.horsiq |
Avast | Win32:Trojan-gen |
Tencent | Malware.Win32.Gencirc.10ce3d9a |
Ad-Aware | Trojan.GenericKD.37289622 |
Sophos | ML/PE-A + ATK/Cobalt-A |
F-Secure | Trojan.TR/Crypt.XPACK.Gen7 |
TrendMicro | Trojan.Win32.COBALT.SM |
McAfee-GW-Edition | Cobalt-EVTS!6CAC30135F4D |
Emsisoft | Trojan.Rozena (A) |
Ikarus | Win32.Outbreak |
Jiangmin | Trojan.Generic.ftawl |
Webroot | W32.Trojan.Cobaltstrike |
Avira | TR/Crypt.XPACK.Gen7 |
MAX | malware (ai score=100) |
Antiy-AVL | Trojan/Generic.ASMalwS.30BBA6D |
Gridinsoft | Trojan.Win32.Heur.oa!s1 |
Microsoft | Trojan:Win32/Cobaltstrike.MK!MTB |
ViRobot | Trojan.Win32.Cobalt.14336.J |
ZoneAlarm | HEUR:Trojan.Win32.CobaltStrike.gen |
GData | Trojan.GenericKD.37289622 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win32.CobaltStrike.R329694 |
McAfee | Cobalt-EVTS!6CAC30135F4D |
TACHYON | Trojan/W32.Agent.14336.WO |
VBA32 | TScope.Malware-Cryptor.SB |
Malwarebytes | Trojan.CobaltStrike |
TrendMicro-HouseCall | Trojan.Win32.COBALT.SM |
Rising | Backdoor.CobaltStrike!1.D049 (CLASSIC) |
Yandex | Trojan.GenAsa!/C5jzoNrl5s |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/Generic.AP.118EACE!tr |